This year we have reached the stage where 50% of the world’s population is connected to the Internet, compared to 40% in 2016. And, with more people online than ever before, every minute that goes by witnesses 3.5 million Google search queries, $751,522 spent, 156 million emails sent, 342,000 apps downloaded in mobile app stores and 46,200 posts uploaded to Instagram.
Tablets adoption and Mobile Web Usage :in Central euopeSumit Roy
The document summarizes key findings from a survey on mobile internet usage in Germany, Austria, and Switzerland. Some of the main points are:
- Mobile internet usage has risen dramatically in all three countries between 2011-2012, with 58% of German respondents, 71% of Austrian respondents, and 76% of Swiss respondents reporting using mobile devices to access the internet.
- Smartphones are the most popular mobile device for internet access, used by 50% of German respondents, 62% of Austrian respondents, and 67% of Swiss respondents. Tablet and netbook use is also growing.
- Younger people are more likely to use mobile internet, but usage is growing among older age groups as well, showing
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...KKess
A new survey conducted by global IT association ISACA reveals how many employees will be shopping online at work this holiday season, and provides tips to help shoppers and IT departments minimize the risks.
Baidu - Explore The Mobile World in Indonesia - 2014Baidu Indonesia
Baidu releases a report based on the results of the company exploration on the mobile world trends in Indonesia. The exploration result was obtained from the surveys and interviews conducted by the company since 2 September to 31 October 2014. This activity aims to gain insights into the current situation and trends in Indonesian mobile market, as well as to gain in-depth description of the mobile phone users in Indonesia.
This report (in Indonesian) is also available in HTML5 version: http://goo.gl/HAIY2K
Como bien lo dice el título, es un estudio que hace eMarketer para conocer hábitos, comportamiento y consumo de medios digitales del segmento mejor definido como "millennial". Esta es su versión 2014.
The document outlines Mary Meeker's presentation on global internet trends in 2016. It discusses trends such as global internet users reaching 3 billion but growth flattening, India's internet user growth accelerating to overtake the US, global smartphone users and shipments slowing, and Android gaining smartphone share while iOS declines. It also covers global macro trends of slowing global economic growth and declining commodity prices, and shifts in global growth engines from developed markets to China and emerging Asia, driven by China's massive capital investments.
MEF Global Consumer Trust Report.
The study explores the key areas of trust, privacy, transparency and security to identify their impact on mobile consumers globally from purchasing a new device to downloading apps or paying for goods and services.
Large majorities of Internet users in both developed and developing countries believe that personal technology has vastly improved how they shop, work, learn, and get things done. However, there is an emerging divide in attitudes between the two groups. Developing countries express deep enthusiasm for technology's benefits, while developed countries with more ubiquitous technology express greater concerns about emerging issues like privacy. Nearly all Internet users share a concern that personal technology negatively impacts privacy. Majorities in most countries feel current legal protections are insufficient and want privacy safeguards strengthened.
The document discusses the impact of internet access and speeds on the economy and society in the Philippines. It notes that around 1.5 million Filipinos found online jobs in 2015, earning an average of $3 per hour. While internet access has increased and the government has provided more free wifi, high fees charged by dominant internet providers have led to relatively poor internet speeds. The document also discusses how increased internet use could benefit education but may enable human rights abuses like cyber pornography if not regulated properly. Internet activists are working to improve access for all Filipinos and protect freedom of information, net neutrality, and basic human rights online.
Tablets adoption and Mobile Web Usage :in Central euopeSumit Roy
The document summarizes key findings from a survey on mobile internet usage in Germany, Austria, and Switzerland. Some of the main points are:
- Mobile internet usage has risen dramatically in all three countries between 2011-2012, with 58% of German respondents, 71% of Austrian respondents, and 76% of Swiss respondents reporting using mobile devices to access the internet.
- Smartphones are the most popular mobile device for internet access, used by 50% of German respondents, 62% of Austrian respondents, and 67% of Swiss respondents. Tablet and netbook use is also growing.
- Younger people are more likely to use mobile internet, but usage is growing among older age groups as well, showing
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...KKess
A new survey conducted by global IT association ISACA reveals how many employees will be shopping online at work this holiday season, and provides tips to help shoppers and IT departments minimize the risks.
Baidu - Explore The Mobile World in Indonesia - 2014Baidu Indonesia
Baidu releases a report based on the results of the company exploration on the mobile world trends in Indonesia. The exploration result was obtained from the surveys and interviews conducted by the company since 2 September to 31 October 2014. This activity aims to gain insights into the current situation and trends in Indonesian mobile market, as well as to gain in-depth description of the mobile phone users in Indonesia.
This report (in Indonesian) is also available in HTML5 version: http://goo.gl/HAIY2K
Como bien lo dice el título, es un estudio que hace eMarketer para conocer hábitos, comportamiento y consumo de medios digitales del segmento mejor definido como "millennial". Esta es su versión 2014.
The document outlines Mary Meeker's presentation on global internet trends in 2016. It discusses trends such as global internet users reaching 3 billion but growth flattening, India's internet user growth accelerating to overtake the US, global smartphone users and shipments slowing, and Android gaining smartphone share while iOS declines. It also covers global macro trends of slowing global economic growth and declining commodity prices, and shifts in global growth engines from developed markets to China and emerging Asia, driven by China's massive capital investments.
MEF Global Consumer Trust Report.
The study explores the key areas of trust, privacy, transparency and security to identify their impact on mobile consumers globally from purchasing a new device to downloading apps or paying for goods and services.
Large majorities of Internet users in both developed and developing countries believe that personal technology has vastly improved how they shop, work, learn, and get things done. However, there is an emerging divide in attitudes between the two groups. Developing countries express deep enthusiasm for technology's benefits, while developed countries with more ubiquitous technology express greater concerns about emerging issues like privacy. Nearly all Internet users share a concern that personal technology negatively impacts privacy. Majorities in most countries feel current legal protections are insufficient and want privacy safeguards strengthened.
The document discusses the impact of internet access and speeds on the economy and society in the Philippines. It notes that around 1.5 million Filipinos found online jobs in 2015, earning an average of $3 per hour. While internet access has increased and the government has provided more free wifi, high fees charged by dominant internet providers have led to relatively poor internet speeds. The document also discusses how increased internet use could benefit education but may enable human rights abuses like cyber pornography if not regulated properly. Internet activists are working to improve access for all Filipinos and protect freedom of information, net neutrality, and basic human rights online.
Philippines has been slow off the marks when it comes to smartphone penetration and mobile internet usage but it's starting to catch up fast.
Our report looks at the trends among the feature phone and smartphone users in the country of 97 million people.
Research from mobile survey company, On Device Research, which was conducted directly on the mobile internet, has revealed a new internet audience.
More than 50% of Asian and African mobile internet users as well as more than 20% of users in developed markets, such as the UK and US do not use the internet on a PC.
The deck shows the profile of this new generation of internet users and is the first in a series of free quarterly reports.
Gf k online news consumption topline version.final marchRein Mahatma
Urban Indonesians consume news from multiple sources like smartphones, TV, and newspapers. Smartphones are the primary device for accessing online news. Consumption peaks during mid-day on weekdays and weekends. Entertainment and social issues are the most popular topics. Younger audiences prefer lighter topics, while older audiences are more interested in serious topics like politics. Males favor social issues, politics, and sports, while females are more interested in entertainment and beauty. Higher socioeconomic classes and older age groups are more frequent daily consumers of online news.
E marketer indonesia_online-a_digital_economy_emerges_fueled_by_cheap_mobile_...Nanda Ivens
This document discusses the growth of internet usage in Indonesia, fueled by increasing access to affordable mobile phones and smartphones. Some key points:
- Indonesia's online population is projected to reach 72.7 million people (29% of the population) by the end of 2013, growing to 102.8 million (39.8% of population) by 2016.
- Internet usage is concentrated in major cities but growing in smaller cities and rural areas as more people can afford mobile access.
- Fixed broadband penetration remains low at around 1.6% of households due to cost and infrastructure challenges, so mobile internet is driving overall growth.
- Smartphone adoption and usage is increasing rapidly thanks to cheap smartphones from China, reaching
The document summarizes the findings of a survey on millennials' career interests, preparedness, and online attitudes and behaviors. Key findings include:
- Millennials are interested in cybersecurity careers but lack knowledge of related job responsibilities and skills.
- Many had limited computer education and guidance in high school to prepare them for cyber careers.
- Millennials express online safety concerns but engage in risky digital behaviors like using public WiFi without passwords.
- To attract millennials to cybersecurity, more education is needed on career paths and skills required for related jobs.
Mobile report-white-paper-cisco11-520862Saurabh Verma
Global mobile data traffic grew 74% in 2015 and is projected to increase nearly eightfold by 2020 according to Cisco's annual mobile forecast. Key trends driving this growth include the rising number of mobile-connected devices, especially smartphones, which will account for nearly half of all devices by 2020. Video traffic continues to be the largest component, projected to be 75% of total mobile data traffic by 2020. 4G networks are also growing rapidly and will carry over half of mobile traffic by 2016, aided by increasing average connection speeds globally surpassing 3 Mbps by 2017.
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...IJMIT JOURNAL
This document discusses the need for a critical cyber defense strategy and privacy policy in Bangladesh. It summarizes the current state of cybersecurity in Bangladesh, including common vulnerabilities like malware infections and a lack of proper cybersecurity policies. It recommends that Bangladesh develop a strong national cybersecurity strategy to protect critical infrastructure from increasing cyber threats, and suggests implementing blockchain technology to create a decentralized and secure network architecture.
Components of a Model of Cybersecurity Behavior AdoptionCori Faklaris
Cori Faklaris presented a model for understanding the process of adopting or not adopting cybersecurity behaviors. Existing models focus on concepts like expectancy and value but do not account for time or how thinking evolves. Stage models break the process into chunks like stages of change. Faklaris proposes exploring whether there are two trajectories for adoption - mandatory behaviors imposed by authorities versus voluntary behaviors influenced more by peers. The goal is to specify stages to target security interventions more effectively and improve adoption of behaviors.
Tablet users have high expectations for web performance. Nearly 70% expect websites to load within 2 seconds. Poor experiences are common, with 4 in 10 users reporting issues like slow loading, crashes, or broken functions. This negatively impacts businesses, as nearly half will abandon a slow site and 46% will visit a competitor instead. To maximize engagement and revenue, organizations must provide fast, stable websites optimized for tablets.
Baidu Indonesia Research by GfK to capture Mobile Apps Market Potential in Indonesia.
Mobile Apps Market Study, Mobile Apps Potential, Mobile User Behaviour based on Apps, Mobile Market Indonesia, Mobile Apps Indonesia, Mobile Apps Market size Indonesia.
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...Marketing4eCommerce
Consumer privacy concerns remain extremely high, with 92% of US internet users worried about their privacy online. Businesses sharing personal information with other companies (58%) and companies tracking online behavior to target ads (47%) were the top reasons for increased concern. Despite media focus on government surveillance, only 38% cited this as a reason for higher concern. Consumer trust in businesses to protect privacy has fallen to 55%. As a result, consumers are less likely to click ads, use untrusted apps, or enable location tracking on smartphones. However, 75% are more likely to look for privacy certifications from companies.
Báo cáo xu hướng sử dụng kỉ thuật số của người tiêu dùng năm 2015Bui Thi Quynh Duong
This document provides a summary of key findings from the IAB Digital Usage Trend Report for full year 2015. Some of the main points include:
- Overall internet usage across computers, smartphones and tablets grew 3% in 2015, with much of the growth coming from increased mobile usage. Nearly two-thirds of all internet time is now spent on mobile devices.
- While most websites, pages and videos are still viewed via computer, mobile views increased 34% in 2015 and now account for about one-third of total internet views. Smartphones especially saw large usage growth.
- Top categories of usage differ by device, with portals, email and retail among top computer categories and radio, games and instant messaging among top mobile
In this research that is based on data from TNS Kantar and Factum Group we are looking and present-day trends in online video consumption in Ukraine and globally. What is the real volume of video consumption, how it changed compared to 2018, what are the specifics of the industry in Ukraine and what advertisers should keep in mind in order to conduct successful video campaigns? All these and many other questions in regards to video advertising are touched upon in our study.
Mary Meeker's 2014 Internet Trends report highlights key trends in internet usage and technology. Global internet and mobile internet users continue to grow rapidly, especially in developing markets, while mobile data traffic is increasing 81% annually. Tablet unit shipments increased 52% in 2013. Mobile advertising spending grew 47% to $7.1 billion in the US, though it still lags mobile app revenue. Cyber threats are also intensifying with the number of active threat groups rising to over 300. The report provides updates on technology stocks, education costs and outcomes in the US, and the potential for mobile advertising monetization.
The document discusses mobile app trends in China in 2013. It finds that:
1) The number of active smart devices in China exceeded 700 million by the end of 2013, with news, health/fitness, social networking, business and navigation among the fastest growing app categories.
2) Socializing apps through links to services like Weibo, WeChat and QQ is key to success, as app content sharing to social platforms tripled over the last 6 months of 2013.
3) High-end smartphones over $500 USD had a significant market share in China, and social networking apps were among the top growing categories as new forms of social media became popular.
Better Security Through Big Data AnalyticsSymantec
Think Big Data Analytics can't help you with your security? Do these stats make you nervous?
Attackers Moving Faster, defenses are not; 5 out of 6 large companies attacked; a 40% increase over 2013
More than 317 million new pieces of malware created last year; 1 million new threats created daily
60% of all targeted attacks struck small- and medium-sized organizations
Retail Remains Hot Spot for Identities: 1 billion stolen in the last 2 years; 59% of all identities exposed in 2014 came from the retail sector
Top 5 zero-days left companies without a patch for 295 days
Digital extortion on the rise: 113% increase in ransomeware; 45 times more people had their devices held hostage by vicious crypto-ransomeware
Malware gets smarter -- 28% of all malware was “virtual machine aware “
2014 had an all-time high of 24 discovered zero-day vulnerabilities
Kaspersky lab consumer_security_risks_survey_2015_engEmisor Digital
This document provides a summary of the key findings from the Consumer Security Risks Survey 2015 conducted by B2B International with Kaspersky Lab. The main findings include:
- Consumers use multiple devices like smartphones, tablets, laptops and desktops to access the internet for activities like email, social media, banking, entertainment and more.
- They store important personal information like passwords, financial data and photos on their devices. However, many fail to properly protect their privacy and security online.
- Digital devices are increasingly being lost, damaged or stolen, especially among younger users, resulting in hacked accounts, lost data and financial consequences in many cases.
- Both users and their acquaintances encountered
Philippines has been slow off the marks when it comes to smartphone penetration and mobile internet usage but it's starting to catch up fast.
Our report looks at the trends among the feature phone and smartphone users in the country of 97 million people.
Research from mobile survey company, On Device Research, which was conducted directly on the mobile internet, has revealed a new internet audience.
More than 50% of Asian and African mobile internet users as well as more than 20% of users in developed markets, such as the UK and US do not use the internet on a PC.
The deck shows the profile of this new generation of internet users and is the first in a series of free quarterly reports.
Gf k online news consumption topline version.final marchRein Mahatma
Urban Indonesians consume news from multiple sources like smartphones, TV, and newspapers. Smartphones are the primary device for accessing online news. Consumption peaks during mid-day on weekdays and weekends. Entertainment and social issues are the most popular topics. Younger audiences prefer lighter topics, while older audiences are more interested in serious topics like politics. Males favor social issues, politics, and sports, while females are more interested in entertainment and beauty. Higher socioeconomic classes and older age groups are more frequent daily consumers of online news.
E marketer indonesia_online-a_digital_economy_emerges_fueled_by_cheap_mobile_...Nanda Ivens
This document discusses the growth of internet usage in Indonesia, fueled by increasing access to affordable mobile phones and smartphones. Some key points:
- Indonesia's online population is projected to reach 72.7 million people (29% of the population) by the end of 2013, growing to 102.8 million (39.8% of population) by 2016.
- Internet usage is concentrated in major cities but growing in smaller cities and rural areas as more people can afford mobile access.
- Fixed broadband penetration remains low at around 1.6% of households due to cost and infrastructure challenges, so mobile internet is driving overall growth.
- Smartphone adoption and usage is increasing rapidly thanks to cheap smartphones from China, reaching
The document summarizes the findings of a survey on millennials' career interests, preparedness, and online attitudes and behaviors. Key findings include:
- Millennials are interested in cybersecurity careers but lack knowledge of related job responsibilities and skills.
- Many had limited computer education and guidance in high school to prepare them for cyber careers.
- Millennials express online safety concerns but engage in risky digital behaviors like using public WiFi without passwords.
- To attract millennials to cybersecurity, more education is needed on career paths and skills required for related jobs.
Mobile report-white-paper-cisco11-520862Saurabh Verma
Global mobile data traffic grew 74% in 2015 and is projected to increase nearly eightfold by 2020 according to Cisco's annual mobile forecast. Key trends driving this growth include the rising number of mobile-connected devices, especially smartphones, which will account for nearly half of all devices by 2020. Video traffic continues to be the largest component, projected to be 75% of total mobile data traffic by 2020. 4G networks are also growing rapidly and will carry over half of mobile traffic by 2016, aided by increasing average connection speeds globally surpassing 3 Mbps by 2017.
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...IJMIT JOURNAL
This document discusses the need for a critical cyber defense strategy and privacy policy in Bangladesh. It summarizes the current state of cybersecurity in Bangladesh, including common vulnerabilities like malware infections and a lack of proper cybersecurity policies. It recommends that Bangladesh develop a strong national cybersecurity strategy to protect critical infrastructure from increasing cyber threats, and suggests implementing blockchain technology to create a decentralized and secure network architecture.
Components of a Model of Cybersecurity Behavior AdoptionCori Faklaris
Cori Faklaris presented a model for understanding the process of adopting or not adopting cybersecurity behaviors. Existing models focus on concepts like expectancy and value but do not account for time or how thinking evolves. Stage models break the process into chunks like stages of change. Faklaris proposes exploring whether there are two trajectories for adoption - mandatory behaviors imposed by authorities versus voluntary behaviors influenced more by peers. The goal is to specify stages to target security interventions more effectively and improve adoption of behaviors.
Tablet users have high expectations for web performance. Nearly 70% expect websites to load within 2 seconds. Poor experiences are common, with 4 in 10 users reporting issues like slow loading, crashes, or broken functions. This negatively impacts businesses, as nearly half will abandon a slow site and 46% will visit a competitor instead. To maximize engagement and revenue, organizations must provide fast, stable websites optimized for tablets.
Baidu Indonesia Research by GfK to capture Mobile Apps Market Potential in Indonesia.
Mobile Apps Market Study, Mobile Apps Potential, Mobile User Behaviour based on Apps, Mobile Market Indonesia, Mobile Apps Indonesia, Mobile Apps Market size Indonesia.
TRUSTe 2014 US Consumer Confidence Privacy Report Consumer Opinion and Busine...Marketing4eCommerce
Consumer privacy concerns remain extremely high, with 92% of US internet users worried about their privacy online. Businesses sharing personal information with other companies (58%) and companies tracking online behavior to target ads (47%) were the top reasons for increased concern. Despite media focus on government surveillance, only 38% cited this as a reason for higher concern. Consumer trust in businesses to protect privacy has fallen to 55%. As a result, consumers are less likely to click ads, use untrusted apps, or enable location tracking on smartphones. However, 75% are more likely to look for privacy certifications from companies.
Báo cáo xu hướng sử dụng kỉ thuật số của người tiêu dùng năm 2015Bui Thi Quynh Duong
This document provides a summary of key findings from the IAB Digital Usage Trend Report for full year 2015. Some of the main points include:
- Overall internet usage across computers, smartphones and tablets grew 3% in 2015, with much of the growth coming from increased mobile usage. Nearly two-thirds of all internet time is now spent on mobile devices.
- While most websites, pages and videos are still viewed via computer, mobile views increased 34% in 2015 and now account for about one-third of total internet views. Smartphones especially saw large usage growth.
- Top categories of usage differ by device, with portals, email and retail among top computer categories and radio, games and instant messaging among top mobile
In this research that is based on data from TNS Kantar and Factum Group we are looking and present-day trends in online video consumption in Ukraine and globally. What is the real volume of video consumption, how it changed compared to 2018, what are the specifics of the industry in Ukraine and what advertisers should keep in mind in order to conduct successful video campaigns? All these and many other questions in regards to video advertising are touched upon in our study.
Mary Meeker's 2014 Internet Trends report highlights key trends in internet usage and technology. Global internet and mobile internet users continue to grow rapidly, especially in developing markets, while mobile data traffic is increasing 81% annually. Tablet unit shipments increased 52% in 2013. Mobile advertising spending grew 47% to $7.1 billion in the US, though it still lags mobile app revenue. Cyber threats are also intensifying with the number of active threat groups rising to over 300. The report provides updates on technology stocks, education costs and outcomes in the US, and the potential for mobile advertising monetization.
The document discusses mobile app trends in China in 2013. It finds that:
1) The number of active smart devices in China exceeded 700 million by the end of 2013, with news, health/fitness, social networking, business and navigation among the fastest growing app categories.
2) Socializing apps through links to services like Weibo, WeChat and QQ is key to success, as app content sharing to social platforms tripled over the last 6 months of 2013.
3) High-end smartphones over $500 USD had a significant market share in China, and social networking apps were among the top growing categories as new forms of social media became popular.
Better Security Through Big Data AnalyticsSymantec
Think Big Data Analytics can't help you with your security? Do these stats make you nervous?
Attackers Moving Faster, defenses are not; 5 out of 6 large companies attacked; a 40% increase over 2013
More than 317 million new pieces of malware created last year; 1 million new threats created daily
60% of all targeted attacks struck small- and medium-sized organizations
Retail Remains Hot Spot for Identities: 1 billion stolen in the last 2 years; 59% of all identities exposed in 2014 came from the retail sector
Top 5 zero-days left companies without a patch for 295 days
Digital extortion on the rise: 113% increase in ransomeware; 45 times more people had their devices held hostage by vicious crypto-ransomeware
Malware gets smarter -- 28% of all malware was “virtual machine aware “
2014 had an all-time high of 24 discovered zero-day vulnerabilities
Kaspersky lab consumer_security_risks_survey_2015_engEmisor Digital
This document provides a summary of the key findings from the Consumer Security Risks Survey 2015 conducted by B2B International with Kaspersky Lab. The main findings include:
- Consumers use multiple devices like smartphones, tablets, laptops and desktops to access the internet for activities like email, social media, banking, entertainment and more.
- They store important personal information like passwords, financial data and photos on their devices. However, many fail to properly protect their privacy and security online.
- Digital devices are increasingly being lost, damaged or stolen, especially among younger users, resulting in hacked accounts, lost data and financial consequences in many cases.
- Both users and their acquaintances encountered
Let’s understand about the “2017 Norton Cyber Security Insights Report”, the main topics of this reports are Cybercrime by the Numbers, Portrait of a Cybercrime Victim, Consumers’ Contradicting Beliefs, and State of Consumers’ Trust.
Entefy's research report on information overload and digital complexityEntefy
Entefy conducted a survey of 1,500 professionals in the U.S. What we found were surprising insights into digital complexity, app fatigue, and information overload.
The document discusses the risks youth face from internet and cybercrime. It notes that internet usage has expanded greatly among teens and youth who rely on it for personal, academic and employment purposes. However, this increased dependence brings new cyber security threats. It is important that youth, as well as their parents, teachers and caregivers understand these risks in order to protect personal information and avoid accessing inappropriate content unwittingly. Educating all parties about cyber risks and safety measures is vital.
The document discusses how digital technology and internet access has changed over time and impacted consumers. It notes that global internet users increased from less than 1% of the population in 1995 to 46.1% in 2016. Fiber optic cables have replaced slower copper wires, increasing internet speeds. Today's consumers are heavily engaged with digital devices like smartphones, accessing the internet daily for information, communication, entertainment and online shopping. Popular online activities include social media usage, video consumption which averages 70 minutes per day, and e-commerce, with clothing being a top online purchase. As technology evolves rapidly, modern consumers are defined by their constant connectivity through portable devices.
Understand the cross-device consumer in just 15 minutesJim Nichols
To get the most out of your marketing and advertising programs, it’s essential that you understand today’s consumer and the multi-device phenomenon of how they connect, communicate, shop and buy. Get the facts about cross-device consumer behaviors, and then four tips on how to use them to your brand advantage.
Cross-device usage
Mobile’s share of total connected time
The "mobile-only" and "mobile-mostly" connected consumer
Cross-device purchasing
Download this compelling information today so you can develop a cross-device strategy that delivers better ROI.
Understand the cross-device consumer in just 15 minutesConversant, Inc.
To get the most out of your marketing and advertising programs, it’s essential that you understand today’s consumer and the multi-device phenomenon of how they connect, communicate, shop and buy. Get the facts about cross-device consumer behaviors, and then four tips on how to use them to your brand advantage.
Cross-device usage
Mobile’s share of total connected time
The "mobile-only" and "mobile-mostly" connected consumer
Cross-device purchasing
Download this compelling information today so you can develop a cross-device strategy that delivers better ROI.
The survey found that Romanians own smartphones and tablets the most, with 87% owning smartphones and 58% owning tablets, while only 28% still own mobile phones. Most respondents check their mobile devices frequently throughout the day, with 52% looking at their devices between 11-50 times per day and 22% looking over 200 times. Video content is popular, with 37% watching 1-5 videos per week and 21% watching over 15 videos per week on their mobile devices.
In this talk to medical librarians (conference website: https://3bythesea.pbworks.com/Program), Lee Rainie covered how e-patients and their caregivers have become a force in the medical world. In addition, he looked at the many ways that e-patients are using the internet to research and respond to their health needs and to share their stories using social networking sites, blogs, Twitter, and other social media.
Lee also discussed how medical librarians can exploit Pew Internet’s tech-user typology to find new ways for engaging e-patients and their families.
With their frequent and wide-ranging use of the internet, netizens might appear to be creating an exclusive subculture. However, a new study by Ericsson ConsumerLab entitled The Networked Life shows that netizens are forerunners of a networked lifestyle that is being embraced by 82 percent of consumers.
The Three Connected Ireland Report examines how Irish people use mobile technology in their daily lives across three themes: The Connected Life, The Connected Business, and The Connected Citizen. Some key findings:
- People rely on their smartphones for communication, banking, maps, weather, and streaming services. Facebook is a primary source for news.
- Smartphones are seen as helping relationships, work, learning, and relaxation. Nearly half of respondents aim to improve health and fitness with smartphone apps.
- The Connected Business section looks at online shopping habits and engagement with businesses, brands, and services through mobile devices.
- The report is based on a survey of 1,000 Irish smartphone users and
The document summarizes the findings of a global study on consumer confidence and trust in mobile technologies. It found that while mobile device usage is widespread, many users lack confidence in the security of their devices and the networks and services they access. The rapid growth of mobile threats has not been matched with adequate security precautions by users. Building greater trust will require coordinated efforts across the entire mobile industry to address security and reliability issues.
The document summarizes a survey conducted on cybersecurity habits of RMIT university students in Melbourne. The key findings are:
1) Most students are aware of cybersecurity but tend to ignore risks and give out personal information like email and birthdate. Many use the same passwords across accounts.
2) The target audience for a cybersecurity awareness campaign is RMIT students in Melbourne aged 18-30 across all genders. Students understand risks but trust that nothing bad will happen and may give out info for deals.
3) The campaign timeline is semester 1 of 2019, running escalator ads, webcam covers, social media posts and digital posters/videos from weeks 2-12. The proposed budget is $33
The rise of Cross Platform Media Consumption in US : 70% of digital users ...Sumit Roy
Users are now moving across their digital screens, From PC to mobile to Gaming device to their Tablets or Kindle... The increasing duplication of users across devices .. is a huge challenge to Brands .The digital universe that accesses the internet via PC or mobile device has grown to over 200
million people in the U.S. alone. As the number of connected adults has grown, so have the amount of cross-screen users. In fact, 70% of digital users are now cross-device, up from 63% a year ago.% during the same period
Since 1985, CTIA has tracked the evolution of the U.S. wireless industry with a comprehensive annual survey. Our 2019 Annual Survey report provides an in-depth look at the facts and figures that tell the story of America’s wireless industry.
The story of the past year begins with unprecedented consumer demand.
In 2018, wireless use was up across nearly every metric we track—from voice minutes, to text messages, to data use.
The deployment of 5G has the potential to facilitate and accelerate the digitalisation of society. By enhancing existing mobile and fixed communications services and enabling a range of new solutions (e.g. augmented/virtual reality, analytics supported by artificial intelligence), it promises to have significant impact on consumer experiences, business processes and operator revenue models. This white paper gives operators an overview of the key business and technology drivers of 5G maturity, which emerged from the study, and recommendations for how to adopt the best practices of the 5G leaders. This will be a valuable tool to help them to assess how far their plans are focused on the right drivers, and how to improve their current business and technology maturity to achieve the best results from 5G.
US groups emerge as the driving force behind the increasing internationalisation of the European television sector. The following report looks at this particular development through three different angles. The first focuses on the concentration and fragmentation tendencies in the various European national audience markets, identifying the contraction of audience shares among top players and an audiovisual market characterised by a large number of TV channels with relatively small market shares. The second angle looks at the market power of non-domestic TV channels in national markets, noting the extent to which foreign groups exert considerable market power in a majority of European countries. The third angle highlights the growing footprint of US groups in the European audiovisual sector by tracking the broadcasting activities of the major groups and comparing their European audience market shares across the various markets.
The world is poised on the brink of the 5G revolution. We're already seeing early commercial launches in leading mobile regions. While the majority of operators in mature markets are planning to upgrade in the next couple of years, 5G is likely to take several years to reach the average consumer, due to spectrum availability and the sheer time and costs involved in rolling out the next generation of mobile networks.
The document provides an overview and outlook of mobile subscriptions and technologies through 2024 based on Ericsson's Mobility Report from June 2019. Some key points:
- By the end of 2019, over 10 million 5G subscriptions are projected worldwide. 5G subscription growth is expected to be faster than LTE initially.
- 5G network deployments will ramp up in 2020, paving the way for 1.9 billion 5G subscriptions by the end of 2024, over 20% of total subscriptions.
- LTE will remain the dominant mobile technology through 2024 with nearly 5 billion subscriptions, though its peak is projected to be 2022.
- Cellular IoT connections using NB-IoT and Cat
Over the past decade, numerous discussions
have highlighted the essential role that
Internet connectivity plays in driving
fundamental changes in economic and social
development.
This paper presents new data on
existing levels of service in LMICs
and the policy and regulatory
steps that governments and their
partners can employ to improve
the quality of those services. It
represents the first in a series of
research designed to understand
what constitutes meaningful
access, i.e., the level of service
quality needed for people to access
the internet in a way to improve
their lives. Further research on this
issue will be published in 2019.
Technology is promising more advantages than ever before. People want things to be cheaper, faster, more convenient and
delivered to their doors at no extra cost.
This document provides a summary of the 2018 report by the UN Broadband Commission titled "The State of Broadband: Broadband catalyzing sustainable development".
The report acknowledges contributions from a range of commissioners and organizations. It evaluates growth in broadband using the commission's targets of making broadband policy universal, affordable, getting people online, improving digital skills and literacy, expanding digital financial services, and getting businesses online. The report also examines how advanced digital technologies can support education, health, and the environment to promote sustainable development. It provides recommendations to boost broadband, such as building national leadership, promoting training, reviewing regulations, and reducing taxes on telecom equipment.
The document summarizes findings from the 2018 Pay-TV Innovation Forum exploring key developments affecting the pay-TV industry. It finds that competition is intensifying from OTT services and other providers. Pay-TV subscriptions are plateauing in most markets as viewers increasingly access content on multiple screens. To grow, pay-TV providers will need to offer more flexible packages, improve the user experience across devices, and potentially act as aggregators amid an fragmented landscape. The top innovation priorities are product and commercial changes, improving the operating model, and investments in technology platforms.
The 2018 Nielsen Video 360 Report provides an in-depth analysis of consumers' home entertainment and video viewing behaviors using survey data from 2,000 US respondents. The report examines how consumers discover, purchase, download and stream video content across different platforms and devices. It also compares these behaviors between general audiences and fans of superhero and family movie franchises, finding that franchise fans engage with video content more actively. The full report offers comprehensive consumer insights to help brands understand changing video consumption trends.
The amount of time individuals spend with social networks continues to increase, especially with the proliferation of newer platforms like Instagram and Snapchat. US adults averaged approximately 51 minutes of daily time with social networks
in 2017. eMarketer has curated this Roundup of articles, insights and interviews to help you reach social media users effectively.
Using proven science to understand consumer media behavior is something Nielsen is unrivaled at doing. This is especially true when we look at shifting behaviors beyond the here and now.
Consciente de la importancia de los datos y el conocimiento del mercado para la toma de decisiones, la CRC elabora desde el año 2012 el Reporte de Industria TIC, que permite a los lectores conocer el desarrollo y crecimiento del sector de telecomunicaciones y postal en Colombia, así como los resultados de algunas de las políticas adoptadas por la Comisión.
The document outlines Arcep's 5G work programme in France, which aims to make France a leader in 5G. Key points include:
- Freeing up spectrum bands such as 3.4-3.8 GHz and 26 GHz for 5G and defining allocation procedures.
- Preparing for 5G rollouts by developing backhaul solutions, facilitating network sharing and small cell deployment.
- Galvanizing stakeholders from various sectors to test 5G applications through full-scale pilots.
- Anticipating 5G impacts, clarifying technical issues and informing stakeholders through workshops, trials and a dedicated website.
- Authorizing initial 5G trials in cities while expanding the trial program to support innovative use cases
Audio plays an important role in the daily lives of hundreds of millions of Americans, and that listening audience is as varied and diverse as our nation. Music and talk entertainment, news and information, podcasts, details of cultural and community importance; all of this audio-based content is available on multiple platforms and devices as the listening landscape continues to grow.
Broadband Internet offers significant benefits for Least Developed Countries (LDCs), as a transformational tool to help overcome their vulnerabilities, grow their economies and enhance the livelihoods of their citizens. As the 2030 Sustainable Development Agenda notes: “The spread of information and communications technology and global interconnectedness has great potential to accelerate human progress...”. This report reviews experiences leveraging broadband infrastructure for development in four LDCs: Cambodia, Rwanda, Senegal and Vanuatu.
The aim of this study is to explore the impact of different technical solutions for Cooperative Intelligent Transport Systems (C-ITS) communication solutions on EU road safety over time. Three different communication solutions are assessed independently and consist of:
- Cellular vehicle-to-everything (C-V2X) communication based on the evolved LTE technology as defined by 3GPP (a global cellular specifications body), divided into two solutions:
o LTE-PC5: Communication solution that uses direct-mode communication between vehicles, road users and infrastructure operating in ITS bands (e.g. ITS 5.9 GHz)
independent of cellular network; o LTE-Uu (cellular): Network-based communications interface (Uu) operating in the
traditional mobile broadband licensed spectrum;
- 802.11p1 a Wi-Fi technology that supports Vehicle-to-vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications based on IEEE 802.11p and uses direct-mode communication operating in the ITS band of 5.9 GHz.
In 2017, the global recorded music market grew by 8.1%. This was the third consecu- tive year of global growth and one of the highest rates of growth since IFPI began tracking the market in 1997. Revenues increased in most markets and in eight of the global top 10 markets.
Most companies, governments and organizations are still woefully unprepared for what’s coming next in mobile. Sooner than you think, almost everyone on Earth will be connected
to everyone else. Everyday objects
are already being connected to form a vast Internet of Things. Our world has become an expanding ecosystem of people, devices and systems – soon to be turbocharged with near zero-latency 5G. If you think mobile has changed everything already, you haven’t seen anything yet.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
2. 2
Introduction
This year we have reached the stage where 50% of the world’s population is connected to
the Internet, compared to 40% in 2016. And, with more people online than ever before, every
minute that goes by witnesses 3.5 million Google search queries, $751,522 spent, 156 million
emails sent, 342,000 apps downloaded in mobile app stores and 46,200 posts uploaded to
Instagram.
There’s no doubt that our Internet habits are constantly evolving. And, unfortunately, attackers
are carefully monitoring any trends in how we live our digital lives to devise new ways to profit
from their crimes and our vulnerabilities.
With this in mind it’s important for us to evaluate the changing Internet landscape ourselves,
so that we can stay one step ahead of the cybercriminals and continue to develop security
solutions that support our customers.
Kaspersky Lab, with help of B2B International, therefore regularly conducts global statistical
studies, identifying areas where Kaspersky Lab can help support people as they spend an
increasing amount of their time online. This is an important part of our mission to help Internet
users protect what matters most to them.
3. 3
Main findings
People don’t log onto the Internet anymore, they are simply online all the time
• Outside of work, the vast majority (86%) are online several times a day and one in ten (11%) is online for over 50 hours
a week
• To spend so much time online, people use multiple devices simultaneously – with the use of mobiles rising to 75%
this year and wearables rising to 31%
• But being mobile and online brings its own Internet safety problems and Internet users don’t protect their different
devices in the same way – 89% protect their computers with a security solution but only 56% protect their smartphone
Our favourite thing about the Internet, is the way it connects us to the world
• Emailing from personal accounts is still the most popular thing to do online (96% said they email from any device).
Also popular is watching videos (88%), reading news or visiting current affairs websites (86%) and using social media –
all helpful ways, for example, of staying in touch with friends and seeing what’s happening in the world (85%)
• But many of us (53%) use public Wi-Fi in the process, risking the interception or theft of data and only 44% do this with
some precautions
We rely on mobile devices to store the data we love, but precious data is being left vulnerable, and often
cannot be recovered if lost
• Photos and videos of travel are rated as the most important data on people’s mobile devices (18%)
• However, if data from a device was lost – for example if a user’s device was misplaced, stolen, damaged or hacked,
21% would never be able to recover their precious files
• When data can be recovered, the average cost of replacing it is $636
• This is partly because just 50% back up their information
There are significant concerns about our cyber-happiness
• Safety concerns and security incidents affect people’s happiness online. One in four (27%) have been affected by
an online security incident of some kind in the last year
• In addition, the majority (62%) are concerned about someone else intercepting their data through their Internet
connection
• And people are also concerned about their vulnerable family members – with 65% of parents worried for the safety
of their children using the Internet and 60% overall being concerned about their older relatives using the Internet
But people – despite their concerns – don’t know how to protect themselves
• Despite over half (55%) believing that the number of threats to their online security are increasing significantly,
an astounding 38% don’t know how to protect themselves from cybercrime
• Furthermore, one in five (21%) don’t believe security software is essential, seeing it as a gimmick instead
4. 4
Methodology
The study was conducted online by B2B International in August, 2017. Users from 32 countries were surveyed online.
A total of 21,081 people, split equally between men and women, were surveyed.
Data was weighted to be globally representative and consistent. The global data in this report excludes findings from China.
Not all of the survey results have been included in this report. To find out more please contact Kaspersky Lab.
Colombia
(509)
Brazil
(510)
Spain
(512)
Mexico
(503)
USA
(1010)
Russia
(1018)
Belarus
(497)
Denmark
(502)
Netherlands
(501)
Poland
(510)
Czech
Republic
(502)
South Africa
(500)
China
(1010)
Kazakhstan
(504)
UAE
(511)
Turkey
(505) India
(516)
Japan
(510)
Portugal
(513)
Italy
(524)
Indonesia
(511)
Vietnam
(501)
Singapore
(760)
Norway
(499)
Israel
(503)
UK
(1001)
Germany
(1010)
France
(1095)
Sweden
(510)
Australia
(1499)
Malaysia
(508)
Belgium
(1017)
5. 5
Section one: online mobility
The Internet has become a vital part of our lives. We don’t log on to it anymore. Instead, we’re constantly on. Switched
on, and connected. Demonstrating this, our study found that 86% of people are online several times a day at home, not
including the time they spend online at work. Furthermore, two-thirds use the Internet at home for more than ten hours
a week, and one in ten (11%) is online for over 50 hours a week.
People access the Internet on an array of devices – from desktop PCs to tablets and smartphones. This year we’ve noticed
a decrease in the use of computers to go online, dropping from 91% in 2016 to 86% in 2017. Nevertheless, by far the most
popular device with which to access the Internet is still a Windows PC (81%).
Connected dexterity has been an important feature of 2017, with people using multiple devices and platforms that access
the Internet simultaneously. Over half (60%), for example, use a PC or a Mac alongside a mobile device and 31% has some
kind of connected device in their household such as doors, climate control, medical equipment etc. that uses the Internet
to operate.
The use of mobiles has continued to increase – with 75% of people using these devices to access the Internet in 2017,
up from 67% in 2017. Furthermore, 41% prefers to use their mobiles when they are at home, an environment where they
may have access to alternative connected devices such as a desktop which might have a larger screen or greater storage
capabilities.
Other moving technologies are also being used for accessing the Internet. Wearables, for example, are gaining popularity
with 31% owning some kind of wearable device (compared to 24% last year). And, of those who have their own car, 14%
of these cars are connected to the Internet.
Although they use and own multiple devices that access the Internet, people don’t worry about protecting every device
in the same way. Only 89% protect the computers they use to go online with Internet security software and only 56%
protect their smartphones. Less than half (48%) have a password or other form of lock on their mobile devices and only
22% use anti-theft, leaving the mobiles and data on them accessible to anyone. This is concerning, given that mobiles are
gaining in popularity and as many as 6% has had their device lost or stolen, in the last 12 months.
Being mobile and online brings its own Internet safety problems. Our 2017 data shows that Internet users this year have
become more concerned about sharing information about their location when using their smartphones, or indeed other
connected devices (61% compared with 39% previously). However, there is still a lack of awareness among users around
how smartphones actually access location data, with just 53% checking permissions on their mobile devices, although
many apps are able to access location data while they work in the background – without the knowledge of owner.
Windows Mobile devices
Mac computers
iOS devices
Any tablets
Android devices
Any smartphones
Any mobile devices
Windows computers
Any computers 86%
81%
75%
68%
55%
34%
27%
9%
5%
Devices used to go online in 2017
6. 6
Section two: online and active
People get up to a lot online – from shopping for daily essentials to entertaining themselves in their spare time – and they
do this on multiple devices. For transactional activities such as shopping and banking, they tend to use their desktops, but
are more likely to turn to their smartphones for entertainment.
For example, 64% of people use their desktop/ laptop PC to shop online making online payments and a third that number
(33%) shop this way on their smartphones. Similar numbers bank online, with their desktops and smartphones respectively.
However, the pattern is different around gaming, with a third using both their computer (34%) and their smartphone (27%).
The study shows that overall, our favourite online activities allow us to connect with the world around us. Emailing from
personal email accounts is still the most popular thing to do online (96%), followed by watching videos (88%), reading news
or visiting current affairs websites (86%) and using social media (85%).
Accessing personal e-mail accounts
Watching videos
Reading news/visiting current affairs sites
Using social media sites
Online shopping using a credit/debit card
or online payment system
Online banking
Downloading software/applications
Instant messaging/video calling
Using online payment systems/wallets
Buying tickets or booking hotels online
Uploading/sharing content to picture- music-
or video-sharing websites or with other people
Online shopping for goods or services
with payments made offline
Listening to streaming music/radio
Watching films/TV shows online
Online data storage
Downloading music, films, videos
on P2P networks etc.
Online gaming
Accessing work e-mail accounts
Visiting adult websites
Visiting online dating websites/services or apps
Connecting to my employer’s network
Trading securities/shares online
Online gambling/betting
57%
50%
48%
55%
33%
35%
45%
43%
28%
24%
40%
27%
36%
23%
29%
22%
27%
24%
17%
17%
11%
8%
9%
75%
65%
61%
58%
64%
59%
56%
40%
48%
50%
42%
46%
35%
45%
39%
39%
34%
39%
27%
20%
23%
19%
15%
96%
88%
86%
85%
82%
79%
78%
69%
66%
65%
65%
62%
59%
59%
57%
54%
53%
49%
38%
32%
31%
25%
23%
Smartphone
Computer
Any device
Internet users’ most popular online activities
7. 7
Online gaming remains popular among Internet users, with 53% agreeing that they game online. This activity is most
popular among younger users (67%) compared with older users (25%).
Online activities don’t just change according to device type, the study also shows us patterns in how people access the
Internet – with many using potentially insecure public Wi-Fi services to conduct a wide variety of their online activities.
53% use public Wi-Fi, with 88% of these conducting risky activities in the process, putting their data in danger
of interception or theft. For example, 64% access social media via public Wi-Fi, 23% log into their gaming accounts
this way, 38% log into websites/ accounts without additional precautions and one in four (26%) even conduct online
transactions (such as banking, shopping or payments).
Only a quarter (26%) said they always behave more securely when they are using new and potentially insecure Wi-Fi –
for example in a hotel or public place – to access the Internet while 56% do nothing to protect themselves from public
Wi-Fi at all.
Section two: online and active
8. 8
Section three:
a treasure trove of memories
Perhaps it’s no surprise that the people that own Android or iOS devices such as smartphones, tablets etc, are relying
on these to store a wide range of data – some of which is particularly sensitive, such as work files, passwords, and videos
or photos of their children, which users wouldn’t want to fall into the wrong hands.
Data stored on Android or iOS devices
Passwords for work VPN / intranet access
Scans of sensitive documents i.e.:
passport, driver’s license, insurance
Other payment credentials
Banking details
Passwords for your work email account
Private and sensitive photos and videos of
other people
Files for work use
Private and sensitive photos
and videos of myself
Passwords for personal e-mail accounts
Passwords for personal online accounts
Photos and videos of my children
Other photos or videos
Photos and videos of travel 72%
69%
51%
42%
42%
38%
34%
32%
31%
28%
28%
22%
18%
Data stored on Android or iOS devices
There was an awareness among our survey respondents that the data they store on their devices is important to them.
Photos and videos of travel (18%), address books/ phone contacts (18%), personal files (17%), and personal email messages
(16%) were rated the most important data stored on people’s devices.
Yet, despite the data on their devices being important, we also found that many are not putting precautions in place
to protect that data, with too few (just 50%) backing up the information on their devices.
Not putting precautions in place leaves precious data vulnerable to being lost forever – for example, despite photos and
videos of travel being rated as the most important data stored on their mobile devices, if these files were lost, 28% would
never be able to recover them. Furthermore, it’s expensive when it all goes wrong – the average cost of replacing data,
should people lose access to their devices, is $636. There is clearly more work for us to do, if we are to help people avoid
these problems.
9. 9
Section four:
threats to our cyber-happiness
It’s evident that digital devices have been thoroughly engrained into our lives. But they are not without their problems
and, as we rely on these devices more and more to access the Internet, connect with the outside world, and store data
that is important to us, security incidents that put these devices under threat can have a devastating impact. Threats to our
cyber-happiness are by no means insignificant, with one in four (27%) been affected by an online security incident of some
kind in the last year.
Threats are wide-ranging and harmful, and this section of the report highlights the impact of some of the most prevalent
cyberthreats.
Cyber incidents experienced in the past 12 months
Any above
Device was used for cyberattacks
Data was shared/leaked inappropriately
by a third party
Device hacked
Data was intercepted while using my
device/connection
Experienced financial fraud
Infected with ransomware
Tricked into sharing private
or sensitive details
Online account was hacked
Infected with virus/malware 17%
7%
6%
6%
5%
5%
5%
4%
4%
27%
Malware
2017 was a year characterised by high profile cyber-attacks and malware developments, with 37% of Internet users having
either experienced, or been targeted by, a virus or malware this year. When they’ve been a victim, 36% have incurred
financial penalties and this was $118 in average, making this cyberthreat a painful one to be targeted by.
Ransomware
This year has also seen several worrying ransomware threats, with some (such as WannaCry) hitting the headlines and
crippling businesses around the globe, making consumers much more aware of the threat generally. We found that one
in six (16%) have either experienced or been targeted by ransomware. Plus, when they have been a victim, only 30% have
managed to restore all of their encrypted or blocked files, one in three (34%) have ended up paying a ransom to criminals
to get their files released – and this isn’t cheap, on average, a ransom costs victims $271.
10. 10
Section four:
threats to our cyber-happiness
Hacking accounts
Around one in six people (17%) has either experienced or been targeted by account hacking in the last year. Of those who
have had their accounts hacked, 41% has had their email account targeted, 37% has had their social media account hacked,
18% has had their banking accounts targeted, and 16% has had their gaming account hacked. Account hacking can earn
criminals money on the black market – for example, hacked gaming accounts can fetch $1 each, so it’s a potentially
lucrative area for criminals that can hack and sell on mass.
Data leaks
With consumers entrusting so much information to third parties – for example financial data such as card payment details,
passwords, and personal information such as addresses, birthdays and more, data leaks are a threat – and unfortunate
reality – of today’s cyber landscape. Where data has been leaked inappropriately, in one in three cases (30%) people’s banks
have been responsible, 29% has had data leaked by their social media company, and a quarter has had data leaked by their
email account provider (25%).
Fraud
Financial fraud or scams are another unfortunate reality of today’s cyber landscape, with over one in ten (12%) either
being targeted by, or experiencing financial fraud in the last 12 months. Moreover, when they have been a target of fraud
or an online scam, the average losses have been calculated at $430, with 27% losing more than $1000.
11. 11
Section five:
attitudes towards cybersecurity
Despite the high costs involved in data recovery if it all goes wrong, and number of people that have fallen victim to
cybercrime in the last 12 months, a surprisingly low one in five (21%) believes they could be a target for cybercrime. Internet
users do have some very real concerns about their online security, but in many instances these concerns do not amount to
them feeling personally targeted.
Internet users are most concerned that someone else could intercept their data by gaining access to their Internet
connection (62%). This is swiftly followed by the fear of someone hacking a device and using it as their own remotely.
The concerns of Internet users
The concerns of Internet users
Security software isn’t as essential as the
software companies imply – it’s a gimmick
I don't know how to protect
myself from cybercrime
I get annoyed when I’m asked to go through
additional identity authorization steps online
I feel I have no control on where my data
(search requests, opened links,
sent messages, files) goes
I fear someone can track me down using
the geolocation from my device
I am afraid someone will use my online
credentials to commit crime
I am worried someone could watch me
on my devices’ camera/webcam
without me knowing
I am worried about my security/privacy
being affected by 'smart' devices
(e.g. Smart TVs, cars etc.)
The number of threats to my security online
is increasing significantly
I am very concerned that someone can
see everything I do/ watch on my device
I worry my online activities are constantly
tracked by the websites/services that I visit
I worry someone can get remote access
to private files on my device
I am uncomfortable with sharing location
information with websites/applications
I am afraid someone can hack my device
and use it as their own remotely
I am concerned people could access my
Internet connection and intercept my data
62%
62%
61%
60%
60%
56%
55%
54%
51%
51%
50%
47%
42%
38%
21%
12. 12
Section five:
attitudes towards cybersecurity
Despite over half (55%) believing that the number of threats to their online security are increasing significantly,
an astounding 38% don’t know how to protect themselves from cybercrime, and one in five (21%) don’t believe security
software is essential, seeing it as a gimmick instead.
Only around half actually put any methods in place to help protect themselves from cybercrime and these range from
using passwords to prevent other people from accessing their Wi-Fi networks (59%) to going to the extremes of avoiding
popular websites such as Facebook and Google, because they are worried about these organisations collecting data
about them (14%).
How Internet users protect themselves
How Internet users protect themselves
I try to avoid using popular websites like
Google and Facebook because of the
personal information they gather about me
I change my online account passwords when
I access them from somebody else’s device
I store all my most sensitive data on
devices which don’t access the Internet
I avoid sending personal emails
from my work account
I use a special separate email address
when signing up to online services
I don’t log-in on websites before I
thoroughly check their safety
I make sure I enforce high privacy settings
on social websites and in my browser
I never store important information in the
cloud (e.g. online backup) in case people
can access/intercept it
I only perform financial transactions on trusted
devices, over a trusted internet connection
I password protect my Wi-Fi network to
prevent people from accessing my data 59%
51%
37%
32%
27%
25%
25%
24%
18%
14%
There is an acceptance among Internet users about the importance of using passwords to protect themselves from
cybercrime – 52% said that if a cybercriminal managed to get access to the personal information on their devices, they
would be most concerned about their account passwords falling into the wrong hands. These, after all, are the key
to unlocking private data.
But Internet users, on the whole, do not treat their passwords appropriately. Only just over half (62%) would be able to
quickly restore their personal online account passwords if they lost their devices, despite respondents to our survey
generally accepting that passwords are more valuable than ever before – because they protect finances, online payments,
shopping and more.
31% have just a few passwords that they choose from when creating new accounts, 13% use a template or regular pattern that
they modify to create new passwords and 10% stick to just one password that, once hacked, could unlock everything.
Furthermore, many have done something risky with their passwords, such as sharing their passwords (with a family
member (29%), friend (11%) or colleague (5%), and 51% store their passwords insecurely by, for example, writing them down
in a notepad or in a public place.
13. 13
Section six: family matters
People’s Internet concerns are not just limited to worries about their own safety online, they also worry about the safety
of their loved ones – in particular older relatives and children who may be vulnerable to cybercrime because they are less
aware of the dangers and thus more exposed.
Children
To find out more about these concerns, our study questioned parents with kids under the age of 18. 65% of these parents
agreed that their kids use the Internet and that they are concerned about their safety. Furthermore, over half of parents are
concerned that their children have uncontrolled access to inappropriate content online (57%), that using the Internet can
negatively affect their health (53%), and that online threats to their kids are increasing (51%).
Parents are most concerned about their children seeing inappropriate or explicit content online (36%), becoming addicted
to the Internet (33%), or communicating with strangers (32%) who might be dangerous. 32% of parents are also concerned
that their kids may become the victims of cyberbullying.
The sad reality is that young people do come across harm online. Almost half (41%) have recently faced at least one form
of online threat. One in ten parents said their children have become addicted to the Internet (12%) and the same number
have seen inappropriate/ explicit content online (12%), shared too much information about themselves (8%) or encountered
malicious software/ viruses (10%). Of course, these stats only include what parents know about their children’s experiences
online and the true figures may in fact be higher than these.
The threats faced by children in 2017y
Any above
Don't know/Prefer not to say
Careless use of a computer resulting
in personal/other data loss
Being exposed to hurtful and malicious
messages from strangers through social media
Being spied on by malicious software/
programs installed on their computer
Incurring unexpected bills through
app stores/social networks
Accidentally sharing information/data
held on my device
Being the victim of an online scam involving
fake websites/fake e-mails
Becoming a victim of cyber-bullying
Using the Internet to meet undesirable/
dangerous people offline
Using my payment details
without my permission
Communicating with dangerous
strangers/untrusted people online
Sharing too much personal information
about themselves online
Encountering malicious software/viruses
Seeing inappropriate/explicit content online
Becoming addicted to the Internet/spending
too much time online
12%
12%
10%
8%
7%
7%
7%
7%
7%
7%
6%
6%
6%
5%
3%
41%
Our study shows us that parents employ a variety of methods to try and help keep their kids safe online, the most popular
of which are talking to their children about online threats, to help educate them (37%), and limiting their time online (33%).
Interestingly, 48% of parents in APAC, who are perhaps more strict than parents elsewhere, said they limit the amount of time
their children spend online, compared to 30% of parents in Europe.
14. 14
Any above
Being exposed to deliberately hurtful and
malicious messages through social
media and messengers
Incurring unexpected bills through
app stores / social networks
Losing money from having financial
details stolen (e.g. through
fake websites, e-mails)
Being the victim of medical
scam ads or health fraud
Communicating with dangerous
strangers / untrusted people online
Seeing inappropriate/explicit
content online
Falling for fake prize draw/investment
schemes etc. online
Sharing too much personal
information about themselves online
Being spied on by malicious software/
programs installed on their computer
Encountering malicious software/viruses
Being the victim of an online scam
involving fake websites / fake e-mails
Section six: family matters
Older relatives
It’s not just children’s online safety that people are concerned about. Older relatives are also vulnerable, with 84% of older
generations now also using the Internet at home several times a day. Making them vulnerable to cyberthreats too.
60% are concerned about their older relatives – including parents and grandparents – using the Internet. The biggest
concerns are around them being spied on via malicious malware on their device (43%), encountering malicious software
(42%) or becoming the victim of a scam involving fake emails or websites (55%). These concerns do unfortunately
sometimes become a reality, with 44% of Internet users admitting that their older relatives have experienced an IT security
threat or incident. These threats have often resulted from online scams involving fake emails and websites (15%), or malware
infection (15%).
The threats faced by older relatives in 2017
Despite concerns, people do little to help protect their older relatives from their growing vulnerability, with only 34%
agreeing they have installed an antivirus solution onto their older relatives’ devices and a quarter (33%) admitting they
do not protect their older relatives at all.
15%
15%
13%
10%
10%
9%
8%
8%
7%
7%
7%
44%