SlideShare a Scribd company logo
Special Report:Smartphone Security American Pulse™, Feb-2011 8,225 respondents participated in the 1st February American Pulse conducted 2/2-2/4/2011. Margin of error is +/- 1.1%. BIGresearch®  450 W. Wilson Bridge Rd. Suite 370 Worthington, OH 43085 Ph: 614-846-0146
Almost half of Adults 18-34 own smartphones, while nearly 9 in 10 Adults 55+ do NOT Source: American Pulse™, Feb-2011, N=8225
About 1 in 3 have privacy concerns about information stored in smartphones Source: American Pulse™, Feb-2011, N=8225
All ages worry equally about identity theft; youth worry more about damage to social life If your smartphone were stolen, how concerned would you be that your identity or finances could be stolen? How concerned would you be that your social life (via Facebook, Twitter, etc) could be disrupted? Source: American Pulse™, Feb-2011, N=8225
Do security issues hurt smartphone sales? Do security issues influence your decision to NOT own a smartphone? (Non-Smartphone Owners) Source: American Pulse™, Feb-2011, N=8225
Contact For media inquiries:Chrissy Wissinger, Communications Managerchrissy@bigresearch.com 614-846-0146 Disclaimer BIGresearch® is a registered trademark of Prosper Business Development Corp. Services are delivered by Prosper and/or a Prosper affiliated company (“Prosper”). Prosper makes no warranties, either expressed or implied, concerning: data gathered or obtained from any source; the present or future methodology employed in producing BIGresearch® statistics; or the BIGresearch® data and estimates represent only the opinion of Prosper and reliance thereon and use thereof shall be at the user’s own risk.

More Related Content

Viewers also liked

Where Did the Easter Bunny Come From?
Where Did the Easter Bunny Come From?Where Did the Easter Bunny Come From?
Where Did the Easter Bunny Come From?
Cachi Chien
 
Beauty & Nature (Figurative Art by Vito Loli)
Beauty & Nature (Figurative Art by Vito Loli)Beauty & Nature (Figurative Art by Vito Loli)
Beauty & Nature (Figurative Art by Vito Loli)
Cachi Chien
 
Childhood Memories (Bob Byerley)
Childhood Memories (Bob Byerley)Childhood Memories (Bob Byerley)
Childhood Memories (Bob Byerley)
Cachi Chien
 
Consumer Snapshot October 2014
Consumer Snapshot October 2014Consumer Snapshot October 2014
Consumer Snapshot October 2014
Prosper Business Development
 
Festival Folckórico de Cobán (Guatemala)
Festival Folckórico de Cobán (Guatemala) Festival Folckórico de Cobán (Guatemala)
Festival Folckórico de Cobán (Guatemala)
Cachi Chien
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
Prosper Business Development
 
INNOVATIVE LEGEND HEIGHTS, CALL 9654953105, LEGEND HEIGHTS
INNOVATIVE LEGEND HEIGHTS, CALL 9654953105, LEGEND HEIGHTSINNOVATIVE LEGEND HEIGHTS, CALL 9654953105, LEGEND HEIGHTS
INNOVATIVE LEGEND HEIGHTS, CALL 9654953105, LEGEND HEIGHTS
ashokjai
 
Consumer Snapshot May 2013
Consumer Snapshot May 2013Consumer Snapshot May 2013
Consumer Snapshot May 2013
Prosper Business Development
 
Red Mall | Retail Space | Food Court | 9654953105
Red Mall | Retail Space | Food Court | 9654953105Red Mall | Retail Space | Food Court | 9654953105
Red Mall | Retail Space | Food Court | 9654953105
ashokjai
 

Viewers also liked (10)

Where Did the Easter Bunny Come From?
Where Did the Easter Bunny Come From?Where Did the Easter Bunny Come From?
Where Did the Easter Bunny Come From?
 
Beauty & Nature (Figurative Art by Vito Loli)
Beauty & Nature (Figurative Art by Vito Loli)Beauty & Nature (Figurative Art by Vito Loli)
Beauty & Nature (Figurative Art by Vito Loli)
 
Childhood Memories (Bob Byerley)
Childhood Memories (Bob Byerley)Childhood Memories (Bob Byerley)
Childhood Memories (Bob Byerley)
 
Consumer Snapshot October 2014
Consumer Snapshot October 2014Consumer Snapshot October 2014
Consumer Snapshot October 2014
 
Festival Folckórico de Cobán (Guatemala)
Festival Folckórico de Cobán (Guatemala) Festival Folckórico de Cobán (Guatemala)
Festival Folckórico de Cobán (Guatemala)
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
INNOVATIVE LEGEND HEIGHTS, CALL 9654953105, LEGEND HEIGHTS
INNOVATIVE LEGEND HEIGHTS, CALL 9654953105, LEGEND HEIGHTSINNOVATIVE LEGEND HEIGHTS, CALL 9654953105, LEGEND HEIGHTS
INNOVATIVE LEGEND HEIGHTS, CALL 9654953105, LEGEND HEIGHTS
 
Consumer Snapshot May 2013
Consumer Snapshot May 2013Consumer Snapshot May 2013
Consumer Snapshot May 2013
 
Red Mall | Retail Space | Food Court | 9654953105
Red Mall | Retail Space | Food Court | 9654953105Red Mall | Retail Space | Food Court | 9654953105
Red Mall | Retail Space | Food Court | 9654953105
 
Vasilyeva 11 04_2013
Vasilyeva 11 04_2013Vasilyeva 11 04_2013
Vasilyeva 11 04_2013
 

Similar to Smartphone Security

Americans and Mobile Computing: Key Trends in Consumer Research
Americans and Mobile Computing: Key Trends in Consumer ResearchAmericans and Mobile Computing: Key Trends in Consumer Research
Americans and Mobile Computing: Key Trends in Consumer Research
Pew Research Center's Internet & American Life Project
 
Security survey market insights
Security survey market insightsSecurity survey market insights
Security survey market insights
tyntec
 
Growing up digital
Growing up digitalGrowing up digital
Growing up digital
Stacey Vernooy
 
Pew Research Center: Digital Differences
Pew Research Center: Digital DifferencesPew Research Center: Digital Differences
Pew Research Center: Digital Differences
Path of the Blue Eye Project
 
Technology Device OWNERSHIP: 2015
Technology Device OWNERSHIP: 2015 Technology Device OWNERSHIP: 2015
Technology Device OWNERSHIP: 2015
eraser Juan José Calderón
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
- Mark - Fullbright
 
Wireless Communication and State DOTs
Wireless Communication and State DOTsWireless Communication and State DOTs
Wireless Communication and State DOTs
Lloyd Brown
 
Active Mobile Users
Active Mobile UsersActive Mobile Users
Active Mobile Users
Prosper Business Development
 
Smartphone Ownership — 2013 Update
Smartphone Ownership — 2013 UpdateSmartphone Ownership — 2013 Update
Smartphone Ownership — 2013 Update
Smart Chicago Collaborative
 
Presidential Report Card
Presidential Report CardPresidential Report Card
Presidential Report Card
Prosper Business Development
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
Information 2.0 and Beyond: Where are we, where are we going?
Information 2.0 and Beyond: Where are we, where are we going?Information 2.0 and Beyond: Where are we, where are we going?
Information 2.0 and Beyond: Where are we, where are we going?
Pew Research Center's Internet & American Life Project
 
Information 2.0 and beyond where are we going
Information 2.0 and beyond  where are we goingInformation 2.0 and beyond  where are we going
Information 2.0 and beyond where are we going
Hero Wa
 
UNFINISHED SYMPHONY: What we don’t know about the future of the internet
UNFINISHED SYMPHONY: What we don’t know about the future of the internetUNFINISHED SYMPHONY: What we don’t know about the future of the internet
UNFINISHED SYMPHONY: What we don’t know about the future of the internet
Pew Research Center's Internet & American Life Project
 
President Obama's Report Card
President Obama's Report CardPresident Obama's Report Card
President Obama's Report Card
Prosper Business Development
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Trost, Micki
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
gulya1001
 
Museums and the Web: Grounding Digital Information Trends
Museums and the Web: Grounding Digital Information TrendsMuseums and the Web: Grounding Digital Information Trends
Museums and the Web: Grounding Digital Information Trends
Pew Research Center's Internet & American Life Project
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
Blue Coat
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
Ping Identity
 

Similar to Smartphone Security (20)

Americans and Mobile Computing: Key Trends in Consumer Research
Americans and Mobile Computing: Key Trends in Consumer ResearchAmericans and Mobile Computing: Key Trends in Consumer Research
Americans and Mobile Computing: Key Trends in Consumer Research
 
Security survey market insights
Security survey market insightsSecurity survey market insights
Security survey market insights
 
Growing up digital
Growing up digitalGrowing up digital
Growing up digital
 
Pew Research Center: Digital Differences
Pew Research Center: Digital DifferencesPew Research Center: Digital Differences
Pew Research Center: Digital Differences
 
Technology Device OWNERSHIP: 2015
Technology Device OWNERSHIP: 2015 Technology Device OWNERSHIP: 2015
Technology Device OWNERSHIP: 2015
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
Wireless Communication and State DOTs
Wireless Communication and State DOTsWireless Communication and State DOTs
Wireless Communication and State DOTs
 
Active Mobile Users
Active Mobile UsersActive Mobile Users
Active Mobile Users
 
Smartphone Ownership — 2013 Update
Smartphone Ownership — 2013 UpdateSmartphone Ownership — 2013 Update
Smartphone Ownership — 2013 Update
 
Presidential Report Card
Presidential Report CardPresidential Report Card
Presidential Report Card
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Information 2.0 and Beyond: Where are we, where are we going?
Information 2.0 and Beyond: Where are we, where are we going?Information 2.0 and Beyond: Where are we, where are we going?
Information 2.0 and Beyond: Where are we, where are we going?
 
Information 2.0 and beyond where are we going
Information 2.0 and beyond  where are we goingInformation 2.0 and beyond  where are we going
Information 2.0 and beyond where are we going
 
UNFINISHED SYMPHONY: What we don’t know about the future of the internet
UNFINISHED SYMPHONY: What we don’t know about the future of the internetUNFINISHED SYMPHONY: What we don’t know about the future of the internet
UNFINISHED SYMPHONY: What we don’t know about the future of the internet
 
President Obama's Report Card
President Obama's Report CardPresident Obama's Report Card
President Obama's Report Card
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Museums and the Web: Grounding Digital Information Trends
Museums and the Web: Grounding Digital Information TrendsMuseums and the Web: Grounding Digital Information Trends
Museums and the Web: Grounding Digital Information Trends
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
 

More from Prosper Business Development

Consumer Snapshot - March 2017
Consumer Snapshot - March 2017Consumer Snapshot - March 2017
Consumer Snapshot - March 2017
Prosper Business Development
 
Consumer Snapshot - February 2017
Consumer Snapshot - February 2017Consumer Snapshot - February 2017
Consumer Snapshot - February 2017
Prosper Business Development
 
Consumer Snapshot - January 2017
Consumer Snapshot - January 2017Consumer Snapshot - January 2017
Consumer Snapshot - January 2017
Prosper Business Development
 
Consumer Snapshot - December 2016
Consumer Snapshot - December 2016Consumer Snapshot - December 2016
Consumer Snapshot - December 2016
Prosper Business Development
 
Consumer Snapshot - November 2016
Consumer Snapshot - November 2016Consumer Snapshot - November 2016
Consumer Snapshot - November 2016
Prosper Business Development
 
Consumer Snapshot - October 2016
Consumer Snapshot - October 2016Consumer Snapshot - October 2016
Consumer Snapshot - October 2016
Prosper Business Development
 
Consumer Snapshot - September 2016
Consumer Snapshot - September 2016Consumer Snapshot - September 2016
Consumer Snapshot - September 2016
Prosper Business Development
 
Consumer Snapshot - August 2016
Consumer Snapshot - August 2016Consumer Snapshot - August 2016
Consumer Snapshot - August 2016
Prosper Business Development
 
Consumer Snapshot - July 2016
Consumer Snapshot - July 2016Consumer Snapshot - July 2016
Consumer Snapshot - July 2016
Prosper Business Development
 
Consumer Snapshot - June 2016
Consumer Snapshot - June 2016Consumer Snapshot - June 2016
Consumer Snapshot - June 2016
Prosper Business Development
 
Consumer Snapshot - May 2016
Consumer Snapshot - May 2016Consumer Snapshot - May 2016
Consumer Snapshot - May 2016
Prosper Business Development
 
Consumer Snapshot - April 2016
Consumer Snapshot - April 2016Consumer Snapshot - April 2016
Consumer Snapshot - April 2016
Prosper Business Development
 
Consumer Snapshot - March 2016
Consumer Snapshot - March 2016Consumer Snapshot - March 2016
Consumer Snapshot - March 2016
Prosper Business Development
 
Consumer Snapshot - February 2016
Consumer Snapshot - February 2016Consumer Snapshot - February 2016
Consumer Snapshot - February 2016
Prosper Business Development
 
Consumer Snapshot - January 2016
Consumer Snapshot - January 2016Consumer Snapshot - January 2016
Consumer Snapshot - January 2016
Prosper Business Development
 
Consumer Snapshot - November 2015
Consumer Snapshot - November 2015Consumer Snapshot - November 2015
Consumer Snapshot - November 2015
Prosper Business Development
 
Consumer Snapshot - October 2015
Consumer Snapshot - October 2015Consumer Snapshot - October 2015
Consumer Snapshot - October 2015
Prosper Business Development
 
Consumer Snapshot September 2015
Consumer Snapshot September 2015Consumer Snapshot September 2015
Consumer Snapshot September 2015
Prosper Business Development
 
Consumer Snapshot August 2015
Consumer Snapshot August 2015Consumer Snapshot August 2015
Consumer Snapshot August 2015
Prosper Business Development
 
Consumer Snapshot June 2015
Consumer Snapshot June 2015Consumer Snapshot June 2015
Consumer Snapshot June 2015
Prosper Business Development
 

More from Prosper Business Development (20)

Consumer Snapshot - March 2017
Consumer Snapshot - March 2017Consumer Snapshot - March 2017
Consumer Snapshot - March 2017
 
Consumer Snapshot - February 2017
Consumer Snapshot - February 2017Consumer Snapshot - February 2017
Consumer Snapshot - February 2017
 
Consumer Snapshot - January 2017
Consumer Snapshot - January 2017Consumer Snapshot - January 2017
Consumer Snapshot - January 2017
 
Consumer Snapshot - December 2016
Consumer Snapshot - December 2016Consumer Snapshot - December 2016
Consumer Snapshot - December 2016
 
Consumer Snapshot - November 2016
Consumer Snapshot - November 2016Consumer Snapshot - November 2016
Consumer Snapshot - November 2016
 
Consumer Snapshot - October 2016
Consumer Snapshot - October 2016Consumer Snapshot - October 2016
Consumer Snapshot - October 2016
 
Consumer Snapshot - September 2016
Consumer Snapshot - September 2016Consumer Snapshot - September 2016
Consumer Snapshot - September 2016
 
Consumer Snapshot - August 2016
Consumer Snapshot - August 2016Consumer Snapshot - August 2016
Consumer Snapshot - August 2016
 
Consumer Snapshot - July 2016
Consumer Snapshot - July 2016Consumer Snapshot - July 2016
Consumer Snapshot - July 2016
 
Consumer Snapshot - June 2016
Consumer Snapshot - June 2016Consumer Snapshot - June 2016
Consumer Snapshot - June 2016
 
Consumer Snapshot - May 2016
Consumer Snapshot - May 2016Consumer Snapshot - May 2016
Consumer Snapshot - May 2016
 
Consumer Snapshot - April 2016
Consumer Snapshot - April 2016Consumer Snapshot - April 2016
Consumer Snapshot - April 2016
 
Consumer Snapshot - March 2016
Consumer Snapshot - March 2016Consumer Snapshot - March 2016
Consumer Snapshot - March 2016
 
Consumer Snapshot - February 2016
Consumer Snapshot - February 2016Consumer Snapshot - February 2016
Consumer Snapshot - February 2016
 
Consumer Snapshot - January 2016
Consumer Snapshot - January 2016Consumer Snapshot - January 2016
Consumer Snapshot - January 2016
 
Consumer Snapshot - November 2015
Consumer Snapshot - November 2015Consumer Snapshot - November 2015
Consumer Snapshot - November 2015
 
Consumer Snapshot - October 2015
Consumer Snapshot - October 2015Consumer Snapshot - October 2015
Consumer Snapshot - October 2015
 
Consumer Snapshot September 2015
Consumer Snapshot September 2015Consumer Snapshot September 2015
Consumer Snapshot September 2015
 
Consumer Snapshot August 2015
Consumer Snapshot August 2015Consumer Snapshot August 2015
Consumer Snapshot August 2015
 
Consumer Snapshot June 2015
Consumer Snapshot June 2015Consumer Snapshot June 2015
Consumer Snapshot June 2015
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Smartphone Security

  • 1. Special Report:Smartphone Security American Pulse™, Feb-2011 8,225 respondents participated in the 1st February American Pulse conducted 2/2-2/4/2011. Margin of error is +/- 1.1%. BIGresearch® 450 W. Wilson Bridge Rd. Suite 370 Worthington, OH 43085 Ph: 614-846-0146
  • 2. Almost half of Adults 18-34 own smartphones, while nearly 9 in 10 Adults 55+ do NOT Source: American Pulse™, Feb-2011, N=8225
  • 3. About 1 in 3 have privacy concerns about information stored in smartphones Source: American Pulse™, Feb-2011, N=8225
  • 4. All ages worry equally about identity theft; youth worry more about damage to social life If your smartphone were stolen, how concerned would you be that your identity or finances could be stolen? How concerned would you be that your social life (via Facebook, Twitter, etc) could be disrupted? Source: American Pulse™, Feb-2011, N=8225
  • 5. Do security issues hurt smartphone sales? Do security issues influence your decision to NOT own a smartphone? (Non-Smartphone Owners) Source: American Pulse™, Feb-2011, N=8225
  • 6. Contact For media inquiries:Chrissy Wissinger, Communications Managerchrissy@bigresearch.com 614-846-0146 Disclaimer BIGresearch® is a registered trademark of Prosper Business Development Corp. Services are delivered by Prosper and/or a Prosper affiliated company (“Prosper”). Prosper makes no warranties, either expressed or implied, concerning: data gathered or obtained from any source; the present or future methodology employed in producing BIGresearch® statistics; or the BIGresearch® data and estimates represent only the opinion of Prosper and reliance thereon and use thereof shall be at the user’s own risk.