2014 ISACA IT Risk/Reward Barometer UK Consumer Results. October

Size: px
Start display at page:

Download "2014 ISACA IT Risk/Reward Barometer UK Consumer Results. October 2014 www.isaca.org/risk-reward-barometer"

Transcription

1 2014 ISACA IT Risk/Reward Barometer UK Consumer Results October Media Inquiries: Kristen Kessinger, ISACA, , Aaron Berger, Ketchum, , 1. Which of the following best describes your employment status? Full-time employee 42% Retired 26% Part-time employee 9% Self-employed (either full- or part-time) 9% Student 6% Homemaker 4% Not employed 3% Prefer not to answer 1% 2. Do you own or regularly use any of the following connected devices? Regularly is defined here as using the device one or more times weekly. (Please select ONE for each.) OWN Smart TV (e.g., Apple TV, Samsung Smart 37% 23% Employee access card with sensor 18% 12% 8% Smart refrigerator 6% Smart watch 5% Smart glasses (e.g., headpiece that delivers 2% Other (please specify) 10% DO NOT OWN, BUT REGULARLY USE (1+ TIMES WEEKLY) Employee access card with sensor 9% 4% 3% Smart TV (e.g., Apple TV, Samsung Smart 3%

2 Other (please specify) 3% Smart refrigerator 2% 2% Smart watch 1% Smart glasses (e.g., headpiece that delivers 1% DO NOT OWN, NOR REGULARLY USE Smart glasses (e.g., headpiece that delivers 96% Smart watch 94% Smart refrigerator 93% 88% 87% Other 87% Employee access card with sensor 73% 73% Smart TV (e.g., Apple TV, Samsung Smart 60% 3. Which of the following connected devices, if any, would you like to get in the next year? (Please select all that apply.) You do not want to get any "connected 39% devices" in the next year Smart TV (e.g., Apple TV, Samsung Smart 25% 19% Smart watch 17% 16% 15% Smart refrigerator 11% Smart glasses (e.g., headpiece that delivers 8% Employee access card with sensor 3% 4. If a connected device had the following capabilities, which, if any, would be a positive addition to your life? (Please select all that apply.) Your car insurance rates are reduced after 52% your connected car communicates that you

3 have been driving safely on a consistent basis Messages sent to your device about a retail 24% location, when you are near the location A message from your refrigerator 13% congratulating you for making healthy choices, based on information received from your bathroom scale Ads in your sidebar showing 9% information you recently searched for online An encouraging message from your employer 9% after your fitness tracker shows that you achieved your weight loss goal You would not find any of these positive 33% 5. Which of the following statements, if any, best describes your overall approach toward managing the privacy of data collected on connected device(s) you use (for example, having control over who sees or uses your personal data)? (Please select ONE.) OWN BASE - OWN CONNECTED DEVICE IN 591 Q2 Take Charge (You proactively manage 59% privacy settings) Reactive (You manage privacy settings when 30% you become aware of a privacy issue) Passive (You don t actively manage privacy 11% settings) DO NOT OWN, BUT REGULARLY USE (1+ TIMES WEEKLY) BASE DO NOT OWN BUT REGULARLY 190 USE CONNECTED DEVICE IN Q2 Take Charge (You proactively manage 60% privacy settings) Reactive (You manage privacy settings when 27% you become aware of a privacy issue) Passive (You don t actively manage privacy 12% settings) OWN/DO NOT OWN, BUT REGULARLY USE (1+ TIMES WEEKLY) BASE - OWN OR REGULARLY USE 648 CONNECTED DEVICE IN Q2 Take Charge (You proactively manage 58% privacy settings) Reactive (You manage privacy settings when 30% you become aware of a privacy issue) Passive (You don t actively manage privacy 11% settings)

4 6. Do you think the data collected on each of the following connected devices are private or not (for example, you have control over who sees and uses your information)? (Please select yes, private or no, not private for each.) YES, PRIVATE 38% Smart refrigerator 37% Smart watch 36% Smart TV (e.g., Apple TV, Samsung Smart 34% Smart glasses (e.g., headpiece that delivers 29% 27% 23% Employee access card with sensor 21% NO, NOT PRIVATE Employee access card with sensor 51% 49% 45% Smart TV (e.g., Apple TV, Samsung Smart 37% Smart glasses (e.g., headpiece that delivers 34% Smart watch 29% Smart refrigerator 29% 28% DON T KNOW Smart glasses (e.g., headpiece that delivers 37% Smart watch 35% Smart refrigerator 35% 34% Employee access card with sensor 28% Smart TV (e.g., Apple TV, Samsung Smart 28% 28% 27%

5 7. Do you think the data collected on each of the following connected devices are secure or not (for example, your data would be safe from being stolen or misused by a cybercriminal)? (Please select yes, secure or no, not secure for each.) YES, SECURE Employee access card with sensor 25% Smart refrigerator 25% Smart TV (e.g., Apple TV, Samsung Smart 23% 23% Smart watch 21% 20% 20% Smart glasses (e.g., headpiece that delivers 17% NO, NOT SECURE 43% Smart glasses (e.g., headpiece that delivers 41% 40% Smart TV (e.g., Apple TV, Samsung Smart 40% 39% Employee access card with sensor 39% Smart watch 38% Smart refrigerator 34% DON T KNOW Smart glasses (e.g., headpiece that delivers 42% Smart watch 41% Smart refrigerator 41% 41% 37% Smart TV (e.g., Apple TV, Samsung Smart 37% 37% Employee access card with sensor 36%

6 8. For which of the following connected devices, if any, do you think the benefit(s) outweigh the potential privacy risk(s)? (Please select all that apply.) Mention Any (NET) 64% Smart TV (e.g., Apple TV, Samsung Smart 34% 33% 29% 20% Employee access card with sensor 19% Smart refrigerator 17% Smart watch 15% Smart glasses (e.g., headpiece that delivers 11% None of the above 36% Other 0% 9. Which, if any, of the following have increased your concern about the privacy of your personal data over the past year (for example, having control over who sees and uses your information)? (Please select all that apply.) Mention Any (NET) 88% Social media platforms (e.g., Twitter, 66% Facebook) Data breaches at retailers 63% Increased availability of connected devices 46% Other 3% Nothing has increased your concern about the 12% privacy of your personal data 10. Which of the following, if any, concerns you most about the information delivered to connected/ Internet of Things devices (i.e., devices that connect with each other or to the Internet)? (Please select ONE.) Someone will hack into the device and do 31% something malicious. You don t know how the information that is 22% collected by these device(s) will be used. Companies/organizations will sell your 19% personal information to other companies/organizations. Companies/organizations will be able to track 12% your life (e.g., actions, whereabouts, etc.). Companies/organizations will use your 8% personal information to market to you. Other 0% You have no concerns 7%

7 11. Which of the following wearable connected devices, if any, would you consider using in your current workplace? (Please select all that apply.) BASE - IF EMPLOYED IN QS1 611 Mention Any (NET) 62% Employee access card with sensor 41% Smart watch 28% 17% Smart glasses (e.g., headpiece that delivers 11% Other 0% You would not consider using any wearable 38% "connected devices" in your current workplace 12. How would your behavior change, if at all, if a stranger near you was using a wearable device with a built-in-camera? (Please select ONE.) You would be more reserved 64% You would not change your usual behavior 32% You would be less reserved 3% 13. Where do you plan to do the majority of your holiday shopping, if at all, this year? (Please select ONE.) Online, from a personal device 42% Brick and mortar stores (e.g., have physical 32% shopping locations) Online, from a work-supplied device 4% You do not plan to do any holiday shopping 21% this year 14. How much, if anything, have you read or heard about data breaches at major retailers over the past year? (Please select ONE.) Some 47% Only a little 25% A lot 18% Nothing at all 10% 15. Which of the following, if any, have you done as a result of data breaches at various major retailers over the past year? (Please select all that apply.) BASE - IF HAVE HEARD A LOT/SOME/ONLY A LITTLE ABOUT DATA BREACHES IN Q14 You changed one or more of your online passwords and/or pin codes You shopped less frequently at one or more of the retailers that experienced a breach % 14% You started using cash more often when 14%

8 shopping, instead of credit cards You made fewer online purchases using 13% mobile devices (e.g., smartphone, tablet, laptop) You made fewer online purchases using 11% something other than a mobile device (e.g., desktop computer) You haven t changed your shopping behavior 32% as a result of these data breaches Note: Due to rounding, percentages may not add up to 100, where relevant About ISACA s 2014 IT Risk/Reward Barometer The annual IT Risk/Reward Barometer is a global indicator of trust in information. Conducted by ISACA, a global association of more than 115,000 IT security, assurance, risk and governance professionals, the Barometer polls thousands of business and IT professionals and consumers worldwide to uncover attitudes and behaviors about essential technologies and information, and the trade-offs people make to balance risk and reward. The study is based on September 2014 online polling of 1,646 ISACA members from 110 countries. Additional online surveys were fielded by M/A/R/C Research among 1,209 consumers in the US, 1,001 consumers in the UK, 1,007 consumers in India and 1,007 consumers in Australia. The US survey ran 8-11 September 2014, and the UK, India and Australia surveys ran 8-17 September At a 95 percent confidence level, the margin of error for each individual country sample is: US: +/- 2.8 percent and UK/India/Australia: +/- 3.1%. To see the full results, visit

Benefits From the Internet of Things For Your Organization

Benefits From the Internet of Things For Your Organization 2014 IT Risk/Reward Barometer Latin America Results November 2014 www.isaca.org/risk-reward-barometer Number of respondents (n) = 102 Respondents are business and IT professionals who are members of ISACA.

More information

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer Risks and Rewards of the Internet of Things Findings From ISACA s 2013 IT Risk/Reward Barometer The world is increasingly being populated by connected devices that collect and share information over the

More information

2012 IT Risk/Reward Barometer: UK. November 2012 www.isaca.org/risk-reward-barometer *n=159

2012 IT Risk/Reward Barometer: UK. November 2012 www.isaca.org/risk-reward-barometer *n=159 2012 IT Risk/Reward Barometer: UK November 2012 www.isaca.org/risk-reward-barometer *n=159 Respondents are business and IT professionals from the UK and are members of ISACA. Media Inquiries: Kristen Kessinger,

More information

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY RISKS AND REWARDS OF CONNECTED DEVICES THE HIDDEN INTERNET OF THINGS ISACA 2015 IT RISK / REWARD BAROMETER The Internet of Things paints a vision of a carefree, seamlessly connected world where interconnected

More information

Microsoft Get It Done Survey of Office Workers

Microsoft Get It Done Survey of Office Workers Microsoft Get It Done Survey of Office Workers Executive Summary and Survey Results Presented by: Harris Interactive Public Relations Research November 2013 About the Survey Survey Method This survey was

More information

Generational differences

Generational differences Generational differences A generational shift in media use is evident from the Digital Australians research, with differences most pronounced between 18 to 29 year olds and those aged 55 and over. Some

More information

7TH ANNUAL PARENTS, KIDS & MONEY SURVEY: SUPPLEMENTAL DATA

7TH ANNUAL PARENTS, KIDS & MONEY SURVEY: SUPPLEMENTAL DATA Detailed Results 7TH ANNUAL PARENTS, KIDS & MONEY SURVEY: SUPPLEMENTAL DATA T. Rowe Price November 2015 Contents Holiday Spending Habits Holiday Spending Data Cuts By Parent Gender By Saver vs. Spender

More information

Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013

Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013 Internet Security Priorities Prepared for: Presented by: Benenson Strategy Group and American Viewpoint December 20, 2013 Methodology The Benenson Strategy Group and American Viewpoint conducted 1,000

More information

2014 GLOBAL CUSTOMER SERVICE BAROMETER COMPARISON OF FINDINGS ACROSS MARKETS

2014 GLOBAL CUSTOMER SERVICE BAROMETER COMPARISON OF FINDINGS ACROSS MARKETS 2014 GLOBAL CUSTOMER SERVICE BAROMETER COMPARISON OF FINDINGS ACROSS MARKETS Research Methods This research was completed online among a random sample of consumers aged 18+ in: U.S. Canada Mexico Italy

More information

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online

Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012

More information

National Cyber Policy Office

National Cyber Policy Office National Cyber Policy Office Research into cyber security behaviours and campaign awareness for Connect Smar t 2014 A C O L M A R B R U N T O N R E P O R T F O R T H E D E P A R T M E N T O F T H E P R

More information

Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers

Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers Sponsored by Trend Micro Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute

More information

2012 NCSA / McAfee Online Safety Survey

2012 NCSA / McAfee Online Safety Survey 2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security

More information

Pearson Student Mobile Device Survey 2013

Pearson Student Mobile Device Survey 2013 Pearson Student Mobile Device Survey 2013 National Report: College Students Conducted by Harris Interactive Field dates: January 28 February 24, 2013 Report date: April 17, 2013 Table of Contents Background

More information

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned

More information

Despite Widespread Concerns about Online Security, Three in Four Adults Access Financial Accounts Online

Despite Widespread Concerns about Online Security, Three in Four Adults Access Financial Accounts Online Despite Widespread Concerns about Online Security, Three in Four Adults Access Financial Accounts Online Nine in Ten Say Companies Should Be Doing More to Protect Personal and Financial Information Online

More information

Bring your. own device

Bring your. own device Bring your own device BYOD One thing is clear: Bring Your Own Device has landed and is here to stay. Employers need to understand what it means, the benefits it could bring and the risks it presents to

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

GfK 2016 Tech Trends 2016

GfK 2016 Tech Trends 2016 1 Contents 1 2 3 Evolving behavior today s connected consumers Driving you forward 10 tech trends for 2016 Growth from knowledge turning research into smart business decisions 2 Evolving behavior today

More information

How To Prevent Cybercrime

How To Prevent Cybercrime 2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,

More information

The Cisco Connected World Technology Report

The Cisco Connected World Technology Report The Cisco Connected World Technology Report September 21, 2011 2011 Cisco and/or its affiliates. All rights reserved. 1 Timing and Sample Qualifications This report discusses the findings for 1,441 College

More information

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect

More information

Privacy and Security in a Connected Life: A Study of European Consumers

Privacy and Security in a Connected Life: A Study of European Consumers Privacy and Security in a Connected Life: A Study of European Consumers Sponsored by Trend Micro Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research

More information

Austin Bedsaul 16 September 2014 Informative Speech CAS 100B Identity Theft Outline Introduction I. Attention Grabber Did you know that research has

Austin Bedsaul 16 September 2014 Informative Speech CAS 100B Identity Theft Outline Introduction I. Attention Grabber Did you know that research has Austin Bedsaul 16 September 2014 Informative Speech CAS 100B Identity Theft Outline Introduction I. Attention Grabber Did you know that research has shown that identity theft has become the fastest evolving

More information

Consumer Barometer. Country Report France

Consumer Barometer. Country Report France Consumer Barometer Country Report France Table of Content Where to find what The Multiscreen World - Internet usage 06-10 - Devices 11-15 The Smart Shopper - Research behavior 16-26 - Purchase behavior

More information

Beyond e-commerce to everywhere-commerce. Accelerating UK retailers digital presence to compete globally. www.gov.uk/ukti

Beyond e-commerce to everywhere-commerce. Accelerating UK retailers digital presence to compete globally. www.gov.uk/ukti Beyond e-commerce to everywhere-commerce Accelerating UK retailers digital presence to compete globally www.gov.uk/ukti UK Trade & Investment Follow us @UKTIRetail Consumer spend fuelled by technology

More information

Don t Let A Security Breach Put You Out of Business

Don t Let A Security Breach Put You Out of Business Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device

More information

Results, 1st Quarter 2016. Patient Engagement. www.himss.eu/analytics. HIMSS Analytics ehealth TRENDBAROMETER Q1/2016

Results, 1st Quarter 2016. Patient Engagement. www.himss.eu/analytics. HIMSS Analytics ehealth TRENDBAROMETER Q1/2016 Results, 1st Quarter 2016 Patient Engagement www.himss.eu/analytics 1 TABLE OF CONTENT HIMSS Analytics Who we are page 3 Survey overview page 4 Results Overall page 9 Formal strategy page 10 Tools provided

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

2014 GLOBAL CUSTOMER SERVICE BAROMETER FINDINGS IN THE UNITED STATES

2014 GLOBAL CUSTOMER SERVICE BAROMETER FINDINGS IN THE UNITED STATES 2014 GLOBAL CUSTOMER SERVICE BAROMETER FINDINGS IN THE UNITED STATES Research Methods This research was completed online among a random sample of consumers aged 18+. A total of 1,000 interviews were completed.

More information

Get New Customers With YouTube Advertising

Get New Customers With YouTube Advertising Get New Customers With YouTube Advertising What We Do We produce a 30 second video We find your target audience We keep you informed with reports Free of Charge We ensure that the right people see your

More information

Clothing and Shoe Retail: The Buying Preferences of In-Store vs. Online Consumers. September 2014 Insight Report

Clothing and Shoe Retail: The Buying Preferences of In-Store vs. Online Consumers. September 2014 Insight Report Clothing and Shoe Retail: The Buying Preferences of In-Store vs. Online Consumers September 2014 Insight Report About this Insight Report CivicScience developed this report using our InsightStore solution

More information

Personal Safety Tips For Public Information Technology

Personal Safety Tips For Public Information Technology IDENTITY THEFT Practical Tips to Do Your Best David L. Haase November 21, 2015 OPCUG / PATACS 1 Today s Agenda Who is This Guy? Are You a Target? I.D. Theft vs. Stalking What Do Thieves Target? Have a

More information

Racing Toward a Complete Digital Lifestyle: Digital Consumers Crave More

Racing Toward a Complete Digital Lifestyle: Digital Consumers Crave More Racing Toward a Complete Digital Lifestyle: Digital Consumers Crave More Accenture Digital Consumer Tech Survey 2014 Table of Contents Racing toward a complete digital lifestyle: 03 digital consumers crave

More information

Enterprise mobility trends 2015 and beyond

Enterprise mobility trends 2015 and beyond Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources

More information

A Survey of Needs and Services for Postsecondary Nontraditional Students

A Survey of Needs and Services for Postsecondary Nontraditional Students A Survey of Needs and Services for Postsecondary Nontraditional Students Part I: A Survey of Postsecondary Nontraditional Students What is a nontraditional student? You have been asked to participate in

More information

2013 CONSUMER VIEWS OF EMAIL MARKETING

2013 CONSUMER VIEWS OF EMAIL MARKETING BLUEHORNET REPORT: 213 CONSUMER VIEWS OF EMAIL MARKETING For two consecutive years, BlueHornet has surveyed over 1, consumers across the United States to better understand their behavior and sentiment

More information

Back- to- School Consumer Pulse Poll 07.07.2015

Back- to- School Consumer Pulse Poll 07.07.2015 Back- to- School Consumer Pulse Poll 07.07.2015 Methodology Rubicon Project engaged global polling firm Penn Schoen Berland to conduct 1000 online interviews (MOE ±3.1%) among parents of children in grades

More information

The definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There

The definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There The definitive guide to consumer perceptions on home security in Australia Secure Homes Report 2012 ADT Always There KEY FINDINGS AT A GLANCE 30% of surveyed residents have been a victim of a break-in

More information

UK children s media literacy

UK children s media literacy Research Document Publication date: April 2011 Contents Section 1 Executive summary 2 Introduction 3 Children s take-up of media 4 Children s use of media 5 Knowledge and understanding of media among

More information

Business Statistics: Chapter 2: Data Quiz A

Business Statistics: Chapter 2: Data Quiz A CHAPTER 2 Quiz A Business Statistics, 2nd ed. 2-1 Business Statistics: Chapter 2: Data Quiz A Name 1. The mission of the Pew Internet & Life Project is to explore the impact of the Internet on families,

More information

It s time businesses wake up to mobile security reality

It s time businesses wake up to mobile security reality GFI White Paper It s time businesses wake up to mobile security reality Bring Your Own Device (BYOD) isn t just a faze, nor are the associated security risks. Contents Introduction 3 Mobile Device Management

More information

The Ariel Mutual Funds/Charles Schwab & Co., Inc. Black Investor Survey. Saving and Investing Among High Income African-American and White Americans

The Ariel Mutual Funds/Charles Schwab & Co., Inc. Black Investor Survey. Saving and Investing Among High Income African-American and White Americans The Ariel Mutual Funds/Charles Schwab & Co., Inc. Black Investor Survey: Saving and Investing Among High Income African-American and Americans April, 2000 0 Prepared for Ariel Mutual Funds and Charles

More information

Wireless (In)Security Trends in the Enterprise

Wireless (In)Security Trends in the Enterprise A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc. All rights reserved. WiFi is proliferating fast.

More information

BY Maeve Duggan NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE AUGUST 19, 2015 FOR FURTHER INFORMATION ON THIS REPORT:

BY Maeve Duggan NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE AUGUST 19, 2015 FOR FURTHER INFORMATION ON THIS REPORT: NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE AUGUST 19, 2015 BY Maeve Duggan FOR FURTHER INFORMATION ON THIS REPORT: Maeve Duggan, Research Associate Dana Page, Senior Communications Manager

More information

METHODOLOGY THANKS TO CONNECTED DEVICES LIKE TABLETS AND SMARTPHONES, THE WAY PEOPLE SHOP IS CHANGING DRAMATICALLY.

METHODOLOGY THANKS TO CONNECTED DEVICES LIKE TABLETS AND SMARTPHONES, THE WAY PEOPLE SHOP IS CHANGING DRAMATICALLY. METHODOLOGY THANKS TO CONNECTED DEVICES LIKE TABLETS AND SMARTPHONES, THE WAY PEOPLE SHOP IS CHANGING DRAMATICALLY. We aim to better prepare brands for the future of retail. So for the second consecutive

More information

Key Digital Trends for 2014

Key Digital Trends for 2014 December 12, 2013 Key Digital Trends for 2014 Presented by: Noah Elkin Principal Analyst Sponsored by: Agenda: emarketer sees four key trends affecting digital marketing in 2014 No. 1: Mobile moves to

More information

Hiring a Support Worker. A guide for Ontarians with a developmental disability

Hiring a Support Worker. A guide for Ontarians with a developmental disability Hiring a Support Worker A guide for Ontarians with a developmental disability Please note: This guide is not financial or legal advice. It is intended to provide general information to help you learn more

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security Senaca Shield Presents 10 Top Tip For Small Business Cyber Security Presented by Liam O Connor www.senacashield.com info@senacashield.com #Senacashield Small businesses need cyber security too. This slide

More information

Residential Broadband (High Speed Internet) Survey

Residential Broadband (High Speed Internet) Survey Residential Broadband (High Speed Internet) Survey Through the leadership of the Muskegon County Broadband Initiative, the support of the county s Infrastructure and Economic Development Committee, the

More information

The Hottest Topics for the Hottest Topics for Bar Leaders

The Hottest Topics for the Hottest Topics for Bar Leaders The Hottest Topics for the Hottest Topics for Bar Leaders Toronto NCBP Meeting, August 2011 Don t Fall Down Where Technology is Concerned 6 hot tips in 18 minutes! 1. Don t give me no SAAS 2. What is that

More information

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Overview. Travel consumer online habits

Overview. Travel consumer online habits Overview Technology and the internet have created a revolution in tourism marketing. The internet not only inspires and provides consumers with information on potential travel destinations; it also enables

More information

Bargain Hunting for Bonds: How Investors Shop. July 2013

Bargain Hunting for Bonds: How Investors Shop. July 2013 Bargain Hunting for Bonds: How Investors Shop July 2013 Table of Contents Methodology 2 Detailed Findings 3 Demographics 12 Disclosures 16 1 Methodology What This online study was conducted for by Koski

More information

Children and parents: media use and attitudes report

Children and parents: media use and attitudes report Children and parents: media use and attitudes report Research Document Publication date: 25 October 2011 Contents Section Annex Page 1 Executive summary 2 2 Introduction 11 3 Children s take-up of media

More information

Residential Broadband and Technology (High Speed Internet) Survey

Residential Broadband and Technology (High Speed Internet) Survey Residential Broadband and Technology (High Speed Internet) Survey Through the leadership of the Muskegon County Broadband Initiative, the support of the county s Infrastructure and Economic Development

More information

Key Trends in Enterprise Mobility. Shaun Collins CEO @shauncollins shaun.collins@ccsinsight.com

Key Trends in Enterprise Mobility. Shaun Collins CEO @shauncollins shaun.collins@ccsinsight.com Key Trends in Enterprise Mobility Shaun Collins CEO @shauncollins shaun.collins@ccsinsight.com Evolving from a PC/Notebook World to Smartphone/Tablet/Hybrid World 2 2 Mobility Is Now Much More Than Just

More information

Special Eurobarometer 423 CYBER SECURITY SUMMARY

Special Eurobarometer 423 CYBER SECURITY SUMMARY Special Eurobarometer 423 CYBER SECURITY SUMMARY Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated

More information

Identity Theft: Who s At Risk? AARP Survey of Washington Residents on Identity Theft Prevention

Identity Theft: Who s At Risk? AARP Survey of Washington Residents on Identity Theft Prevention Identity Theft: Who s At Risk? AARP Survey of Washington Residents on Identity Theft Prevention Report Prepared by Karla Pak and Katherine Bridges October 2014 Copyright 2014 AARP AARP Research 601 E Street

More information

Poll Results - TIME Mobility Poll, in cooperation with Qualcomm

Poll Results - TIME Mobility Poll, in cooperation with Qualcomm Poll Results - TIME Mobility Poll, in cooperation with Qualcomm Timing: Quantitative Online Survey: June 29 July 28, 12 Quantitative Phone Survey: July 10 July 25, 12 Audiences: Geographies and Methodology:

More information

July 2015 CPS Computer and Internet Use Supplement

July 2015 CPS Computer and Internet Use Supplement July 2015 CPS Computer and Internet Use Supplement Final Version CMPINT DESKTP This month we are asking some additional questions about the Internet, computers, mobile phones, tablets, and other connected

More information

2013 choicestream survey: CONSUMER OPINIONS on ONLINE ADVERTISING & AUDIENCE TARGETING results & findings

2013 choicestream survey: CONSUMER OPINIONS on ONLINE ADVERTISING & AUDIENCE TARGETING results & findings 2013 choicestream survey: CONSUMER OPINIONS on ONLINE ADVERTISING & AUDIENCE TARGETING results & findings introduction ChoiceStream- the next generation poll driven programmatic media optimization solution

More information

Eighth Annual Study of Employee Benefits Today & Beyond

Eighth Annual Study of Employee Benefits Today & Beyond Eighth Annual Study of Employee Benefits Today & Beyond Delivering the Benefits Message The Prudential Insurance Company of America (Prudential) 751 Broad Street, Newark, NJ 0255594-00001-00 Overall, usage

More information

TABLE OF CONTENTS. 1 Introduction. 2 Top Findings. 3-4 Chapter 1: Who, What, Where & How Much

TABLE OF CONTENTS. 1 Introduction. 2 Top Findings. 3-4 Chapter 1: Who, What, Where & How Much LIGHTSPEED S ANNUAL INDEPENDENT RETAIL TECHNOLOGY ADOPTION REPORT 2016 TABLE OF CONTENTS 1 Introduction 2 Top Findings 3-4 Chapter 1: Who, What, Where & How Much 5 Chapter 2: Shifting Budget Priorities

More information

PATIENTS WANT A HEAVY DOSE OF DIGITAL

PATIENTS WANT A HEAVY DOSE OF DIGITAL PATIENTS WANT A HEAVY DOSE OF DIGITAL Healthcare consumers in the United States want a digitally enabled care experience, and they are initiating it with greater use of digital tools and electronic health

More information

Pearson Student Mobile Device Survey 2014

Pearson Student Mobile Device Survey 2014 Pearson Student Mobile Device Survey 2014 National Report: College Students Conducted by Harris Poll Field dates: February 13 March 12, 2014 Report date: May 16, 2014 Table of Contents Background & Objectives

More information

Baby Boomers Are Revolutionizing Retirement:

Baby Boomers Are Revolutionizing Retirement: Baby Boomers Are Revolutionizing Retirement: Are Their Employers Ready, Willing and Able to Accommodate? A White Paper by Catherine Collinson for Retirement Studies March 2015 Baby Boomers Are Revolutionizing

More information

December 2013. Small Business Employee Survey

December 2013. Small Business Employee Survey December 2013 Small Business Employee Survey INTRODUCTION Technology has changed the way we communicate, socialize and do business. Every day, millions of employees in the US use some form of technology

More information

EMBRACING NEW TECHNOLOGY: MOBILE HEALTH. Sponsored by: Irving Levin Associates Health Care and Senior Housing M&A Since 1948

EMBRACING NEW TECHNOLOGY: MOBILE HEALTH. Sponsored by: Irving Levin Associates Health Care and Senior Housing M&A Since 1948 EMBRACING NEW TECHNOLOGY: MOBILE HEALTH Sponsored by: Irving Levin Associates Health Care and Senior Housing M&A Since 1948 MOBILE TECHNOLOGY WILL PLAY A KEY ROLE IN MITIGATING FORESEEABLE HEALTHCARE COSTS

More information

For more information regarding the survey findings, visit www.csod.com/resources/research/state-of-workplace-productivity- 2013 TOTAL

For more information regarding the survey findings, visit www.csod.com/resources/research/state-of-workplace-productivity- 2013 TOTAL About the Survey s The State of Workplace Productivity Report survey was conducted between August 16 and August 23, 2013 among 1,029 employed Americans ages 18 and over, using an email invitation and an

More information

Security in а multi-device world: the customer s point of view

Security in а multi-device world: the customer s point of view the customer s point of view August, 2013 Introduction The world of digital devices is constantly changing. New gadgets, online services and applications are appearing all the time. More and more people

More information

2016 top business trends

2016 top business trends 2016 top business trends Being aware of trends in business is important, regardless of the size of your enterprise. Change is occurring at a rapid rate, and staying on top of the latest trends can help

More information

We will discuss how to manage your own ecommerce booking through your website rather than through a booking agent and how this can integrate.

We will discuss how to manage your own ecommerce booking through your website rather than through a booking agent and how this can integrate. Every day, more and more people are going online to research and book their holiday or experience. As such it is important to ensure that your website can be easily found and that you capture those potential

More information

How Much Is the Data on Your Mobile Device Worth?

How Much Is the Data on Your Mobile Device Worth? How Much Is the Data on Your Mobile Device Worth? Sponsored by Lookout Independently conducted by Ponemon Institute LLC Publication Date: January 2016 Ponemon Institute Research Report Part 1. Introduction

More information

Main Question 1: How and where do you or your family use the Internet - whether on a computer or a cell phone? Follow up questions for INTERNET USERS

Main Question 1: How and where do you or your family use the Internet - whether on a computer or a cell phone? Follow up questions for INTERNET USERS TABLE 1: Current Internet use Main Question 1: How and where do you or your family use the Internet - whether on a computer or a cell phone? Follow up questions for INTERNET USERS 1. What do you use to

More information

Data Challenges In The Changing Landscape of ecommerce

Data Challenges In The Changing Landscape of ecommerce Data Challenges In The Changing Landscape of ecommerce Your Duty of Care For Your Customer s Information Christine Bardwell Research Manager, IDC Retail Insights cbardwell@idc.com @C_Bardwell Data: from

More information

Commissioned Study. SURVEY: Mobile Threats are Real and Costly

Commissioned Study. SURVEY: Mobile Threats are Real and Costly Commissioned Study SURVEY: Mobile Threats are Real and Costly Introduction A lack of integrated mobile security is costing companies in terms of everything from lost productivity to lost data. Cyber criminals

More information

The Risks and Rewards of Social Media and Mobile Devices

The Risks and Rewards of Social Media and Mobile Devices The Risks and Rewards of Social Media and Mobile Devices October 29-30, 2012 Tony Brooks, CISA Principal & Director of IT Assurance Tony and Brooks, Risk Services CISA, CRISC Partner HORNE - IT LLP Assurance

More information

Mobile Marketing for Brick & Mortar Businesses

Mobile Marketing for Brick & Mortar Businesses Mobile Marketing for Brick & Mortar Businesses What is Mobile Marketing? And Why Should You Care? Engaging your customers with their smartphone, because THEY ASKED TO HEAR FROM YOU Combines elements of

More information

EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013

EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013 EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013 EUROPEAN MOBILE INSIGHTS: 2012 NORTON CYBERCRIME REPORT 9 COUNTRIES DENMARK, FRANCE, GERMANY, ITALY, NETHERLANDS, POLAND, RUSSIA, SWEDEN,

More information

HOW TABLETS CAN STEAL A MARCH ON LAPTOPS The Next Battleground: Tablet Text Input. KeyPoint Technologies Bringing Devices to Life July 2011

HOW TABLETS CAN STEAL A MARCH ON LAPTOPS The Next Battleground: Tablet Text Input. KeyPoint Technologies Bringing Devices to Life July 2011 HOW TABLETS CAN STEAL A MARCH ON LAPTOPS The Next Battleground: Tablet Text Input KeyPoint Technologies Bringing Devices to Life July 2011 Foreword An analysis of reviews and analyst reports reveals that

More information

Reducing Cyber Risk in Your Organization

Reducing Cyber Risk in Your Organization Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than

More information

Apple Pay & The New Environment for Mobile Payment Apps

Apple Pay & The New Environment for Mobile Payment Apps Apple Pay & The New Environment for Mobile Payment Apps November 3, 2014 Greg Weed Greg.Weed@phoenixmi.com 828-697-9192 Events, Timing & Methodology I SEPT 9 Apple Press Conference SEPT 18 2104 CPM Data

More information

Apple Pay & The New Environment for Mobile Payment Apps

Apple Pay & The New Environment for Mobile Payment Apps Apple Pay & The New Environment for Mobile Payment Apps Events, Timing & Methodology I SEPT 9 Apple Press Conference SEPT 18 2104 CPM Data Collection SEPT 25 iphone6 In-Stores Consumer Payments Monitor

More information

Hard vs. Soft Tokens Making the Right Choice for Security

Hard vs. Soft Tokens Making the Right Choice for Security Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

Digital Trust in the IoT Era

Digital Trust in the IoT Era Digital Trust in the IoT Era The amount of personal data that companies can now collect on consumers is unprecedented and growing. New connected devices will help companies to capture whole new categories

More information

Digital Consumer s Online Trends and Risks

Digital Consumer s Online Trends and Risks Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and

More information

Have you ever accessed

Have you ever accessed HIPAA and Your Mobile Devices Not taking the appropriate precautions can be very costly. 99 BY MARK TERRY Alexey Poprotskiy Dreamstime.com Have you ever accessed patient data offsite using a laptop computer,

More information

Smart Desktop Virtualization for the Mobile Workforce. Survey of IT pros highlights untapped benefits of VDI and DaaS in a mobile-first world

Smart Desktop Virtualization for the Mobile Workforce. Survey of IT pros highlights untapped benefits of VDI and DaaS in a mobile-first world Smart Desktop Virtualization for the Mobile Workforce Survey of IT pros highlights untapped benefits of VDI and DaaS in a mobile-first world TABLE OF CONTENTS Introduction Simplified, secure management:

More information

Personal Cloud Survey: Hype vs. Reality. Research Report

Personal Cloud Survey: Hype vs. Reality. Research Report Personal Cloud Survey: Hype vs. Reality Research Report August, 2011 Personal Cloud Survey: Hype vs. Reality Table of Contents I. EXECUTIVE SUMMARY...... 3 II. SURVEY RESULTS... 6 III. CONCLUSION... 14

More information

Michigan Department of Community Health

Michigan Department of Community Health Michigan Department of Community Health January 2007 INTRODUCTION The Michigan Department of Community Health (MDCH) asked Public Sector Consultants Inc. (PSC) to conduct a survey of licensed dental hygienists

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

BECOME A SOCIAL MEDIA MANAGER KICKSTART YOUR NEW CAREER

BECOME A SOCIAL MEDIA MANAGER KICKSTART YOUR NEW CAREER digital mums BECOME A SOCIAL MEDIA MANAGER KICKSTART YOUR NEW CAREER About Digital Mums Digital Mums are a new kind of social media solution. We take the natural talents and skills of mums, add some innovative

More information

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and

More information