2012 NCSA / McAfee Online Safety Survey
|
|
|
- Corey Craig
- 10 years ago
- Views:
Transcription
1 2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012
2 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security Alliance (NCSA) and McAfee to conduct an online safety survey of 1,000 adults nationwide. A sampling of JZ Analytics online panel, which is representative of the adult population of the U.S., was invited to participate from August 31, 2012 to September 3, Slight weights were added to region, age, race, gender, party, religion and education to more accurately reflect the population. The margin of error is +/- 3.2 percentage points and margins of error are higher in subgroups. The MOE calculation is for sampling error only. Narrative Analysis 1. On a scale of one to five, with one being not safe at all and five being completely safe, how safe do you feel from viruses, malware and hackers while on the Internet? Not safe at all 8% Not Completely Safe 90% 2 12% 3 37% 4 33% Completely safe 8% Not sure 2% 2. Which of the following do you store digitally on a desktop or laptop computer? (Choose all that apply) Table 1. Storing Digitally Desktop/ Laptop Digital Photos 73% Music 54% Other personal documents 44% Videos 35% Calendar 23% Banking information 26% Personal records 24% Tax returns 22% Business contacts 18% Business records 12% Other business documents 8% Health information 15% Torrents 6% None of these 8% No desktop/laptop 1% Not sure 3% 1
3 3. Which of the following do you store digitally on a smartphone? (Choose all that apply) Table 2. Storing Digitally Smartphone Digital Photos 39% Music 32% Other personal documents 8% Videos 21% Calendar 21% Banking information 6% Personal records 7% Tax returns 3% Business contacts 9% Business records 3% Other business documents 1% Health information 2% Torrents <1% None of these 10% No smartphone 42% Not sure 2% 4. Which of the following do you store digitally on a tablet? (Choose all that apply) Table 3. Storing Digitally Tablet Digital Photos 15% Music 14% Other personal documents 6% Videos 10% Calendar 8% Banking information 4% Personal records 5% Tax returns 3% Business contacts 3% Business records 3% Other business documents 3% Health information 2% Torrents <1% None of these 10% No tablet 67% Not sure 2% 2
4 5. Which of the following do you store digitally on a cloud service? (Choose all that apply) Table 4. Storing Digitally Cloud Service Digital Photos 15% Music 16% Other personal documents 8% Videos 9% Calendar 8% Banking information 2% Personal records 5% Tax returns 4% Business contacts 5% Business records 4% Other business documents 3% Health information 2% Torrents 1% None of these 7% No desktop/laptop 66% Not sure 3% 6. When was the last time you changed the password on a major online account without being prompted to do so by the service provider? Within the last week 13% Within the last month 23% Sometime in the past six months 23% Within the last year 14% Never 17% Not sure 10% 7. How often do you change passwords for your social media account(s)? Weekly 6% Monthly 11% Twice a year 13% Once a year 19% Never 42% Not sure 10% 8. How often do you change passwords for your banking account(s)? Weekly 8% Monthly 16% Twice a year 19% Once a year 18% 3
5 Never 28% Not sure 12% 9. Which device do you feel the safest accessing the Internet with? Desktop or laptop 61% Smartphone 9% Tablet 3% I have only accessed the Internet with a desktop or laptop 22% Not sure 6% 10. Do you use your smartphone or mobile device to access the Internet? Yes 49% No 10% Do not own a smartphone or mobile device that accesses the Internet 41% 11. In the last year, have you been notified by any businesses, online service providers or an organization that any information about you (password, credit card number, address, or other personally identifiable information) has been lost or compromised because of a data breach? Yes 26% No 69% Not sure 6% 12. In the last six months, which of the following have you done from your smartphone at least once? Table 5. Smartphone Activities Smartphone Keep a list of personal contacts 57% Store photos 68% Social networking 57% Keep a calendar 45% Instant message 43% Research potential purchases 29% Access work 22% Access personal 58% Watch videos/tv shows 34% Banking 33% Shop 27% Store documents 12% 4
6 Make online payments 26% Make a point sale purchase 9% Transfer money via a third party payment website/app 15% Access work documents or databases on a server 8% Online gaming 19% Post to a blog 8% Read blog 22% Purchase goods from auction sites 7% Other 4% None of these 10% Not sure 3% 13. Are you allowed to use a personal tablet, smartphone or laptop to perform job functions? Yes 48% No 47% Not sure 5% 14. Do you use a personal tablet, smartphone, or laptop to connect to your work network? Yes 31% No 64% Not sure 4% 15. When you use your personal device on a work network, does your company have policies/training/security requirements that you must follow? Yes 42% No 44% Not sure 14% 16. Do you agree or disagree that a safe and secure Internet is critical to our nation's economic security? Strongly agree 66% Somewhat agree 24% Somewhat disagree 4% Strongly disagree 2% Not sure 4% 5
7 17. When you think of the kinds of things that can happen to you on the Internet, which of the following are you the most concerned about? Table 6. Internet Concerns Identity theft 41% Loss of privacy 5% Someone hacking into my 13% (or my family's) financial information Someone monitoring or 4% recording my online account activity Someone hacking my 3% or other non-financial accounts Someone hacking my 2% social media account A cyber criminal gaining 3% information about my family or me Getting infected with 16% malware or virus Harassment or stalking 1% Falling victim to an online 4% scam or fraud Someone hacking my 3% online connections or network Other <1% Not sure 5% 18. Which of the following online risks are you most concerned about when it comes to your child(ren)? Table 7. Parental Concerns Adult sexual content & 39% pornogrophy Portrayals of drug or 3% alcohol use Bullying or harassment 10% from peers Contact with strangers 27% Identity theft 9% Loss of personal 1% information Long-term damage to their 2% 6
8 reputation None of these 3% Not sure 5% Please choose which age range you think is the most appropriate for a child to first own... Table 8. Appropriate Age Ownership Tablet Smartphone Desktop/ Laptop Account Social Network Account 1-3 years-old 2% 1% 3% 1% <1% 4-6 years-old 5% <1% 8% 2% <1% 7-9 years-old 9% 3% 18% 5% 2% years-old 21% 16% 30% 29% 9% years-old 25% 37% 24% 33% 31% More that 16 years-old 31% 36% 12% 25% 45% Never 3% 3% 1% 2% 8% Not Sure 5% 3% 3% 4% 5% 24. How safe do you feel your smartphone is from hackers, malware or other types of cyber crime? Very safe 15% Somewhat safe 49% Somewhat unsafe 20% Not safe at all 9% Not sure 8% 25. Have you ever backed up your smartphone by storing its data or information elsewhere? Yes 38% No 58% Not sure 5% 26. Have you installed any security software or apps on your smartphone in order to make it more secure from viruses or malware? Yes 31% No 64% Not sure 6% 27. Are you more or less cautious using the Internet on your smartphone than on your desktop/laptop? Much more 19% Somewhat more 25% Somewhat less 11% Much less 7% About the same 32% 7
9 Do not own a desktop or laptop 2% Not sure 4% 28. Have you ever decided not to download an app to your smart phone over a privacy concern? Yes 58% No 35% Not sure 7% (If Q28 = Yes) 29. What were you concerned about? The use of my location 39% Unsure about the reputation of the app developer/service 40% Identity theft 55% Access to information on my device such as contacts or social networks 41% Unsure of what data about me was being collected and how it would be used 48% A security concern 44% A privacy concern 50% Contacts in social networks 16% Hackers gaining access to bank account information or financial data 36% Other 2% Not sure 2% 30. Are you concerned about the basic security of your smartphone, tablet or laptop and what could happen to it if it gets lost? Very concerned 31% Somewhat concerned 38% Not very concerned 14% Not at all concerned 10% Not sure 7% 31. To what degree is your job dependent on a safe and secure Internet? Very dependent 33% Somewhat dependent 26% Not very dependent 14% Not at all dependent 15% Not sure 12% 32. On a scale of one to five, with one being not at all disruptive and five being extremely disruptive, how disruptive would it be to your job if you lost Internet access for 48-hours straight during a regular business week? 8
10 1 Not at all disruptive 13% 2 11% 3 20% 4 14% 5 Extremely disruptive 33% Not sure 9% 33. If a trusted third party such as your Internet service provider, your financial institution, a favorite e-commerce site or online service provider knew that your computer was infected with a virus or malware do you agree or disagree that you would want it to notify you? Strongly agree 66% Somewhat agree 20% Somewhat disagree 6% Strongly disagree 1% Not sure 7% 34. Which entity do you think is most responsible for providing information on how to stay safe and secure online? Security software provider 29% Internet service provider 31% Federal government 9% State or local government 3% Non-profit organizations <1% Other software provider <1% Companies I do business with online (banking, e-commerce, etc) 10% Other 2% Not sure 15% 35. Which of the following do you think puts you most at risk of a cyber crime or loss of personal information? Connecting to an unsecure wireless network 30% Not having any or enough security software 22% Using a public computer (such as one found at a hotel) 13% Not knowing how to identify if a site is secure 12% Not having strong passwords 7% Not updating other software (such as browser or operating system) 3% None of these 2% Not sure 12% 36. Do you agree or disagree that your local police department is equipped to handle reports and investigate crimes committed over the Internet? 9
11 Strongly agree 8% Somewhat agree 27% Somewhat disagree 27% Strongly disagree 25% Not sure 12% 37. Have you ever been the victim of a crime that was committed over the Internet such as identity theft, data theft, bullying or auction fraud? Yes 17% No 78% Not sure 6% 38. Do you know anyone who was the victim of a crime that was committed over the Internet such as identity theft, data theft, bullying or auction fraud? Yes 29% No 64% Not sure 8% 10
National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey
PRESS RELEASE Oct. 1, 2012, 9:00 a.m. EDT National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey WASHINGTON, Oct. 1, 2012
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
Youth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
2011 NATIONAL SMALL BUSINESS STUDY
2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout
Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013
Internet Security Priorities Prepared for: Presented by: Benenson Strategy Group and American Viewpoint December 20, 2013 Methodology The Benenson Strategy Group and American Viewpoint conducted 1,000
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Cybersecurity Protecting Yourself, Your Business, Your Clients
Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Preparing Millennials to Lead in Cyberspace October 2014
Preparing Millennials to Lead in Cyberspace October 2014 Results from the Raytheon-NCSA Millennial Survey of career aspirations, attitudes and behaviors of young American adults online Overview In this
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
How To Prevent Cybercrime
2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
Special Eurobarometer 423 CYBER SECURITY SUMMARY
Special Eurobarometer 423 CYBER SECURITY SUMMARY Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students
Melville Primary School Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students Table of Contents 1 INTRODUCTION 2 DESCRIPTION AND PURPOSE OF THE PROJECT 3
2011-2012. Frisco ISD
2011-2012 Frisco ISD Table of Contents Table of Contents Table of Contents... 2 Purpose... 3 Google Apps for Students... 3 Responsible Use Policy... 4 Wireless Information... 5 Frequently Asked Questions...
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States
The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States National Cyber Security Alliance Microsoft Corporation Zogby/463 May 2011 Methodology Zogby/463 surveyed a statistically
CONSUMER SECURITY RISKS SURVEY 2014: MULTI-DEVICE THREATS IN A MULTI-DEVICE WORLD. July, 2014
CONSUMER SECURITY RISKS SURVEY 2014: MULTI-DEVICE THREATS IN A MULTI-DEVICE WORLD July, 2014 Contents Introduction... 2 Main findings... 3 Methodology... 4 Section 1. The use of different devices to access
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online
Research Conducted By: Teen Identity Theft: Fraud, Security, and Steps Teens are Taking to Protect Themselves Online [ photo here The Teen Online Identity Generation Theft Gap November November 20132012
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the
NORTON CYBERSECURITY INSIGHTS REPORT
NORTON CYBERSECURITY INSIGHTS REPORT Get informed about the truths of online crime and the personal impact it has on you Table of Contents > INTRODUCTION... 3 > WE KNOW THE RISK FOR ONLINE CRIME IS HIGH...
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.
NetSafe/ AVG New Zealand Contents Page 1. Objectives and Methodology 3 2. Summary and Conclusions 6 3. Main Findings 8 Online security a serious issue 9 Concern about online challenges 11 Most important
Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should
Who Needs Parental Controls?
A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings From A National Survey Among Parents Supported by: A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)
Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Virginia Primary School Learning Together, Learning for our Future
Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
2011 Parent-Teen Internet Safety Report
2011 Parent-Teen Internet Safety Report GFI Software June 2011 TABLE OF CONTENTS INTRODUCTION STUDY METHODOLOGY KEY FINDINGS AT A GLANCE CONTENT COMMUNICATIONS MALWARE INTERNET SAFETY EDUCATION ANALYSIS
HOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
Understand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
National Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Social Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
Special Eurobarometer 423 CYBER SECURITY REPORT
Special Eurobarometer 423 CYBER SECURITY REPORT Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
BYOD and Digital Citizenship at Trumbull High School
BYOD and Digital Citizenship at Trumbull High School Providing students and staff with a 21st century digital learning environment is part of the Trumbull High School core values. THS now allows high school
Technology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Cyber-safety Agreements are also an educative tool and shall be used as a resource to support the professional development of the school community.
Cyber Safety Policy Rationale Mannum Community College places a high priority on providing its school community with Internet facilities, ICT devices and equipment which will benefit student learning outcomes
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
Sibford School Student Computer Acceptable Use Policy
Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students
Identity Protection Guide. The more you know, the better you can protect yourself.
Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious
Background. Executive Summary
Background The Interdisciplinary Research Centre in Cyber Security at the University of Kent in Canterbury recently launched a second online survey 1 in order to get a better picture of the prevalence
2011 Cell Phone Consumer Attitudes Study
2011 Cell Phone Consumer Attitudes Study Prepared for: CWTA April 29, 2011 Copyright 2009-2012 Quorus Consulting Group Ltd. Table of Contents Executive Summary 3 Research Objectives and Methodology 9 Detailed
Chapter 12 - Software. Unit 1 Role and function of application software
Chapter 12 - Software Unit 1 Role and function of application software Contents Revise software concepts Role of application software Multimedia software Communication software Application software Definition:
Clarity Middle School Survey
Clarity Middle School Survey Instructions Take 10 minutes to help your school with technology in the classroom. This is an anonymous survey regarding your technology use. It will take approximately 10
Online Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability
Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating
Years 3-7 Acceptable Use Policy & Agreement
Years 3-7 Acceptable Use Policy & Agreement Reidy Park Primary School is committed to enhancing teaching and learning through the safe use of information and communication technologies (ICTs). We require
