SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
CONSUMERLAB

Privacy, security
and safety online
Consumer perspectives and behavior

February 2014
About this study

Contents
CONTENTS

2

internet reaches critical mass

3

CONCERNS AFFECT BEHAVIOR BUT NOT USAGE

4

ONLINE CONCERNS AND INCREASED INTERNET USE

5

PERSONAL SAFETY IS KEY

6

CONTINUING THE DISCUSSION

7

This report, Privacy, security and safety online, is the third
installment from Ericsson ConsumerLab investigating
matters of user privacy, integrity and security online.* The
first report examined these issues on a high level, trying
to map and understand the consumer, service provider
and regulatory landscape. While the second report went
on to explore different consumer benefits of sharing
personal information, in this third report we look further into
consumer concerns surrounding the usage of internet.
As this report is based on an online survey, it should be
noted that in countries with low internet penetration, the
online population is often dominated by early adopters who
are likely to display an equal, if not higher, level of maturity
as that of the average user in markets with high internet
penetration.
*) Previous reports are: Consumer privacy in an online world (2012)
and Personal information economy (2013).

Daily
internet
users

Markets
included
USA	

	

44%

Methodology

Mexico		

17%

The survey was conducted
through online questionnaires.
A total of 3,311 respondents in
six countries participated in the
survey. The study represents 215
million daily internet users, in
the ages 15-69 years, in the
included markets.

Sweden		

60%

Egypt	

18%

Pakistan 		

10%

Thailand		

21%
Percentage of
population

The voice of the consumer
Ericsson ConsumerLab has close to 20 years
experience of studying people’s behaviors and values,
including the way they act and think about ICT products
and services. Ericsson ConsumerLab provides unique
insights on market and consumer trends.
Ericsson ConsumerLab gains its knowledge through
a global consumer research program based on
interviews with 100,000 individuals each year, in more
than 40 countries and 15 megacities – statistically
representing the views of 1.1 billion people.

2 Ericsson consumerLab Privacy, security and safety online

Both quantitative and qualitative methods are used,
and hundreds of hours are spent with consumers
from different cultures. To be close to the market and
consumers,
Ericsson ConsumerLab has analysts in all regions where
Ericsson is present, which gives a thorough global
understanding of the ICT market and business models.
All ConsumerLab reports can be found at:
www.ericsson.com/consumerlab
Internet reaches
critical mass
Internet maturity globally is reaching critical mass.
People across the globe are becoming dependent
on online connectivity in everyday life, work, and
communication with authorities.

If the potential of the internet thus far has been determined
by technological advances, further realization of this
potential will demand a deeper, more sociologically
grounded understanding of the norms and rules of
engagement on the internet.

key findings
›	 Consumers express concerns, which
directly affect their online behavior
	 - 68 percent have felt hesitant towards expressing
opinions on the Internet.
	 - 90 percent of those concerned say that it has a direct
effect on their online behavior.

›	However, these concerns do not reduce
internet activity
	 - Only 4 percent state that privacy issues reduce
their use of internet.

›	 On the internet you are who you are
- 89 percent enter their correct personal information
when registering on different sites.
- 81 percent use their correct information when
commenting or expressing personal opinions online.

›	

Uncertainty on when, where and how to
assess risks online leads to consumers
adopting coping strategies
- 93 percent say they use some form of coping strategy
to deal with risks online.
- 58 percent are careful about what websites they visit.
- 53 percent avoid giving out personal information online.

›	 Strong support for internet freedom, but
users acknowledge the risks of libel online
- Across the studied markets, there is strong support
for third party moderation on issues
of personal integrity such as personal
threats, bullying and slander. 80
percent find censorship of personal
threats on the internet acceptable.

Ericsson consumerLab Privacy, security and safety online 3
CONCERNS AFFECT
BEHAVIOR BUT NOT USAGE
Internet used in many everyday activities
Internet has shifted from being one specific aspect of consumers’ lives, to becoming an important infrastructure for
many aspects of everyday life. As this shift has accelerated,
the need for legal and social codes of conduct, or ground
rules, has become evident.

Risks influence the development
of online activity
According to the latest Ericsson Mobility Report from
november 2013, there are now 1.9 billion smartphone
subscriptions, anticipated to grow to 5.6 billion by 2019.
As a part of this development and a growing maturity,
consumers are becoming aware of online hazards. In the
study, 70 percent of respondents find that safety issues such
as viruses or fraud are a problem to them on the internet,
59 percent worry about surveillance online and to 56 percent
privacy issues are a concern.

It is evident that these concerns have not stopped the
growth of internet; quite to the contrary, the number of
internet users continues to grow unabatedly.
The results from the study do show that issues of privacy,
security and safety have a direct effect on how the internet is
approached and used. It affects the degree of both commercial and social interaction online.
However, what is notable is that among those who
express concerns only 4 percent state that these issues
have resulted in them using the internet less. This goes
across all markets in the study.

“I should probably care more than I do, but
what am I going to do with that frustration?
Cut myself off from everything, or not pay
bills online?”
— Male, 20, U.S.

10%

4%

11%
29%

70%

Multiple choice question, sum adds up to more than 100 percent.

Behavioral effects of security concerns online
I ues the internet less

consider security issues
a problem while online
44%

Figure 1: Share of consumers who consider matters of
security a problem, while on their computer or mobile
phone, and the behavioral effects of those concerns.

I am more careful with what I write on the internet
(e.g. on social networking sites or in forums)
I am more careful with what personal information I give out about myself
(e.g. when registering on sites)
I am more careful when it comes to which websites I am visiting

Base: All, 3,311 respondents

It affects my internet use in other ways

44%

It doesn’t affect my internet use at all
Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014
Base: All, 3,311 respondents

4 Ericsson consumerLab Privacy, security and safety online
ONLINE CONCERNS AND
INCREASED INTERNET USE
Experience and hearsay combined determine
consumer perception of risk
When it comes to first hand experiences of security risks, 68
percent have experienced computer viruses themselves but
only 11 percent have been subject to fraud online. However,
31 percent state that someone close to them has been
exposed to internet fraud. Another issue which has attracted
much public attention is personal identities being hijacked
(e.g. a friend posting in your name on Facebook) or stolen,
and whereas 27 percent say that someone close to them
have experienced this, only 13 percent have actually had
their identity tampered with online.
Consumer perception of risks builds on a blend of first-hand
experiences and hearsay, from friends and acquaintances
to media reporting. This creates awareness that risks exists
but uncertainty about when, where and how to assign and
assess risk.

Consumers use coping strategies to tackle
online risks
Just as various coping strategies are a natural part of
everyday life offline, consumers also use coping strategies
on internet in order to handle perceived and actual risks. Of
the respondents, 93 percent say that they take some form
of protective measures when using the internet. In addition
to direct protection in the form of anti-virus software, coping
strategies include indirect measures such as being careful
when it comes to what websites to visit.
On the social web, sharing personal information and opinions is both a prerequisite and a key functionality. Personal
information is a wide term, covering everything from: name,
interest, political views and opinions to consumption
patterns. Online and in real life we constantly share personal
information, more or less actively and concisely. Given the
wide range of personal information it comes as no surprise
that different types of personal information varies in
sensitivity. Neither is it a paradox that 89 percent of users
say that they share personal information and opinions online
at least weekly. Simultaneously, results also show that
86 percent have felt hesitant to share personal information
online and that 68 percent have felt hesitant to express
their opinions.

Companies employ complex processes to collect and apply
personal information and it is not easy for consumers to
connect all the dots and understand how, when and for
what purpose their information is used.
Figure 2: Have you or someone close to you
experienced any of the following?
Someone
close to me

Myself
Censorship online

14%	

Virus on mobile phone

21%		

23%

Virus on computer

68%	

	

42%

Paid for something online
that never was delivered

14%	

	

20%

9%	

	

20%

Recieving threats online
Someone hacking your
e-mail account
Someone hacking your social
networking account
Surveillance
Identity theft online
Online fraud

	

28%		

19%

29%

20%		
32%
		
14%		
20%
13%		
	
11%		

27%
31%

86%

have felt hesitant to share
personal information

68%

have felt hesitant to express
their opinions online

Not connecting the dots
While 70 percent believe that companies can access and
use their personal information for commercial purposes,
56 percent claim that they would share less personal
information if they received a personalized ad based on
something they discussed in an email. Personalized ads are
today a prevalent feature of free email services. Yet people
do not seem to recognize this fact or to pay attention to it.

Source: Ericsson Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014
Base: All, 3,311 respondents

Ericsson consumerLab Privacy, security and safety online 5
PERSONAL SAFETY IS KEY
Other people the main concern online
Out of the respondents 48 percent agree that their online
behavior would be seriously affected if they found out that
individuals not acquainted to them could access and use
their personal information.
On the internet you are who you are; the results of the study
show that users predominately use their real identity online.
89 percent enter their correct personal information (as in real
name and email et cetera) when registering on different sites
and 81 percent do not use aliases when commenting or
expressing personal opinions online.
Even among an advanced internet sample, just over one in
10 users go so far as to hide their IP address, a behavior
that can be interpreted as anything from an attempt of trying

to protect your own identity, in order to stay safe from online
threats, to an attempt to conceal more or less illegal online
activity.

“If it’s only companies [that can
access your information], you don’t
have to be careful about how you
use your smartphone.”
— Female, 17, Sweden

“It’s not [social networks] that are making the
world corrupt. It’s the people that are on it.”
— Female, 20, U.S.

Figure 3: Share who agree their online behavior would be seriously affected if they found out that others could access
and use their personal information online.

48%
Yes, if it were other
individuals not acquainted with me

39%

39%

Yes, if it were a
national security agency

Yes, if it were
a financial institution
Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014
Base: All, 3,311 respondents

Support for the protection of personal integrity
There is firm support for freedom of speech among the
respondents in the survey. Only 8 percent state that it is
not important. At the same time, users acknowledge the
inevitable risks of libel online. Across the studied markets,
there is support for third party moderation, particularly on
issues of personal integrity such as threats, bullying and
slander. 80 percent believe it is OK to censor or block
personal threats on internet.
For non-personal issues concerning religion, government
and one’s country there is less support for censorship,
across all markets. In many cases there are small variations
between countries.

Figure 4: In which cases is it acceptable to censor or
block content on the Internet?
Personal threats

80%

20%

Bullying

79%

21%

Information that can compromise
national security

79%

21%

Pornographic content

78%

22%

Slander

76%

24%

Violent content

73%

27%

Rasist opinions or content

70%

30%
33%

67%

Sexist opinions or content
Criticsism against one’s country

48%

52%

Religious criticism

47%

53%

Criticism against government/state

32%
OK to censor

68%
Not OK to censor

Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014
Base: All, 3,311 respondents

6 Ericsson consumerLab Privacy, security and safety online
CONTINUING THE DISCUSSION
If one just looks at the numbers presented in this report,
consumer concerns seem to be quite high. However, given
that 96 percent say they will use internet as much or more in
the future, we detect no sign of privacy concerns hindering
the growing use of internet. Obviously, as internet becomes
an increasingly important part of just about everything in
our lives, hiccups as well as outright attacks will continue
to happen. However, so far the backlashes we have seen
have been limited in time or have affected a relatively small
group of individuals, while the majority of consumers agree
that the benefits of internet use outweigh the concerns.
We have passed the point of no return – as individuals, we
can no longer really imagine a life without internet. Internet
is no longer a separate layer on top of the physical society,
they are continuously merging and hence also needs to be
viewed and treated as one.
Having said that, uncertainties continue to influence our
online behavior. The possible aftereffect of backlashes,
although they will not bring a disruptive change in the
general usage of internet, will contribute to the evolution and
discussion on how internet should be used. Matters of trust
and the importance of respecting human rights issues such
as the right to privacy will lead to a continued discussion concerning personal safety online and will not likely fade away.
It is clear from the study that as individuals, we perceive
other individuals to be the main threat, not companies or
institutions. Our main focus is feeling secure on a personal
level. In this way internet is just another platform of social
activity as real as any other physical arena and inextricably
intertwined with our everyday lives. Internet can and will be
misused, but the blame goes to the perpetrator.
Going forward, successful services and solutions will have
to be better at catering to consumer needs to feel secure
personally. Transparency will be increasingly important
and also encompass the idea that information should be
both understandable and accessible. As an example,
consumers need to not only click “yes” under terms and
conditions online, they need to also understand what it

means to them – abstract legal terms are not good enough,
they need to concretely explain: How will others get
access to me and my personal information?
Consumers will also remain as sensitive to issues of libel
online as they are offline, if not more. Engaging with
consumers in order to find the right balance between
openness and measures to protect against various forms
of online threats will be of utmost importance.
In combination with earlier ConsumerLab research on this
and related topics, results show that consumers support
measures to protect personal integrity, examples of which
can be:

› Build consumer awareness around risk
assessment online
› Built-in protective measures from the onset
– privacy by design
	 · Embedding privacy measures in the design of technology,
in order to protect consumers’ personal information
and privacy.

› Moderation of forums and social media
to reduce slander, bullying and other
behaviors that threaten personal integrity
› Consequent usage of transparency and
permissibility in handling personal information
	 · Earlier Ericsson ConsumerLab studies have pointed to the
importance of clarity, being transparent and asking for
consumers’ permission, to use personal information importance
of being transparent and clearly asked for online.

› Offering consumers value sharing when
commercially exploiting personal information
	 · Consumer trust is also gained by ensuring that any commercial
use of personal information is reciprocated by returning
consumers some form of value, monetary or in the form
of improved service or product experience.

Ericsson consumerLab Privacy, security and safety online 7
Ericsson is a world-leading provider of communications technology and services.
We are enabling the Networked Society with efficient real-time solutions that allow
us all to study, work and live our lives more freely, in sustainable societies around
the world.
Our offering comprises services, software and infrastructure within Information and
Communications Technology for telecom operators and other industries. Today 40
percent of the world’s mobile traffic goes through Ericsson networks and we support
customers’ networks servicing more than 2.5 billion subscribers.
We are more than 110,000 people working with customers in more than 180 countries.
Founded in 1876, Ericsson is headquartered in Stockholm, Sweden. In 2013 the
company’s net sales were SEK 227 billion (USD 34.9 billion). Ericsson is listed
.4
on NASDAQ OMX, Stockholm and NASDAQ, New York stock exchanges.

The content of this document is subject to revision without
notice due to continued progress in methodology, design and
manufacturing. Ericsson shall have no liability for any error or
damage of any kind resulting from the use of this document.

Ericsson
SE-126 25 Stockholm, Sweden
Telephone +46 10 719 00 00
Fax +46 8 18 40 85
www.ericsson.com

EAB-13:051267 Uen
© Ericsson AB 2014

Contenu connexe

Tendances

Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
 
The ‘M Age’ And Beyond
The ‘M Age’ And BeyondThe ‘M Age’ And Beyond
The ‘M Age’ And Beyondhudsonpd
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital DivideDeniz Cengiz
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in iHassan Nasir
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
Name parul
Name parulName parul
Name parulParul231
 

Tendances (20)

Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
The ‘M Age’ And Beyond
The ‘M Age’ And BeyondThe ‘M Age’ And Beyond
The ‘M Age’ And Beyond
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Name parul
Name parulName parul
Name parul
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime by Suphiyaan
Cybercrime by SuphiyaanCybercrime by Suphiyaan
Cybercrime by Suphiyaan
 

En vedette

Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette RulesRaquelPG96
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLea Rodriguez
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette JessamenTino21
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and EtiquetteLea Rodriguez
 

En vedette (7)

Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Netiquette Rules
Netiquette RulesNetiquette Rules
Netiquette Rules
 
Lesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication TechnologyLesson 1: Introduction to Information and Communication Technology
Lesson 1: Introduction to Information and Communication Technology
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Lesson 2 Online Safety, Security, Ethics and Etiquette
Lesson 2   Online Safety, Security, Ethics and EtiquetteLesson 2   Online Safety, Security, Ethics and Etiquette
Lesson 2 Online Safety, Security, Ethics and Etiquette
 

Similaire à Ericsson ConsumerLab: Privacy, security and safety online

Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust ReportAVG Technologies
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy ReportFigLeaf
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalEricsson
 
public-safety-goes-personal-ericsson-consumerlab-2016
public-safety-goes-personal-ericsson-consumerlab-2016public-safety-goes-personal-ericsson-consumerlab-2016
public-safety-goes-personal-ericsson-consumerlab-2016Jan Thompson
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & ThievesLorena Magee
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
Kaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_engKaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_engEmisor Digital
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfRidhwanMG
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toAli Zeinoddini Meymand
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
Ericsson ConsumerLab: The networked life
Ericsson ConsumerLab: The networked lifeEricsson ConsumerLab: The networked life
Ericsson ConsumerLab: The networked lifeEricsson
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian_US
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 

Similaire à Ericsson ConsumerLab: Privacy, security and safety online (20)

Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
Not logging on, but living on
Not logging on, but living onNot logging on, but living on
Not logging on, but living on
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
The State of Privacy Report
The State of Privacy ReportThe State of Privacy Report
The State of Privacy Report
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personal
 
public-safety-goes-personal-ericsson-consumerlab-2016
public-safety-goes-personal-ericsson-consumerlab-2016public-safety-goes-personal-ericsson-consumerlab-2016
public-safety-goes-personal-ericsson-consumerlab-2016
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Kaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_engKaspersky lab consumer_security_risks_survey_2015_eng
Kaspersky lab consumer_security_risks_survey_2015_eng
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdf
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related to
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Ericsson ConsumerLab: The networked life
Ericsson ConsumerLab: The networked lifeEricsson ConsumerLab: The networked life
Ericsson ConsumerLab: The networked life
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 

Plus de Ericsson

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020Ericsson
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN OrchestrationEricsson
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
 

Plus de Ericsson (20)

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Ericsson ConsumerLab: Privacy, security and safety online

  • 1. CONSUMERLAB Privacy, security and safety online Consumer perspectives and behavior February 2014
  • 2. About this study Contents CONTENTS 2 internet reaches critical mass 3 CONCERNS AFFECT BEHAVIOR BUT NOT USAGE 4 ONLINE CONCERNS AND INCREASED INTERNET USE 5 PERSONAL SAFETY IS KEY 6 CONTINUING THE DISCUSSION 7 This report, Privacy, security and safety online, is the third installment from Ericsson ConsumerLab investigating matters of user privacy, integrity and security online.* The first report examined these issues on a high level, trying to map and understand the consumer, service provider and regulatory landscape. While the second report went on to explore different consumer benefits of sharing personal information, in this third report we look further into consumer concerns surrounding the usage of internet. As this report is based on an online survey, it should be noted that in countries with low internet penetration, the online population is often dominated by early adopters who are likely to display an equal, if not higher, level of maturity as that of the average user in markets with high internet penetration. *) Previous reports are: Consumer privacy in an online world (2012) and Personal information economy (2013). Daily internet users Markets included USA 44% Methodology Mexico 17% The survey was conducted through online questionnaires. A total of 3,311 respondents in six countries participated in the survey. The study represents 215 million daily internet users, in the ages 15-69 years, in the included markets. Sweden 60% Egypt 18% Pakistan 10% Thailand 21% Percentage of population The voice of the consumer Ericsson ConsumerLab has close to 20 years experience of studying people’s behaviors and values, including the way they act and think about ICT products and services. Ericsson ConsumerLab provides unique insights on market and consumer trends. Ericsson ConsumerLab gains its knowledge through a global consumer research program based on interviews with 100,000 individuals each year, in more than 40 countries and 15 megacities – statistically representing the views of 1.1 billion people. 2 Ericsson consumerLab Privacy, security and safety online Both quantitative and qualitative methods are used, and hundreds of hours are spent with consumers from different cultures. To be close to the market and consumers, Ericsson ConsumerLab has analysts in all regions where Ericsson is present, which gives a thorough global understanding of the ICT market and business models. All ConsumerLab reports can be found at: www.ericsson.com/consumerlab
  • 3. Internet reaches critical mass Internet maturity globally is reaching critical mass. People across the globe are becoming dependent on online connectivity in everyday life, work, and communication with authorities. If the potential of the internet thus far has been determined by technological advances, further realization of this potential will demand a deeper, more sociologically grounded understanding of the norms and rules of engagement on the internet. key findings › Consumers express concerns, which directly affect their online behavior - 68 percent have felt hesitant towards expressing opinions on the Internet. - 90 percent of those concerned say that it has a direct effect on their online behavior. › However, these concerns do not reduce internet activity - Only 4 percent state that privacy issues reduce their use of internet. › On the internet you are who you are - 89 percent enter their correct personal information when registering on different sites. - 81 percent use their correct information when commenting or expressing personal opinions online. › Uncertainty on when, where and how to assess risks online leads to consumers adopting coping strategies - 93 percent say they use some form of coping strategy to deal with risks online. - 58 percent are careful about what websites they visit. - 53 percent avoid giving out personal information online. › Strong support for internet freedom, but users acknowledge the risks of libel online - Across the studied markets, there is strong support for third party moderation on issues of personal integrity such as personal threats, bullying and slander. 80 percent find censorship of personal threats on the internet acceptable. Ericsson consumerLab Privacy, security and safety online 3
  • 4. CONCERNS AFFECT BEHAVIOR BUT NOT USAGE Internet used in many everyday activities Internet has shifted from being one specific aspect of consumers’ lives, to becoming an important infrastructure for many aspects of everyday life. As this shift has accelerated, the need for legal and social codes of conduct, or ground rules, has become evident. Risks influence the development of online activity According to the latest Ericsson Mobility Report from november 2013, there are now 1.9 billion smartphone subscriptions, anticipated to grow to 5.6 billion by 2019. As a part of this development and a growing maturity, consumers are becoming aware of online hazards. In the study, 70 percent of respondents find that safety issues such as viruses or fraud are a problem to them on the internet, 59 percent worry about surveillance online and to 56 percent privacy issues are a concern. It is evident that these concerns have not stopped the growth of internet; quite to the contrary, the number of internet users continues to grow unabatedly. The results from the study do show that issues of privacy, security and safety have a direct effect on how the internet is approached and used. It affects the degree of both commercial and social interaction online. However, what is notable is that among those who express concerns only 4 percent state that these issues have resulted in them using the internet less. This goes across all markets in the study. “I should probably care more than I do, but what am I going to do with that frustration? Cut myself off from everything, or not pay bills online?” — Male, 20, U.S. 10% 4% 11% 29% 70% Multiple choice question, sum adds up to more than 100 percent. Behavioral effects of security concerns online I ues the internet less consider security issues a problem while online 44% Figure 1: Share of consumers who consider matters of security a problem, while on their computer or mobile phone, and the behavioral effects of those concerns. I am more careful with what I write on the internet (e.g. on social networking sites or in forums) I am more careful with what personal information I give out about myself (e.g. when registering on sites) I am more careful when it comes to which websites I am visiting Base: All, 3,311 respondents It affects my internet use in other ways 44% It doesn’t affect my internet use at all Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014 Base: All, 3,311 respondents 4 Ericsson consumerLab Privacy, security and safety online
  • 5. ONLINE CONCERNS AND INCREASED INTERNET USE Experience and hearsay combined determine consumer perception of risk When it comes to first hand experiences of security risks, 68 percent have experienced computer viruses themselves but only 11 percent have been subject to fraud online. However, 31 percent state that someone close to them has been exposed to internet fraud. Another issue which has attracted much public attention is personal identities being hijacked (e.g. a friend posting in your name on Facebook) or stolen, and whereas 27 percent say that someone close to them have experienced this, only 13 percent have actually had their identity tampered with online. Consumer perception of risks builds on a blend of first-hand experiences and hearsay, from friends and acquaintances to media reporting. This creates awareness that risks exists but uncertainty about when, where and how to assign and assess risk. Consumers use coping strategies to tackle online risks Just as various coping strategies are a natural part of everyday life offline, consumers also use coping strategies on internet in order to handle perceived and actual risks. Of the respondents, 93 percent say that they take some form of protective measures when using the internet. In addition to direct protection in the form of anti-virus software, coping strategies include indirect measures such as being careful when it comes to what websites to visit. On the social web, sharing personal information and opinions is both a prerequisite and a key functionality. Personal information is a wide term, covering everything from: name, interest, political views and opinions to consumption patterns. Online and in real life we constantly share personal information, more or less actively and concisely. Given the wide range of personal information it comes as no surprise that different types of personal information varies in sensitivity. Neither is it a paradox that 89 percent of users say that they share personal information and opinions online at least weekly. Simultaneously, results also show that 86 percent have felt hesitant to share personal information online and that 68 percent have felt hesitant to express their opinions. Companies employ complex processes to collect and apply personal information and it is not easy for consumers to connect all the dots and understand how, when and for what purpose their information is used. Figure 2: Have you or someone close to you experienced any of the following? Someone close to me Myself Censorship online 14% Virus on mobile phone 21% 23% Virus on computer 68% 42% Paid for something online that never was delivered 14% 20% 9% 20% Recieving threats online Someone hacking your e-mail account Someone hacking your social networking account Surveillance Identity theft online Online fraud 28% 19% 29% 20% 32% 14% 20% 13% 11% 27% 31% 86% have felt hesitant to share personal information 68% have felt hesitant to express their opinions online Not connecting the dots While 70 percent believe that companies can access and use their personal information for commercial purposes, 56 percent claim that they would share less personal information if they received a personalized ad based on something they discussed in an email. Personalized ads are today a prevalent feature of free email services. Yet people do not seem to recognize this fact or to pay attention to it. Source: Ericsson Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014 Base: All, 3,311 respondents Ericsson consumerLab Privacy, security and safety online 5
  • 6. PERSONAL SAFETY IS KEY Other people the main concern online Out of the respondents 48 percent agree that their online behavior would be seriously affected if they found out that individuals not acquainted to them could access and use their personal information. On the internet you are who you are; the results of the study show that users predominately use their real identity online. 89 percent enter their correct personal information (as in real name and email et cetera) when registering on different sites and 81 percent do not use aliases when commenting or expressing personal opinions online. Even among an advanced internet sample, just over one in 10 users go so far as to hide their IP address, a behavior that can be interpreted as anything from an attempt of trying to protect your own identity, in order to stay safe from online threats, to an attempt to conceal more or less illegal online activity. “If it’s only companies [that can access your information], you don’t have to be careful about how you use your smartphone.” — Female, 17, Sweden “It’s not [social networks] that are making the world corrupt. It’s the people that are on it.” — Female, 20, U.S. Figure 3: Share who agree their online behavior would be seriously affected if they found out that others could access and use their personal information online. 48% Yes, if it were other individuals not acquainted with me 39% 39% Yes, if it were a national security agency Yes, if it were a financial institution Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014 Base: All, 3,311 respondents Support for the protection of personal integrity There is firm support for freedom of speech among the respondents in the survey. Only 8 percent state that it is not important. At the same time, users acknowledge the inevitable risks of libel online. Across the studied markets, there is support for third party moderation, particularly on issues of personal integrity such as threats, bullying and slander. 80 percent believe it is OK to censor or block personal threats on internet. For non-personal issues concerning religion, government and one’s country there is less support for censorship, across all markets. In many cases there are small variations between countries. Figure 4: In which cases is it acceptable to censor or block content on the Internet? Personal threats 80% 20% Bullying 79% 21% Information that can compromise national security 79% 21% Pornographic content 78% 22% Slander 76% 24% Violent content 73% 27% Rasist opinions or content 70% 30% 33% 67% Sexist opinions or content Criticsism against one’s country 48% 52% Religious criticism 47% 53% Criticism against government/state 32% OK to censor 68% Not OK to censor Source: Ericsson ConsumerLab, Privacy, security and safety online, 2014 Base: All, 3,311 respondents 6 Ericsson consumerLab Privacy, security and safety online
  • 7. CONTINUING THE DISCUSSION If one just looks at the numbers presented in this report, consumer concerns seem to be quite high. However, given that 96 percent say they will use internet as much or more in the future, we detect no sign of privacy concerns hindering the growing use of internet. Obviously, as internet becomes an increasingly important part of just about everything in our lives, hiccups as well as outright attacks will continue to happen. However, so far the backlashes we have seen have been limited in time or have affected a relatively small group of individuals, while the majority of consumers agree that the benefits of internet use outweigh the concerns. We have passed the point of no return – as individuals, we can no longer really imagine a life without internet. Internet is no longer a separate layer on top of the physical society, they are continuously merging and hence also needs to be viewed and treated as one. Having said that, uncertainties continue to influence our online behavior. The possible aftereffect of backlashes, although they will not bring a disruptive change in the general usage of internet, will contribute to the evolution and discussion on how internet should be used. Matters of trust and the importance of respecting human rights issues such as the right to privacy will lead to a continued discussion concerning personal safety online and will not likely fade away. It is clear from the study that as individuals, we perceive other individuals to be the main threat, not companies or institutions. Our main focus is feeling secure on a personal level. In this way internet is just another platform of social activity as real as any other physical arena and inextricably intertwined with our everyday lives. Internet can and will be misused, but the blame goes to the perpetrator. Going forward, successful services and solutions will have to be better at catering to consumer needs to feel secure personally. Transparency will be increasingly important and also encompass the idea that information should be both understandable and accessible. As an example, consumers need to not only click “yes” under terms and conditions online, they need to also understand what it means to them – abstract legal terms are not good enough, they need to concretely explain: How will others get access to me and my personal information? Consumers will also remain as sensitive to issues of libel online as they are offline, if not more. Engaging with consumers in order to find the right balance between openness and measures to protect against various forms of online threats will be of utmost importance. In combination with earlier ConsumerLab research on this and related topics, results show that consumers support measures to protect personal integrity, examples of which can be: › Build consumer awareness around risk assessment online › Built-in protective measures from the onset – privacy by design · Embedding privacy measures in the design of technology, in order to protect consumers’ personal information and privacy. › Moderation of forums and social media to reduce slander, bullying and other behaviors that threaten personal integrity › Consequent usage of transparency and permissibility in handling personal information · Earlier Ericsson ConsumerLab studies have pointed to the importance of clarity, being transparent and asking for consumers’ permission, to use personal information importance of being transparent and clearly asked for online. › Offering consumers value sharing when commercially exploiting personal information · Consumer trust is also gained by ensuring that any commercial use of personal information is reciprocated by returning consumers some form of value, monetary or in the form of improved service or product experience. Ericsson consumerLab Privacy, security and safety online 7
  • 8. Ericsson is a world-leading provider of communications technology and services. We are enabling the Networked Society with efficient real-time solutions that allow us all to study, work and live our lives more freely, in sustainable societies around the world. Our offering comprises services, software and infrastructure within Information and Communications Technology for telecom operators and other industries. Today 40 percent of the world’s mobile traffic goes through Ericsson networks and we support customers’ networks servicing more than 2.5 billion subscribers. We are more than 110,000 people working with customers in more than 180 countries. Founded in 1876, Ericsson is headquartered in Stockholm, Sweden. In 2013 the company’s net sales were SEK 227 billion (USD 34.9 billion). Ericsson is listed .4 on NASDAQ OMX, Stockholm and NASDAQ, New York stock exchanges. The content of this document is subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document. Ericsson SE-126 25 Stockholm, Sweden Telephone +46 10 719 00 00 Fax +46 8 18 40 85 www.ericsson.com EAB-13:051267 Uen © Ericsson AB 2014