SlideShare a Scribd company logo
Privacy in the Digital Age
Lee Rainie (@lrainie)
Director, Internet, Science, and Technology Research
Pew Research Center
6.3.15
WAN-IFRA – World Media Policy Forum
Background
• Surveys of U.S. adults – post-
Snowden
• Privacy issues are jumbled together
in people’s heads and don’t unpack
easily:
–Sur-veillance
–Sous-veillance
–Co-veillance
1. The balance of
forces has shifted in
the networked
age. People are
now “public by
default and
private by effort.”
-- danah boyd
Personal information online
% of adult internet users who say this information about them is available online
20%
21%
21%
24%
29%
30%
38%
44%
46%
50%
66%
0% 20% 40% 60% 80%
Your political party / affiliation
Video of you
Your home phone number
Your cell number
Which groups / orgs you belong to
Your home address
Things you’ve written using your name
Your employer / company you work for
Your email address
Your birth date
A photo of you
Who users try to avoid
% of adult internet users who say they have used the internet in ways to avoid being observed or seen by …
4%
5%
6%
6%
11%
14%
17%
19%
19%
28%
33%
0% 10% 20% 30% 40%
Law enforcement
The government
Companies / people who run the website you visited
Companies / people who might want payment for files you
download
Employer, supervisor, coworkers
Family members or romantic partner
People who might criticize / harass you
People from your past
Certain friends
Advertisers
Hackers or criminals
2. Privacy is not binary / context matters
3. Personal control / agency matters
4. Most accept that certain trade-offs are
part of the bargain
55% “agree” or “strongly agree” with the
statement: “I am willing to share some
information about myself with companies in
order to use online services for free.”
5. The young are more focused on
networked privacy than their elders
• Those ages 18-29 are more likely than older adults to say:
• They take steps to limit the amount of personal
information available about them online—44% of
young adult internet users say this.
• They change privacy settings – 71%of social
networking users ages 18-29 have changed privacy
settings on their profile to limit what they share with
others online.
• They delete unwanted comments – 47%social
networking users ages 18-29 have deleted comments
that others have made on their profile.
• They remove their name from photos – 41% of social
networking users ages 18-29 say they have removed their
name from photos that were tagged to identify them.
Young adults are the most likely to have had major
problems with personal information and identity
28%
23%
7%
13%
11%
22%
15%
14%
6%
4%
17%
2%
11%
2%
1%
9%
3%
8%
4%
0%
10%
20%
30%
Had email or SNS
account
compromised or
taken over without
permission
Been stalked or
harassed online
Had important info
stolen such as SSN,
credit card, bank
info
Had reputation
damaged because of
something that
happened online
Online events led
you into physical
danger
Ages 18-29 Ages 30-49 Ages 50-64 Ages 65+
6. Many know they do not
know what is going on ….
Those who know the most
are more worried
and wary
7. Many are resigned – some are even hopeless –
and their trust is fading
How confident are you that your records at
these places will remain private and secure?
76%
69%
66%
61%
57%
56%
55%
54%
50%
46%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Online advertisers
Social media
Search engines
Retailers
Email provider
Cell telephone
Government agencies
Cable TV
Landline telephone
Credit card
Not too confident / Not at all confident
Changes in laws would help
8. Changes in law could make a difference
• 68% of internet users believe current
laws are not good enough in protecting
people’s privacy online.
• 64% believe the government should do
more to regulate advertisers, compared
with 34% who think the government
should not get more involved.
• When asked if they feel as though their
own efforts to protect the privacy of their
personal information online are
sufficient, 61% say they feel as though
they “would like to do more,” while 37%
say they “already do enough.”
• 88% of adults “agree” (49%) or “strongly
agree” (39%) that it would be very
difficult to remove inaccurate
information about them online.
Thank you!
Lee Rainie
lrainie@pewresearch.org
@lrainie
@pewinternet
@pewresearch

More Related Content

What's hot

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
Mark Jhon Oxillo
 
Friendships and social media
Friendships and social mediaFriendships and social media
Friendships and social media
Alyssa Thomson
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Privacy law
Privacy lawPrivacy law
Privacy law
CubReporters.org
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
Nousheen Arshad
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Blogging vs. journalism
Blogging vs. journalismBlogging vs. journalism
Blogging vs. journalism
Honza Pav
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 

What's hot (20)

“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Friendships and social media
Friendships and social mediaFriendships and social media
Friendships and social media
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Privacy law
Privacy lawPrivacy law
Privacy law
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Blogging vs. journalism
Blogging vs. journalismBlogging vs. journalism
Blogging vs. journalism
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 

Similar to Privacy in the Digital Age

Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Pew Research Center's Internet & American Life Project
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
Ujjwal Singh
 
Pew internet research report reputation management and social media
Pew internet research report reputation management and social mediaPew internet research report reputation management and social media
Pew internet research report reputation management and social mediaDillard University Library
 
Pip reputation management
Pip reputation managementPip reputation management
Pip reputation managementMarketingfacts
 
Research: Online reputation management
Research: Online reputation managementResearch: Online reputation management
Research: Online reputation managementMitya Voskresensky
 
Transportation and privacy in the mobile age
Transportation and privacy in the mobile age Transportation and privacy in the mobile age
Transportation and privacy in the mobile age
Pew Research Center's Internet & American Life Project
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
Ipsos UK
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
MindMake - Parenting & Education
 
internet promotions
internet promotionsinternet promotions
internet promotions
newvision2
 
Social Media Impact On Consumer Electronics: American Market Segmentation Sur...
Social Media Impact On Consumer Electronics: American Market Segmentation Sur...Social Media Impact On Consumer Electronics: American Market Segmentation Sur...
Social Media Impact On Consumer Electronics: American Market Segmentation Sur...
psbsrch123
 
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and PrivacyDo you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
Frances Coronel
 
Brazilian digital woman: Permanent Connectivity
Brazilian digital woman: Permanent ConnectivityBrazilian digital woman: Permanent Connectivity
Brazilian digital woman: Permanent Connectivity
The Cocktail Analysis
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda Lenhart
Jorge Borges
 
APRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - BoomersAPRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - BoomersAARP
 
Reaching todays-boomers-and-seniors-online research-studies
Reaching todays-boomers-and-seniors-online research-studiesReaching todays-boomers-and-seniors-online research-studies
Reaching todays-boomers-and-seniors-online research-studies
Dmytro Lysiuk
 
Marketing:Reaching boomers
Marketing:Reaching boomersMarketing:Reaching boomers
Marketing:Reaching boomers
Thomas A. Mastromatto
 
Dating & Mating in the Digital Age
Dating & Mating in the Digital AgeDating & Mating in the Digital Age
Dating & Mating in the Digital Age
Pew Research Center's Internet & American Life Project
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
chellakaruppasamy
 

Similar to Privacy in the Digital Age (20)

Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
 
Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
 
Pew internet research report reputation management and social media
Pew internet research report reputation management and social mediaPew internet research report reputation management and social media
Pew internet research report reputation management and social media
 
Pip reputation management
Pip reputation managementPip reputation management
Pip reputation management
 
Research: Online reputation management
Research: Online reputation managementResearch: Online reputation management
Research: Online reputation management
 
Transportation and privacy in the mobile age
Transportation and privacy in the mobile age Transportation and privacy in the mobile age
Transportation and privacy in the mobile age
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
internet promotions
internet promotionsinternet promotions
internet promotions
 
Social Media Impact On Consumer Electronics: American Market Segmentation Sur...
Social Media Impact On Consumer Electronics: American Market Segmentation Sur...Social Media Impact On Consumer Electronics: American Market Segmentation Sur...
Social Media Impact On Consumer Electronics: American Market Segmentation Sur...
 
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and PrivacyDo you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Brazilian digital woman: Permanent Connectivity
Brazilian digital woman: Permanent ConnectivityBrazilian digital woman: Permanent Connectivity
Brazilian digital woman: Permanent Connectivity
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda Lenhart
 
Online Reputation
Online ReputationOnline Reputation
Online Reputation
 
APRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - BoomersAPRIL 2013: Google/Ipsos Data Breakdown - Boomers
APRIL 2013: Google/Ipsos Data Breakdown - Boomers
 
Reaching todays-boomers-and-seniors-online research-studies
Reaching todays-boomers-and-seniors-online research-studiesReaching todays-boomers-and-seniors-online research-studies
Reaching todays-boomers-and-seniors-online research-studies
 
Marketing:Reaching boomers
Marketing:Reaching boomersMarketing:Reaching boomers
Marketing:Reaching boomers
 
Dating & Mating in the Digital Age
Dating & Mating in the Digital AgeDating & Mating in the Digital Age
Dating & Mating in the Digital Age
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 

More from Pew Research Center

Virtual Event: Jewish Americans in 2020
Virtual Event: Jewish Americans in 2020Virtual Event: Jewish Americans in 2020
Virtual Event: Jewish Americans in 2020
Pew Research Center
 
Between the Data: The Unseen Stories of Asian Americans
Between the Data: The Unseen Stories of Asian AmericansBetween the Data: The Unseen Stories of Asian Americans
Between the Data: The Unseen Stories of Asian Americans
Pew Research Center
 
How Do OECD Forum Attendees Compare with Citizens Around the World on Views A...
How Do OECD Forum Attendees Compare with Citizens Around the World on Views A...How Do OECD Forum Attendees Compare with Citizens Around the World on Views A...
How Do OECD Forum Attendees Compare with Citizens Around the World on Views A...
Pew Research Center
 
Once in a decade: Covering the 2020 census
Once in a decade: Covering the 2020 censusOnce in a decade: Covering the 2020 census
Once in a decade: Covering the 2020 census
Pew Research Center
 
How Do OECD Forum Attendees Compare With General Publics Around the World on ...
How Do OECD Forum Attendees Compare With General Publics Around the World on ...How Do OECD Forum Attendees Compare With General Publics Around the World on ...
How Do OECD Forum Attendees Compare With General Publics Around the World on ...
Pew Research Center
 
Trust in the Digital Era
Trust in the Digital EraTrust in the Digital Era
Trust in the Digital Era
Pew Research Center
 
How has populism disrupted the left right divide in western europe
How has populism disrupted the left right divide in western europeHow has populism disrupted the left right divide in western europe
How has populism disrupted the left right divide in western europe
Pew Research Center
 
The Roots of Modern Nationalism and the Populist Backlash
The Roots of Modern Nationalism and the Populist BacklashThe Roots of Modern Nationalism and the Populist Backlash
The Roots of Modern Nationalism and the Populist BacklashPew Research Center
 
OECD Forum 2018 Thought Leader Survey
OECD Forum 2018 Thought Leader SurveyOECD Forum 2018 Thought Leader Survey
OECD Forum 2018 Thought Leader Survey
Pew Research Center
 
Religious demography maps and data from Pew Research Center
Religious demography maps and data from Pew Research CenterReligious demography maps and data from Pew Research Center
Religious demography maps and data from Pew Research Center
Pew Research Center
 
Thought Leader Survey: Issues Impacting the Transatlantic Relationship, 2018
Thought Leader Survey: Issues Impacting the Transatlantic Relationship, 2018Thought Leader Survey: Issues Impacting the Transatlantic Relationship, 2018
Thought Leader Survey: Issues Impacting the Transatlantic Relationship, 2018
Pew Research Center
 
Thought Leader Survey: Issues Impacting the Transatlantic Relationship
Thought Leader Survey: Issues Impacting the Transatlantic RelationshipThought Leader Survey: Issues Impacting the Transatlantic Relationship
Thought Leader Survey: Issues Impacting the Transatlantic Relationship
Pew Research Center
 
Origins and Destinations of Foreign Students in the United States
Origins and Destinations of Foreign Students in the United StatesOrigins and Destinations of Foreign Students in the United States
Origins and Destinations of Foreign Students in the United States
Pew Research Center
 
7. McCauley Presentation
7. McCauley Presentation7. McCauley Presentation
7. McCauley Presentation
Pew Research Center
 
11. RTI International Presentation
11. RTI International Presentation11. RTI International Presentation
11. RTI International Presentation
Pew Research Center
 
10. Voice of America Presentation
10. Voice of America Presentation10. Voice of America Presentation
10. Voice of America Presentation
Pew Research Center
 
9. World Bank Presentation
9. World Bank Presentation9. World Bank Presentation
9. World Bank Presentation
Pew Research Center
 
8. Greenberg Quinlan Rosner Presentation
8. Greenberg Quinlan Rosner Presentation8. Greenberg Quinlan Rosner Presentation
8. Greenberg Quinlan Rosner Presentation
Pew Research Center
 
6. Mathematica Presentation
6. Mathematica Presentation6. Mathematica Presentation
6. Mathematica Presentation
Pew Research Center
 
5. Survey Solutions Presentation
5. Survey Solutions Presentation5. Survey Solutions Presentation
5. Survey Solutions Presentation
Pew Research Center
 

More from Pew Research Center (20)

Virtual Event: Jewish Americans in 2020
Virtual Event: Jewish Americans in 2020Virtual Event: Jewish Americans in 2020
Virtual Event: Jewish Americans in 2020
 
Between the Data: The Unseen Stories of Asian Americans
Between the Data: The Unseen Stories of Asian AmericansBetween the Data: The Unseen Stories of Asian Americans
Between the Data: The Unseen Stories of Asian Americans
 
How Do OECD Forum Attendees Compare with Citizens Around the World on Views A...
How Do OECD Forum Attendees Compare with Citizens Around the World on Views A...How Do OECD Forum Attendees Compare with Citizens Around the World on Views A...
How Do OECD Forum Attendees Compare with Citizens Around the World on Views A...
 
Once in a decade: Covering the 2020 census
Once in a decade: Covering the 2020 censusOnce in a decade: Covering the 2020 census
Once in a decade: Covering the 2020 census
 
How Do OECD Forum Attendees Compare With General Publics Around the World on ...
How Do OECD Forum Attendees Compare With General Publics Around the World on ...How Do OECD Forum Attendees Compare With General Publics Around the World on ...
How Do OECD Forum Attendees Compare With General Publics Around the World on ...
 
Trust in the Digital Era
Trust in the Digital EraTrust in the Digital Era
Trust in the Digital Era
 
How has populism disrupted the left right divide in western europe
How has populism disrupted the left right divide in western europeHow has populism disrupted the left right divide in western europe
How has populism disrupted the left right divide in western europe
 
The Roots of Modern Nationalism and the Populist Backlash
The Roots of Modern Nationalism and the Populist BacklashThe Roots of Modern Nationalism and the Populist Backlash
The Roots of Modern Nationalism and the Populist Backlash
 
OECD Forum 2018 Thought Leader Survey
OECD Forum 2018 Thought Leader SurveyOECD Forum 2018 Thought Leader Survey
OECD Forum 2018 Thought Leader Survey
 
Religious demography maps and data from Pew Research Center
Religious demography maps and data from Pew Research CenterReligious demography maps and data from Pew Research Center
Religious demography maps and data from Pew Research Center
 
Thought Leader Survey: Issues Impacting the Transatlantic Relationship, 2018
Thought Leader Survey: Issues Impacting the Transatlantic Relationship, 2018Thought Leader Survey: Issues Impacting the Transatlantic Relationship, 2018
Thought Leader Survey: Issues Impacting the Transatlantic Relationship, 2018
 
Thought Leader Survey: Issues Impacting the Transatlantic Relationship
Thought Leader Survey: Issues Impacting the Transatlantic RelationshipThought Leader Survey: Issues Impacting the Transatlantic Relationship
Thought Leader Survey: Issues Impacting the Transatlantic Relationship
 
Origins and Destinations of Foreign Students in the United States
Origins and Destinations of Foreign Students in the United StatesOrigins and Destinations of Foreign Students in the United States
Origins and Destinations of Foreign Students in the United States
 
7. McCauley Presentation
7. McCauley Presentation7. McCauley Presentation
7. McCauley Presentation
 
11. RTI International Presentation
11. RTI International Presentation11. RTI International Presentation
11. RTI International Presentation
 
10. Voice of America Presentation
10. Voice of America Presentation10. Voice of America Presentation
10. Voice of America Presentation
 
9. World Bank Presentation
9. World Bank Presentation9. World Bank Presentation
9. World Bank Presentation
 
8. Greenberg Quinlan Rosner Presentation
8. Greenberg Quinlan Rosner Presentation8. Greenberg Quinlan Rosner Presentation
8. Greenberg Quinlan Rosner Presentation
 
6. Mathematica Presentation
6. Mathematica Presentation6. Mathematica Presentation
6. Mathematica Presentation
 
5. Survey Solutions Presentation
5. Survey Solutions Presentation5. Survey Solutions Presentation
5. Survey Solutions Presentation
 

Recently uploaded

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 

Recently uploaded (16)

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 

Privacy in the Digital Age

  • 1. Privacy in the Digital Age Lee Rainie (@lrainie) Director, Internet, Science, and Technology Research Pew Research Center 6.3.15 WAN-IFRA – World Media Policy Forum
  • 2.
  • 3. Background • Surveys of U.S. adults – post- Snowden • Privacy issues are jumbled together in people’s heads and don’t unpack easily: –Sur-veillance –Sous-veillance –Co-veillance
  • 4. 1. The balance of forces has shifted in the networked age. People are now “public by default and private by effort.” -- danah boyd
  • 5. Personal information online % of adult internet users who say this information about them is available online 20% 21% 21% 24% 29% 30% 38% 44% 46% 50% 66% 0% 20% 40% 60% 80% Your political party / affiliation Video of you Your home phone number Your cell number Which groups / orgs you belong to Your home address Things you’ve written using your name Your employer / company you work for Your email address Your birth date A photo of you
  • 6. Who users try to avoid % of adult internet users who say they have used the internet in ways to avoid being observed or seen by … 4% 5% 6% 6% 11% 14% 17% 19% 19% 28% 33% 0% 10% 20% 30% 40% Law enforcement The government Companies / people who run the website you visited Companies / people who might want payment for files you download Employer, supervisor, coworkers Family members or romantic partner People who might criticize / harass you People from your past Certain friends Advertisers Hackers or criminals
  • 7. 2. Privacy is not binary / context matters
  • 8.
  • 9.
  • 10.
  • 11. 3. Personal control / agency matters
  • 12.
  • 13.
  • 14. 4. Most accept that certain trade-offs are part of the bargain
  • 15. 55% “agree” or “strongly agree” with the statement: “I am willing to share some information about myself with companies in order to use online services for free.”
  • 16.
  • 17. 5. The young are more focused on networked privacy than their elders
  • 18. • Those ages 18-29 are more likely than older adults to say: • They take steps to limit the amount of personal information available about them online—44% of young adult internet users say this. • They change privacy settings – 71%of social networking users ages 18-29 have changed privacy settings on their profile to limit what they share with others online. • They delete unwanted comments – 47%social networking users ages 18-29 have deleted comments that others have made on their profile. • They remove their name from photos – 41% of social networking users ages 18-29 say they have removed their name from photos that were tagged to identify them.
  • 19. Young adults are the most likely to have had major problems with personal information and identity 28% 23% 7% 13% 11% 22% 15% 14% 6% 4% 17% 2% 11% 2% 1% 9% 3% 8% 4% 0% 10% 20% 30% Had email or SNS account compromised or taken over without permission Been stalked or harassed online Had important info stolen such as SSN, credit card, bank info Had reputation damaged because of something that happened online Online events led you into physical danger Ages 18-29 Ages 30-49 Ages 50-64 Ages 65+
  • 20. 6. Many know they do not know what is going on …. Those who know the most are more worried and wary
  • 21.
  • 22. 7. Many are resigned – some are even hopeless – and their trust is fading
  • 23.
  • 24. How confident are you that your records at these places will remain private and secure? 76% 69% 66% 61% 57% 56% 55% 54% 50% 46% 0% 10% 20% 30% 40% 50% 60% 70% 80% Online advertisers Social media Search engines Retailers Email provider Cell telephone Government agencies Cable TV Landline telephone Credit card Not too confident / Not at all confident
  • 25. Changes in laws would help 8. Changes in law could make a difference
  • 26. • 68% of internet users believe current laws are not good enough in protecting people’s privacy online. • 64% believe the government should do more to regulate advertisers, compared with 34% who think the government should not get more involved.
  • 27. • When asked if they feel as though their own efforts to protect the privacy of their personal information online are sufficient, 61% say they feel as though they “would like to do more,” while 37% say they “already do enough.” • 88% of adults “agree” (49%) or “strongly agree” (39%) that it would be very difficult to remove inaccurate information about them online.
  • 28.

Editor's Notes

  1. World Association of Newspapers and News Publishers – WAN-IFRA http://www.wan-ifra.org/ Wednesday June 3, 2015 Washington Hilton, Washington DC   14:00 – 16:30 World Media Policy Forum: dissecting the big challenges facing publishers, policy makers and civil society Focus on internet governance and right to be forgotten     The social changes and consequences of the networked society are still being measured. Nonetheless publishers must evaluate and respond now to rapid technology change with policies that will not only protect the ideals that underpin independent and ethical journalism and press freedom but also business sustainability.   As a consequence, it seems that in 2015 publishers, Internet giants and private citizens find themselves engaging more and more passionately in debates around media policy, with alliances changing dramatically depending on the topic.   To help consider appropriate policy responses, we have decided to organize WAN-IFRA’s first World Media Policy Forum, where legal experts, international institutions and practitioners will contribute to clarify where we stand, and where we are headed.    We have invited Lee Rainie, Director, Internet, Science and Technology from the Pew Research Center to deliver a keynote address. Rainie is one of the world’s top academic researchers on the internet and the social changes triggered by information and communication technologies (ICT.) He will talk about what research is showing us about privacy strategies and statistics. Title: Sur-veillance, Sous-veillace and Co-veillance Abstract: Personal privacy in the networked age is limited by three dimensions of “veillance.” They shape people’s behavior and their anxieties about the future of privacy. Lee Rainie will present the latest survey findings from the Pew Research Center about how people try to navigate this new environment in their relationship with government, commercial enterprises, and each other. He will also discuss how some technologists are trying to respond.