It is about the different threats that can be obtained through accessing the internet, the different government provisions and how to stay safe online.
It is about the different threats that can be obtained through accessing the internet, the different government provisions and how to stay safe online.
The world is adopting the new technology the need of ethics arises to sustain the proper growth and to minimize the risk of wrong uses. As technology is growing good if it is in proper hands but goes totally wrong in wrong hands.
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
Cyberspace and Cyberethics and Social Networking
discusses the new realities of global computer networks, the intertwining of global economies, monopolies and their economic implications, globalization, emerging issues like global ethics, culture, and the development of the lingua franca for the Internet. It also focuses the discussion on the new realities of social networking.
Further to recent technological advancements, the long awaited, much anticipated mobile era has finally arrived! But how important are the traits of the M-Agers in terms of consumer behaviour and its impact on business? And what comes next – is there a ‘touch-generation’ emerging?
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
Cyber Crime and Cyber security .
it has been estimated that the cost of crimes committed, annually,would increase from $3 trillion to $6 trillion by 2021. with increase of cyber crimes, the needs for professionls to secure the system from such attacks has risen up.
The world is adopting the new technology the need of ethics arises to sustain the proper growth and to minimize the risk of wrong uses. As technology is growing good if it is in proper hands but goes totally wrong in wrong hands.
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
Cyberspace and Cyberethics and Social Networking
discusses the new realities of global computer networks, the intertwining of global economies, monopolies and their economic implications, globalization, emerging issues like global ethics, culture, and the development of the lingua franca for the Internet. It also focuses the discussion on the new realities of social networking.
Further to recent technological advancements, the long awaited, much anticipated mobile era has finally arrived! But how important are the traits of the M-Agers in terms of consumer behaviour and its impact on business? And what comes next – is there a ‘touch-generation’ emerging?
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
Cyber Crime and Cyber security .
it has been estimated that the cost of crimes committed, annually,would increase from $3 trillion to $6 trillion by 2021. with increase of cyber crimes, the needs for professionls to secure the system from such attacks has risen up.
MEF Global Consumer Trust Report.
The study explores the key areas of trust, privacy, transparency and security to identify their impact on mobile consumers globally from purchasing a new device to downloading apps or paying for goods and services.
This year we have reached the stage where 50% of the world’s population is connected to the Internet, compared to 40% in 2016. And, with more people online than ever before, every minute that goes by witnesses 3.5 million Google search queries, $751,522 spent, 156 million emails sent, 342,000 apps downloaded in mobile app stores and 46,200 posts uploaded to Instagram.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
Today’s citizens have high expectations of authorities and public safety agencies, and where these expectations are not being met they are increasingly using the internet and smartphones for their own personal safety. A new Ericsson ConsumerLab report has investigated smartphone users’ views on public safety in five cities.
https://www.ericsson.com/consumerlab
How can we better protect our customers?
It’s official: consumers do not feel their private data is being kept private. Looking around at the headlines, where high profile breach after high-profile breach is documented, the lack of trust in data security is no surprise.
In this graphical report, we delve into the fears surrounding online security and the economic impact of losing your customers’ trust.
It’s official: your customers do not feel their private data is being kept private. In this graphical report, we delve into the fears surrounding online security and the economic impact of losing your customers’ trust.
With their frequent and wide-ranging use of the internet, netizens might appear to be creating an exclusive subculture. However, a new study by Ericsson ConsumerLab entitled The Networked Life shows that netizens are forerunners of a networked lifestyle that is being embraced by 82 percent of consumers.
Lack of passwords, use of public Wi-Fi lead consumer cyber security risks. New survey from Experian's ProtectMyID® reveals how Americans can take greater control when securing their personal information. The study, conducted by Edelman Berland, reveals areas where consumers’ identities are at the most risk, including electronic devices and online accounts. The findings show that 93 percent of respondents believe that identify theft is a growing problem, yet are not doing enough to address the issue.
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
Continuous innovation in 5G networks is creating new opportunities for video-enabled services for both consumers and industries, particularly in areas such as the Internet of Things and the automotive sector. These new services are expected to rely on continued video evolution toward 8K resolutions and beyond, and on new strict requirements such as low end-to-end latency for video delivery.
The latest Ericsson Technology Review article explores recent developments in video compression technology and introduces Versatile Video Coding (VVC) – a significant improvement on existing video codecs that we think deserves to be widely deployed in the market. VVC has the potential both to enhance the user experience for existing video services and offer an appropriate performance level for new media services over 5G networks.
BRIDGING THE GAP BETWEEN PHYSICAL AND DIGITAL REALITIES
The key role that connectivity plays in our personal and professional lives has never been more obvious than it is today. Thankfully, despite the sudden, dramatic changes in our behavior earlier this year, networks all around the world have proven to be highly resilient. At Ericsson, we’re committed to ensuring that the network platform continues to improve its ability to meet the full range of societal needs as well as supporting enterprises to stay competitive in the long term. We know that greater agility and speed will be essential.
This issue of our magazine includes several articles that explain Ericsson’s approach to future network development, including my annual technology trends article. The seven trends on this year’s list serve as a critical cornerstone in the development of a common Ericsson vision of what future networks will provide, and what sort of technology evolution will be required to get there.
ERIK EKUDDEN
Senior Vice President, Chief Technology Officer and Head of Group Function Technology
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
Today millimeter wave (mmWave) spectrum is valued mainly because it can be used to achieve high speeds and capacities when combined with spectrum assets below 6GHz. But it can provide other benefits as well. For example, mmWave spectrum makes it possible to use a promising new wireless backhaul solution for 5G New Radio – integrated access and backhaul (IAB) – to densify networks with multi-band radio sites at street level.
This Ericsson Technology Review article explains the IAB concept at a high level, presenting its architecture and key characteristics, as well as examining its advantages and disadvantages compared with other backhaul technologies. It concludes with a presentation of the promising results of several simulations that tested IAB as a backhaul option for street sites in both urban and suburban areas.
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
Critical Internet of Things (IoT) connectivity is an emerging concept in IoT development that enables more efficient and innovative services across a wide range of industries by reliably meeting time-critical communication needs. Mobile network operators (MNOs) are in the perfect position to enable these types of time-critical services due to their ability to leverage advanced 5G networks in a systematic and cost-effective way.
This Ericsson Technology Review article explores the benefits of Critical IoT connectivity in areas such as industrial control, mobility automation, remote control and real-time media. It also provides an overview of key network technologies and architectures. It concludes with several case studies based on two deployment scenarios – wide area and local area – that illustrate how well suited 5G spectrum assets are for Critical IoT use cases.
5G New Radio has already evolved in important ways since the 3GPP standardized Release 15 in late 2018. The significant enhancements in Releases 16 and 17 are certain to play a critical role in expanding both the availability and the applicability of 5G NR in both industry and public services in the near future.
This Ericsson Technology Review article summarizes the most notable new developments in releases 16 and 17, grouped into two categories: enhancements to existing features and features that address new verticals and deployment scenarios. This analysis and our insights about the future beyond Release 17 is an important component of our work to help mobile network operators and other stakeholders better understand and plan for the many new 5G NR opportunities that are on the horizon.
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
The growing interest in cloud computing scenarios that incorporate both distributed computing capabilities and heterogeneous hardware presents a significant opportunity for network operators. With a vast distributed system (the telco network) already in place, the telecom industry has a significant advantage in the transition toward distributed cloud computing.
This Ericsson Technology Review article explores the future of cloud computing from the perspective of network operators, examining how they can best manage the complexity of future cloud deployments and overcome the technical challenges. Redefining cloud to expose and optimize the use of heterogeneous resources is not straightforward, but we are confident that our use cases and proof points validate our approach and will gain traction both in the telecommunications community and beyond.
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
Commonly referred to as SIM cards, the universal integrated circuit cards (UICCs) used in all cellular devices today are in fact complex and powerful minicomputers capable of much more than most Internet of Things (IoT) applications require. Until a simpler and less costly alternative becomes available, action must be taken to ensure that the relatively high price of UICC modules does not hamper IoT growth.
This Ericsson Technology Review article presents two mid-term approaches. The first is to make use of techniques that reduce the complexity of using UICCs in IoT applications, while the second is to use the UICCs’ excess capacity for additional value generation. Those who wish to exploit the potential of the UICCs to better support IoT applications have the opportunity to use them as cryptographic storage, to run higher-layer protocol stacks and/or as supervisory entities, for example.
Mobile data traffic volumes are expected to increase by a factor of four by 2025, and 45 percent of that traffic will be carried by 5G networks. To deliver on customer expectations in this rapidly changing environment, communication service providers must overcome challenges in three key areas: building sufficient capacity, resolving operational inefficiencies through automation and artificial intelligence, and improving service differentiation. This issue of ETR magazine provides insights about how to tackle all three.
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
The 5G network evolution has opened up an abundance of new business opportunities for communication service providers (CSPs) in verticals such as industrial automation, security, health care and automotive. In order to successfully capitalize on them, CSPs must have business support systems (BSS) that are evolved to manage complex value chains and support new business models. Optimized information models and a high degree of automation are required to handle huge numbers of devices through open interfaces.
This Ericsson Technology Review article explains how 5G-evolved BSS can help CSPs transform themselves from traditional network developers to service enablers for 5G and the Internet of Things, and ultimately to service creators with the ability to collaborate beyond telecoms and establish lucrative digital value systems.
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
For many operators, the introduction of the 5G System (5GS) to provide wide-area services in existing Evolved Packet System (EPS) deployments is a necessary step toward creating a full-service, future-proof 5GS in the longer term. The creation of a combined 4G-5G network requires careful planning and a holistic strategy, as the introduction of 5GS has significant impacts across all network domains, including the RAN, packet core, user data and policies, and services, as well as affecting devices and backend systems.
This Ericsson Technology Review article provides an overview of all the aspects that operators need to consider when putting together a robust EPS-to-5GS migration strategy and provides guidance about how they can adapt the transition to address their particular needs per domain.
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
The surge in data volume that will come from the massive number of devices enabled by 5G has made edge computing more important than ever before. Beyond its abilities to reduce network traffic and improve user experience, edge computing will also play a critical role in enabling use cases for ultra-reliable low-latency communication in industrial manufacturing and a variety of other sectors.
This Ericsson Technology Review article explores the topic of how to deliver distributed edge computing solutions that can host different kinds of platforms and applications and provide a high level of flexibility for application developers. Rather than building a new application ecosystem and platform, we strongly recommend reusing industrialized and proven capabilities, utilizing the momentum created with Cloud Native Computing Foundation, and ensuring backward compatibility.
The rise of the innovation platform
Society and industry are transforming at an unprecedented rate. At the same time, the network platform is emerging as an innovation platform with the potential to offer all the connectivity, processing, storage and security needed by current and future applications. In my 2019 trends article, featured in this issue of Ericsson Technology Review, I share my view of the future network platform in relation to six key technology trends.
This issue of the magazine also addresses critical topics such as trust enablement, the extension of computing resources all the way to the edge of the mobile network, the growing impact of the cloud in the telco domain, overcoming latency and battery consumption challenges, and the need for end-to-end connectivity. I hope it provides you with valuable insights about how to overcome the challenges ahead and take full advantage of new opportunities.
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
The Internet of Things (IoT) has emerged as a fundamental cornerstone in the digitalization of both industry and society as a whole. It represents a huge opportunity not only in economic terms, but also from a global challenges perspective – making it easier for governments, non-governmental organizations and the private sector to address pressing food, energy, water and climate related issues.
5G and the IoT are closely intertwined. One of the biggest innovations within 5G is support for the IoT in all its forms, both by addressing mission criticality as well as making it possible to connect low-cost, long-battery-life sensors.
With this in mind, we decided to create a special issue of Ericsson Technology Review solely focused on IoT opportunities and challenges. I hope it provides you with valuable insights about the IoT-related opportunities available to your organization, along with ideas about how we can overcome the challenges ahead.
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
A variety of automotive and transport services that require cellular connectivity are already in commercial operation today, and many more are yet to come. Among other things, these services will improve road safety and traffic efficiency, saving lives and helping to reduce the emissions that contribute to climate change. At Ericsson, we believe that the best way to address the growing connectivity needs of this industry sector is through a common network solution, as opposed to taking a single-segment silo approach.
The latest Ericsson Technology Review article explains how the ongoing rollout of 5G provides a cost-efficient and feature-rich foundation for a horizontal multiservice network that can meet the connectivity needs of the automotive and transport ecosystem. It also outlines the key challenges and presents potential solutions.
This presentation explains the importance of SD-WAN technology as part of the Enterprise digital transformation strategy. It goes over the first wave of SD-WAN in a single vendor deployment, with Do-it-yourself (DIY) as the preferred model. Then continues with the importance of orchestration in the second wave of SD-WAN deployments in a multi-vendor ecosystem, turning to SD-WAN Managed Services as the preferred model. It ends up with some examples of use cases and the Verizon customer case. More information on Ericsson Dynamic orchestration - http://m.eric.sn/6rsZ30psKLu
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
Time-Sensitive Networking (TSN) is becoming the standard Ethernet-based technology for converged networks of Industry 4.0. Understanding the importance and relevance of TSN features, as well as the capabilities that allow 5G to achieve wireless deterministic and time-sensitive communication, is essential to industrial automation in the future.
The latest Ericsson Technology Review article explains how TSN is an enabler of Industry 4.0, and that together with 5G URLLC capabilities, the two key technologies can be combined and integrated to provide deterministic connectivity end to end. It also discusses TSN standards and the value of the TSN toolbox for next generation industrial automation networks.
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
Low latency communication and minimal battery consumption are key requirements of many 5G and IoT use cases, including smart transport and critical control of remote devices. Thanks to Ericsson’s 4G/5G research activities and lessons learned from legacy networks, we have identified solutions that address both of these requirements by reducing the amount of signaling required during state transitions, and shared our discoveries with the 3GPP.
This Ericsson Technology Review article explains the why and how behind the new Radio Resource Control (RRC) state model in the standalone version of the 5G New Radio standard, which features a new, Ericsson-developed state called inactive. On top of overcoming latency and battery consumption challenges, the new state also increases overall system capacity by decreasing the processing effort in the network.
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
Cloud-native application design is set to become standard practice in the telecom industry in the near future due to the major efficiency gains it can provide, particularly in terms of speeding up software upgrades and releases. At Ericsson, we have been actively exploring the potential of cloud-native computing in the telecom industry since we joined the Cloud Native Computing Foundation (CNCF) a few years ago.
This Ericsson Technology Review article explains the opportunities that CNCF technology has enabled, as well as unveiling key aspects of our application development framework, which is designed to help navigate the transition to a cloud-native approach. It also discusses the challenges that the large-scale reuse of open-source technology can raise, along with key strategies for how to mitigate them.
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
To meet the requirements of use cases in areas such as the Internet of Things, AR/VR, Industry 4.0 and the automotive sector, operators need to be able to provide computing resources across the whole telco domain – all the way to the edge of the mobile network. Service exposure and APIs will play a key role in creating solutions that are both effective and cost efficient.
The latest Ericsson Technology Review article explores recent advances in the service exposure area that have resulted from the move toward 5G and the adoption of cloud-native principles, as well as the combination of Service-based Architecture, microservices and container technologies. It includes examples that illustrate how service exposure can be deployed in a multitude of locations, each with a different set of requirements that drive modularity and configurability needs.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
2. About this study
Contents
CONTENTS
2
internet reaches critical mass
3
CONCERNS AFFECT BEHAVIOR BUT NOT USAGE
4
ONLINE CONCERNS AND INCREASED INTERNET USE
5
PERSONAL SAFETY IS KEY
6
CONTINUING THE DISCUSSION
7
This report, Privacy, security and safety online, is the third
installment from Ericsson ConsumerLab investigating
matters of user privacy, integrity and security online.* The
first report examined these issues on a high level, trying
to map and understand the consumer, service provider
and regulatory landscape. While the second report went
on to explore different consumer benefits of sharing
personal information, in this third report we look further into
consumer concerns surrounding the usage of internet.
As this report is based on an online survey, it should be
noted that in countries with low internet penetration, the
online population is often dominated by early adopters who
are likely to display an equal, if not higher, level of maturity
as that of the average user in markets with high internet
penetration.
*) Previous reports are: Consumer privacy in an online world (2012)
and Personal information economy (2013).
Daily
internet
users
Markets
included
USA
44%
Methodology
Mexico
17%
The survey was conducted
through online questionnaires.
A total of 3,311 respondents in
six countries participated in the
survey. The study represents 215
million daily internet users, in
the ages 15-69 years, in the
included markets.
Sweden
60%
Egypt
18%
Pakistan
10%
Thailand
21%
Percentage of
population
The voice of the consumer
Ericsson ConsumerLab has close to 20 years
experience of studying people’s behaviors and values,
including the way they act and think about ICT products
and services. Ericsson ConsumerLab provides unique
insights on market and consumer trends.
Ericsson ConsumerLab gains its knowledge through
a global consumer research program based on
interviews with 100,000 individuals each year, in more
than 40 countries and 15 megacities – statistically
representing the views of 1.1 billion people.
2 Ericsson consumerLab Privacy, security and safety online
Both quantitative and qualitative methods are used,
and hundreds of hours are spent with consumers
from different cultures. To be close to the market and
consumers,
Ericsson ConsumerLab has analysts in all regions where
Ericsson is present, which gives a thorough global
understanding of the ICT market and business models.
All ConsumerLab reports can be found at:
www.ericsson.com/consumerlab
3. Internet reaches
critical mass
Internet maturity globally is reaching critical mass.
People across the globe are becoming dependent
on online connectivity in everyday life, work, and
communication with authorities.
If the potential of the internet thus far has been determined
by technological advances, further realization of this
potential will demand a deeper, more sociologically
grounded understanding of the norms and rules of
engagement on the internet.
key findings
› Consumers express concerns, which
directly affect their online behavior
- 68 percent have felt hesitant towards expressing
opinions on the Internet.
- 90 percent of those concerned say that it has a direct
effect on their online behavior.
› However, these concerns do not reduce
internet activity
- Only 4 percent state that privacy issues reduce
their use of internet.
› On the internet you are who you are
- 89 percent enter their correct personal information
when registering on different sites.
- 81 percent use their correct information when
commenting or expressing personal opinions online.
›
Uncertainty on when, where and how to
assess risks online leads to consumers
adopting coping strategies
- 93 percent say they use some form of coping strategy
to deal with risks online.
- 58 percent are careful about what websites they visit.
- 53 percent avoid giving out personal information online.
› Strong support for internet freedom, but
users acknowledge the risks of libel online
- Across the studied markets, there is strong support
for third party moderation on issues
of personal integrity such as personal
threats, bullying and slander. 80
percent find censorship of personal
threats on the internet acceptable.
Ericsson consumerLab Privacy, security and safety online 3
4. CONCERNS AFFECT
BEHAVIOR BUT NOT USAGE
Internet used in many everyday activities
Internet has shifted from being one specific aspect of consumers’ lives, to becoming an important infrastructure for
many aspects of everyday life. As this shift has accelerated,
the need for legal and social codes of conduct, or ground
rules, has become evident.
Risks influence the development
of online activity
According to the latest Ericsson Mobility Report from
november 2013, there are now 1.9 billion smartphone
subscriptions, anticipated to grow to 5.6 billion by 2019.
As a part of this development and a growing maturity,
consumers are becoming aware of online hazards. In the
study, 70 percent of respondents find that safety issues such
as viruses or fraud are a problem to them on the internet,
59 percent worry about surveillance online and to 56 percent
privacy issues are a concern.
It is evident that these concerns have not stopped the
growth of internet; quite to the contrary, the number of
internet users continues to grow unabatedly.
The results from the study do show that issues of privacy,
security and safety have a direct effect on how the internet is
approached and used. It affects the degree of both commercial and social interaction online.
However, what is notable is that among those who
express concerns only 4 percent state that these issues
have resulted in them using the internet less. This goes
across all markets in the study.
“I should probably care more than I do, but
what am I going to do with that frustration?
Cut myself off from everything, or not pay
bills online?”
— Male, 20, U.S.
10%
4%
11%
29%
70%
Multiple choice question, sum adds up to more than 100 percent.
Behavioral effects of security concerns online
I ues the internet less
consider security issues
a problem while online
44%
Figure 1: Share of consumers who consider matters of
security a problem, while on their computer or mobile
phone, and the behavioral effects of those concerns.
I am more careful with what I write on the internet
(e.g. on social networking sites or in forums)
I am more careful with what personal information I give out about myself
(e.g. when registering on sites)
I am more careful when it comes to which websites I am visiting
Base: All, 3,311 respondents
It affects my internet use in other ways
44%
It doesn’t affect my internet use at all
Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014
Base: All, 3,311 respondents
4 Ericsson consumerLab Privacy, security and safety online
5. ONLINE CONCERNS AND
INCREASED INTERNET USE
Experience and hearsay combined determine
consumer perception of risk
When it comes to first hand experiences of security risks, 68
percent have experienced computer viruses themselves but
only 11 percent have been subject to fraud online. However,
31 percent state that someone close to them has been
exposed to internet fraud. Another issue which has attracted
much public attention is personal identities being hijacked
(e.g. a friend posting in your name on Facebook) or stolen,
and whereas 27 percent say that someone close to them
have experienced this, only 13 percent have actually had
their identity tampered with online.
Consumer perception of risks builds on a blend of first-hand
experiences and hearsay, from friends and acquaintances
to media reporting. This creates awareness that risks exists
but uncertainty about when, where and how to assign and
assess risk.
Consumers use coping strategies to tackle
online risks
Just as various coping strategies are a natural part of
everyday life offline, consumers also use coping strategies
on internet in order to handle perceived and actual risks. Of
the respondents, 93 percent say that they take some form
of protective measures when using the internet. In addition
to direct protection in the form of anti-virus software, coping
strategies include indirect measures such as being careful
when it comes to what websites to visit.
On the social web, sharing personal information and opinions is both a prerequisite and a key functionality. Personal
information is a wide term, covering everything from: name,
interest, political views and opinions to consumption
patterns. Online and in real life we constantly share personal
information, more or less actively and concisely. Given the
wide range of personal information it comes as no surprise
that different types of personal information varies in
sensitivity. Neither is it a paradox that 89 percent of users
say that they share personal information and opinions online
at least weekly. Simultaneously, results also show that
86 percent have felt hesitant to share personal information
online and that 68 percent have felt hesitant to express
their opinions.
Companies employ complex processes to collect and apply
personal information and it is not easy for consumers to
connect all the dots and understand how, when and for
what purpose their information is used.
Figure 2: Have you or someone close to you
experienced any of the following?
Someone
close to me
Myself
Censorship online
14%
Virus on mobile phone
21%
23%
Virus on computer
68%
42%
Paid for something online
that never was delivered
14%
20%
9%
20%
Recieving threats online
Someone hacking your
e-mail account
Someone hacking your social
networking account
Surveillance
Identity theft online
Online fraud
28%
19%
29%
20%
32%
14%
20%
13%
11%
27%
31%
86%
have felt hesitant to share
personal information
68%
have felt hesitant to express
their opinions online
Not connecting the dots
While 70 percent believe that companies can access and
use their personal information for commercial purposes,
56 percent claim that they would share less personal
information if they received a personalized ad based on
something they discussed in an email. Personalized ads are
today a prevalent feature of free email services. Yet people
do not seem to recognize this fact or to pay attention to it.
Source: Ericsson Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014
Base: All, 3,311 respondents
Ericsson consumerLab Privacy, security and safety online 5
6. PERSONAL SAFETY IS KEY
Other people the main concern online
Out of the respondents 48 percent agree that their online
behavior would be seriously affected if they found out that
individuals not acquainted to them could access and use
their personal information.
On the internet you are who you are; the results of the study
show that users predominately use their real identity online.
89 percent enter their correct personal information (as in real
name and email et cetera) when registering on different sites
and 81 percent do not use aliases when commenting or
expressing personal opinions online.
Even among an advanced internet sample, just over one in
10 users go so far as to hide their IP address, a behavior
that can be interpreted as anything from an attempt of trying
to protect your own identity, in order to stay safe from online
threats, to an attempt to conceal more or less illegal online
activity.
“If it’s only companies [that can
access your information], you don’t
have to be careful about how you
use your smartphone.”
— Female, 17, Sweden
“It’s not [social networks] that are making the
world corrupt. It’s the people that are on it.”
— Female, 20, U.S.
Figure 3: Share who agree their online behavior would be seriously affected if they found out that others could access
and use their personal information online.
48%
Yes, if it were other
individuals not acquainted with me
39%
39%
Yes, if it were a
national security agency
Yes, if it were
a financial institution
Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014
Base: All, 3,311 respondents
Support for the protection of personal integrity
There is firm support for freedom of speech among the
respondents in the survey. Only 8 percent state that it is
not important. At the same time, users acknowledge the
inevitable risks of libel online. Across the studied markets,
there is support for third party moderation, particularly on
issues of personal integrity such as threats, bullying and
slander. 80 percent believe it is OK to censor or block
personal threats on internet.
For non-personal issues concerning religion, government
and one’s country there is less support for censorship,
across all markets. In many cases there are small variations
between countries.
Figure 4: In which cases is it acceptable to censor or
block content on the Internet?
Personal threats
80%
20%
Bullying
79%
21%
Information that can compromise
national security
79%
21%
Pornographic content
78%
22%
Slander
76%
24%
Violent content
73%
27%
Rasist opinions or content
70%
30%
33%
67%
Sexist opinions or content
Criticsism against one’s country
48%
52%
Religious criticism
47%
53%
Criticism against government/state
32%
OK to censor
68%
Not OK to censor
Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014
Base: All, 3,311 respondents
6 Ericsson consumerLab Privacy, security and safety online
7. CONTINUING THE DISCUSSION
If one just looks at the numbers presented in this report,
consumer concerns seem to be quite high. However, given
that 96 percent say they will use internet as much or more in
the future, we detect no sign of privacy concerns hindering
the growing use of internet. Obviously, as internet becomes
an increasingly important part of just about everything in
our lives, hiccups as well as outright attacks will continue
to happen. However, so far the backlashes we have seen
have been limited in time or have affected a relatively small
group of individuals, while the majority of consumers agree
that the benefits of internet use outweigh the concerns.
We have passed the point of no return – as individuals, we
can no longer really imagine a life without internet. Internet
is no longer a separate layer on top of the physical society,
they are continuously merging and hence also needs to be
viewed and treated as one.
Having said that, uncertainties continue to influence our
online behavior. The possible aftereffect of backlashes,
although they will not bring a disruptive change in the
general usage of internet, will contribute to the evolution and
discussion on how internet should be used. Matters of trust
and the importance of respecting human rights issues such
as the right to privacy will lead to a continued discussion concerning personal safety online and will not likely fade away.
It is clear from the study that as individuals, we perceive
other individuals to be the main threat, not companies or
institutions. Our main focus is feeling secure on a personal
level. In this way internet is just another platform of social
activity as real as any other physical arena and inextricably
intertwined with our everyday lives. Internet can and will be
misused, but the blame goes to the perpetrator.
Going forward, successful services and solutions will have
to be better at catering to consumer needs to feel secure
personally. Transparency will be increasingly important
and also encompass the idea that information should be
both understandable and accessible. As an example,
consumers need to not only click “yes” under terms and
conditions online, they need to also understand what it
means to them – abstract legal terms are not good enough,
they need to concretely explain: How will others get
access to me and my personal information?
Consumers will also remain as sensitive to issues of libel
online as they are offline, if not more. Engaging with
consumers in order to find the right balance between
openness and measures to protect against various forms
of online threats will be of utmost importance.
In combination with earlier ConsumerLab research on this
and related topics, results show that consumers support
measures to protect personal integrity, examples of which
can be:
› Build consumer awareness around risk
assessment online
› Built-in protective measures from the onset
– privacy by design
· Embedding privacy measures in the design of technology,
in order to protect consumers’ personal information
and privacy.
› Moderation of forums and social media
to reduce slander, bullying and other
behaviors that threaten personal integrity
› Consequent usage of transparency and
permissibility in handling personal information
· Earlier Ericsson ConsumerLab studies have pointed to the
importance of clarity, being transparent and asking for
consumers’ permission, to use personal information importance
of being transparent and clearly asked for online.
› Offering consumers value sharing when
commercially exploiting personal information
· Consumer trust is also gained by ensuring that any commercial
use of personal information is reciprocated by returning
consumers some form of value, monetary or in the form
of improved service or product experience.
Ericsson consumerLab Privacy, security and safety online 7