Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers
|
|
|
- Alison Dean
- 10 years ago
- Views:
Transcription
1 Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers Sponsored by Trend Micro Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report
2 Part 1. Introduction Privacy and Security in a Connected Life: A Study of US, European and Japanese Consumers Privacy and Security in a Connected Life was conducted by Ponemon Institute and sponsored by Trend Micro to learn if consumers are worried about how technology that captures personal information, especially Internet of Things (IoT) or Internet of Everything (IoE), is affecting their privacy and security. In the context of this research, security refers to the safeguards in place to protect personal information from being lost or stolen. Privacy is considered to be an individual s right to keep sensitive and confidential information from becoming known unless he or she wants the information to be revealed. In this study of 1,903 consumers in the US, Europe and Japan, we define IoT as the expanding network of billions of connected devices that are permeating our daily lives from smart phones and smart TVs to our WiFi enabled appliances, wireless medical devices and wearable devices. Because consumers are embracing more connected devices, information security leaders predict that IoT will be one of the most significant disruptive technologies in the near future. In addition to issues surrounding the privacy and security of IoT, we also study respondents perceptions about the value of their personal information such as health information, credit history, purchasing habits, browser settings and if they should be paid for their information. Because individuals have different opinions about the importance of privacy, we asked respondents to select a privacy profile they most closely identify with today and five years ago. Three profiles were developed by Ponemon Institute based on consumer research conducted over a period of more than 10 years. In Part 3 of this report, we compare the perceptions privacy centric and privacy complacent respondents have about IoT and the value of their personal information. The following are profiles of respondents as shown in Figure 1. Privacy centric. These respondents will change their behaviors when they experience events that make them worry about the privacy and security of their personal information (20 percent of respondents). Five years ago, 26 percent of respondents say they were privacy centric. This decline could be attributed to individuals believing they are losing the ability to keep their personal information safe. These respondents have become more privacy sensitive. Privacy sensitive. The majority of respondents (61 percent) are privacy sensitive. These respondents think privacy is important but will rarely change their behaviors or information sharing practices even if they experience an event that affects the privacy or security of their personal information, such as a data breach. Five years ago, 56 percent were privacy sensitive. This increase suggests that individuals are becoming less willing to change behaviors if and when they experience a privacy or security incident. Ponemon Institute Research Report Page 1
3 Privacy complacent. These respondents (19 percent) are the least concerned about privacy and security. These respondents really do not care even if their sensitive information is shared or sold. Respondents in this profile increased slightly. Other key takeaways include the following: Mobility, data breaches and social media increase concerns about privacy. Forty-seven percent of respondents say they have become more concerned about the privacy and security of their personal information in the past five years. The reasons these respondents worry about their privacy are: the increased use of mobile devices such as smartphones and tablets (63 percent), they became a victim of a data breach (61 percent) and they use social media more often (53 percent). Almost half (49 percent) are worried about how their personal information is shared, including the sharing of their medical records with third parties. Most respondents are more concerned about security than privacy in IoT and social media. Eighty percent and 74 percent of respondents are concerned about security in IoT and social media, respectively. However, a smaller percentage of respondents are concerned about privacy in IoT (52 percent) and in social media (54 percent). Right now respondents do not believe the benefits of IoT outweigh their privacy concerns. While 44 percent do believe the benefits of IoT outweigh their concerns about privacy or security, 42 percent say they do not and 14 percent are unsure. Most respondents (75 percent) believe they have very little control over their personal information. We believe this is due to respondents uncertainty as to what information is collected and a lack of awareness about how their personal information is protected. Little information is provided about how smart devices protect and use personal information. What can be fueling respondents worries about IoT is the lack of information about the security safeguards in place. When asked if manufacturers of devices provided details about how their personal information will be used, 82 percent of respondents say they did not receive any information or they are unsure. Only 18 percent of respondents recall receiving such information. Respondents would like to receive compensation and information about the smart devices they are using. Consumers are demanding clarification about how their personal information is managed by manufacturers. They also want assurance that if their personal information is lost or stolen, the manufacturer will assume responsibility and provide compensation to help them resolve any negative consequences. Personal information does have a value to respondents. Sixty-one percent of respondents (29 percent strongly agree + 32 percent agree) understand that their personal data is valuable because it helps companies to market and sell products. Fifty-three percent (25 percent strongly agree + 28 percent agree) believe personal data is a financial asset similar to traded goods, currencies or commodities. Respondents would provide their personal information in exchange for money if they trust the company. Fifty-six percent of respondents say they would be willing to provide their personal data to trusted companies in exchange for money. On average, respondents would accept $76 for their passwords and $60 for information about their health condition. Social Security numbers are valued at $56. Ponemon Institute Research Report Page 2
4 Part 2. Key findings In this section, we present an analysis of the key findings of this research. The complete audited findings are presented in the appendix of this report. We have organized the findings according to the following topics: Does privacy matter? A privacy problem: losing control over personal information Does personal information have a price? Does privacy matter? Use of mobile devices and data breaches has increased concerns about privacy. Fortyseven percent of respondents say they have become more concerned about the privacy and security of their personal information in the past five years. As shown in Figure 2, reasons these respondents worry about their privacy are: the increased use of mobile devices such as smartphones and tablets (63 percent), they became a victim of a data breach (61 percent) and they use social media more often (53 percent). Almost half (49 percent) are worried about sharing their personal information, including medical records shared with third parties. Figure 2. Why are you more concerned about your privacy? More than one response permitted n = 885 I am using my mobile devices such as smartphones and tablets more often 63% I became a victim of a data breach 61% I use social media more often 53% More of my personal information including medical records is being shared with third parties 49% I have growing concerns about government surveillance 23% I am using location tracking devices more often 15% I know someone who became a victim of a data breach I use mobile payment methods including mobile wallet 13% 12% I became a victim of identity theft 7% 0% 10% 20% 30% 40% 50% 60% 70% Ponemon Institute Research Report Page 3
5 Experience with smart devices is limited. As shown in Figure 3, most respondents are using or planning to use smartphones/tablets and smart TVs (76 percent and 70 percent, respectively). Also revealed is that there is little use or planned use of smart security systems, Google Glass and fitness tracking wearables (84 percent, 79 percent or 71 percent, respectively). Figure 3. What smart devices consumers use, plan to use or have no plan to use More than one response permitted Smartphone/Tablet (n = 1,753) 24% 33% 43% Smart TV (n = 1,777) 30% 30% 40% Smart kitchen appliances (n = 1,158) 25% 19% 57% Smart electric meter (n = 1,241) 17% 29% 55% Smart home thermostat (n = 973) 9% 21% 70% Fitness status tracking wearable (n = 1,036) 8% 21% 71% Google Glass (n = 871) 6% 16% 79% Smart security systems (n = 756) 11% 5% 84% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Plan to use Use No plan to use Ponemon Institute Research Report Page 4
6 The benefits of IoT do not outweigh concerns about privacy and security. Is the use of smart devices connected to the Internet worth potential risks to privacy and security? While 44 percent do believe the benefits of IoT outweigh their concerns about privacy or security, 42 percent say they do not and 14 percent are unsure. Figure 4. Do you believe the benefits of IoT outweigh your concerns about privacy or security? n = 1,903 50% 45% 40% 35% 30% 25% 44% 42% 20% 15% 14% 10% 5% 0% Yes No Unsure Ponemon Institute Research Report Page 5
7 A privacy problem: losing control of personal information Uncertainty and the lack of control over how personal information is collected, shared, and stored could deter many consumers from using smart devices. Based on a scale of 1 to 10, Figure 5 shows that only 16 percent of respondents (10 percent + 6 percent) say they have a high degree of control over their personal information in IoT. Seventy-five percent (48 percent + 27 percent) believe they have very little control over their personal information. We believe this is due to respondents uncertainty as to what information is collected and a lack of awareness about how their personal information is protected. Figure 5. How much control do you have over your personal information in IoT 1 = low control to 10 = high control n = 1,903 60% 50% 48% 40% 30% 27% 20% 10% 9% 10% 6% 0% 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Ponemon Institute Research Report Page 6
8 Respondents are unaware of all the sensitive data collected about them. In IoT, devices are capable of collecting and sharing a wide range of personal information. In addition to tracking browsing behavior, software in devices can report on usage, location, and performance, whether through smartphone applications, video games, metadata from digital cameras, or applications running on personal computing devices. Recently it was reported that Samsung Smart TVs collect data from voice communications and even share them with a third party. 1 Figure 6 reveals that respondents believe their most sensitive information, such as purchasing habits, health conditions, Social Security numbers and credit history, is rarely collected and used by companies. In contrast, 56 percent are aware that information about their physical location (GPS) is collected because of the prevalent use of smartphones and tablets. However, many respondents (44 percent) do not seem to be aware of the tracking capabilities of their devices. When asked specifically about devices that collect information, the majority of respondents believe the devices that collect the most information are: Google Glass, smart security and smart phones or tablets. Figure 6. What personal information consumers believe is collected about them in IoT More than one response permitted n = 1,903 address 80% Home address Name 73% 71% Physical location (GPS) Browser settings & histories Gender Payment account details Photos & videos Names of friends & family members Phone numbers Marital status Hobbies, tastes & preferences 56% 51% 51% 46% 43% 41% 39% 36% 34% Purchase histories Health condition School or employer 21% 18% 26% Special dates including date of birth 11% Social Security number * Credit history 5% 4% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% * This response was only available for US participants 1 Smart TV eavesdropping furor prompts senator to quiz Samsung and LG on privacy, by John Ribiero, PCWorld, February 12, Ponemon Institute Research Report Page 7
9 Little information is provided about how smart devices protect and use personal information. What can be fueling respondents worries about IoT is the lack of information about the security safeguards in place. When asked if manufacturers of devices provided details about how their personal information will be used, 82 percent of respondents say they did not receive any information or they are unsure. Only 18 percent of respondents recall receiving such information. It is unclear whether this finding is attributable to manufacturers not providing such information or respondents are not aware that such information is available to them. In any event, respondents believe they do not have such information at hand for assurance. If the manufacturer did provide information about how their personal information is protected, Figure 7 shows what these 18 percent of respondents remember. Forty-eight percent say they received a promise their data is shared only with trusted parties followed by the ability to opt out of data collection and/or data sharing (44 percent). Forty-five percent say they cannot recall if any of the critical information in the figure was provided to them. Figure 7. What protections are in place to protect your personal information? More than one response permitted n = 271 My data is shared only with trusted parties I can opt out of data collection and/or data sharing 44% 48% I can turn off tracking activities anytime The device provides strong authentication controls My personal information collected is encrypted I can remotely disable the device if it is lost or stolen I can erase any information collected about me 22% 21% 16% 16% 15% There is someone to contact if I have concerns about privacy 8% None of the above 45% 0% 10% 20% 30% 40% 50% 60% Ponemon Institute Research Report Page 8
10 Respondents are more concerned about their security than privacy. Figure 8 reveals respondents concerns about privacy and security. According to Figure 8, 80 percent of respondents are very concerned about the security of their personal data when using smart devices. Seventy-four percent are concerned about their security when using social media such as Facebook and Google. A higher concern among respondents about the security of their personal information could be based upon the fear of becoming a victim of identity theft. While individuals can have security without privacy, they cannot have privacy without security. In contrast, a much smaller percentage (54 percent) rates their concern about privacy when using social media as high or very high. Similarly, 52 percent rate concerns about privacy when using smart devices connected to IoT as high or very high. This finding is consistent with the privacy profiles of respondents. As discussed previously, most respondents are privacy sensitive and think privacy is important but they are not willing to change their behavior such as stopping their use of social media because of privacy concerns. Figure 8. How concerned are you about maintaining security and privacy in IoT and social media? Very high and high responses N = 1,903 90% 80% 80% 74% 70% 60% 50% 52% 54% 40% 30% 20% 10% 0% Concerns about security in the IoT Concerns about privacy in the IoT Concerns about security when using social media Concerns about privacy when using social media Ponemon Institute Research Report Page 9
11 Respondents would like to receive compensation and information about the smart devices they are using. Consumers are demanding clarification about how their personal information is managed by manufacturers. They also want assurance that if their personal information is lost or stolen, the manufacturer will assume responsibility and provide compensation to help them resolve any negative consequences. As shown in Figure 9, manufacturers of smart devices should do the following: compensate consumers if their information is lost or stolen (74 percent), tell what information is collected and how the information is used (71 percent), allow consumers to control what information is collected (60 percent) and tell them what they should do if the smart device is hacked (60 percent). Figure 9. Manufacturers of smart devices should provide the following information More than one response permitted n = 1,903 Compensate me if my information is lost or stolen Tell me what information is collected Tell me how the information is used 74% 71% 71% Tell me what I should do if the smart device is hacked Allow me to control what information is collected Tell me when my personal information is lost or stolen Assurance that my data is safeguarded Let me know how I can protect my information from being lost or stolen 60% 60% 57% 52% 50% Don t know No information is necessary 14% 17% 0% 10% 20% 30% 40% 50% 60% 70% 80% Ponemon Institute Research Report Page 10
12 Personal information is off limits to employers. The majority of respondents do not believe their employer has the right to access personal data on their smart device if they use it at work or connect to their employer s Internet (52 percent) and 9 percent are unsure, according to Figure 10. Figure 10. Does your employer have the right to access personal data on your Smart device if you use it at work or connect to your employer s Internet? n = 1,903 60% 50% 52% 40% 39% 30% 20% 10% 9% 0% Yes No Unsure Ponemon Institute Research Report Page 11
13 Respondents do not believe they are in control when sharing personal data and making purchases. Only 32 percent of respondents (see Q19 in the appendix) strongly agree or agree they still control how their personal information is collected, shared and stored after they willingly share personal data with companies. Further, in purchasing situations that require the sharing of personal information, respondents believe they have lost control over their personal information. According to Figure 11, 70 percent of respondents say they rarely or never have control over their data after browsing websites and making online purchases and 63 percent say they rarely or never have control over their personal information when making purchases at a store. Figure 11. Do you have control over how your personal data is used? n = 1,903 60% 50% 40% 51% 42% 30% 20% 13% 15% 17% 23% 19% 21% 10% 0% Yes, most of the time Yes, some of the time Rarely No Control over personal data after browsing websites and/or making online purchases Control over personal data after shopping at a store and share personal information Ponemon Institute Research Report Page 12
14 Confusion exists over how personal information is used. Twenty-five percent of respondents do not know how companies use their personal information. If they do, they believe it is mainly for marketing purposes to understand their preferences as well as those of others. Forty-two percent say their data is sold for unknown purposes. Figure 12. What do you believe companies do with your personal data? More than one response permitted n = 1,903 The data is used to understand my preferences 62% The data is used to understand other consumers preferences 57% The data is sold by those collecting it for unknown purposes 42% The data is used to provide me with better security 38% I do not know how companies use my personal data 25% 0% 10% 20% 30% 40% 50% 60% 70% Respondents are mostly negative about the ads they receive based on their purchasing and browsing habits. Fifty-five percent of respondents say the ads they receive are rarely (18 percent) or never valuable to them (37 percent). Figure 13. Do you believe ads based on your purchasing and browsing habits are helpful? n = 1,903 40% 37% 35% 30% 25% 20% 20% 25% 18% 15% 10% 5% 0% Yes, most of the time Yes, some of the time Rarely No Ponemon Institute Research Report Page 13
15 Does personal information have a price? Personal information does have a value to respondents. According to Figure 14, 61 percent of respondents (29 percent strongly agree + 32 percent agree) understand that their personal data is valuable because it helps companies to market and sell products. Fifty-three percent (25 percent strongly agree + 28 percent agree) believe personal data is a financial asset similar to traded goods, currencies or commodities. Figure 14. What consumers think about the value of their personal information n = 1,903 35% 30% 25% 29% 25% 32% 28% 23% 22% 20% 17% 15% 11% 10% 5% 5% 8% 0% Strongly agree Agree Unsure Disagree Strongly disagree Personal data helps to market and sell products to others and me Personal data is a financial asset similar to traded goods, currencies or commodities Ponemon Institute Research Report Page 14
16 The majority of respondents do not believe loyalty programs provide adequate compensation. As mentioned previously, 82 percent of respondents do not know or are unsure about how manufacturers of smart devices use and protect their personal information. However, when it comes to loyalty cards, more respondents (56 percent) do have full or some understanding what companies do with their data. This is probably due to the various benefits and compensation loyalty cards provide. Sixty-seven percent of respondents participate in a loyalty program. According to Figure 15, 64 percent of respondents say they mainly receive discounts on future purchases or early access to sales or discounts or hard to get products or services (48 percent). Sixty-one percent say this compensation is not enough (40 percent) or they are unsure (21 percent). Figure 15. How are you compensated for your participation in loyalty programs? More than one response permitted n = 1,285 Discounts on future purchases 64% Early access to sales or discounts or hard to get products or services (i.e. tickets to a playoff game) 48% Free and upgraded flights 29% Cash back or reimbursements 28% Concierge services 13% Free goods and services 13% 0% 10% 20% 30% 40% 50% 60% 70% Ponemon Institute Research Report Page 15
17 Respondents would provide their personal information in exchange for money if they trust the company. Fifty-six percent of respondents say they would be willing to provide their personal data to trusted companies in exchange for money, as shown in Figure 16. Figure 16. Would you be willing to provide your personal data to trusted companies in exchange for money? n = 1,903 60% 56% 50% 40% 36% 30% 20% 10% 7% 0% Yes No, I would not provide my personal data for any amount of money Unsure Ponemon Institute Research Report Page 16
18 How much is one piece of data worth? We asked respondents who would be willing to share their personal information in exchange for money to indicate what would be the minimum amount they would accept as compensation in exchange for different data categories. On average, respondents believe one piece of data is worth $ The most expensive pieces of data are: passwords (log in credentials) $75.80, health condition $59.80, payment details $36, credit history $29.20 and purchase habits $ The cheapest pieces of data are: gender $2.90, name $3.90 and phone numbers $5.90. Figure 17. How much is your personal data worth? Extrapolated average value = $19.60 n = 1,078 Passwords (login details) $75.8 Health condition Social Security number * $55.7 $59.8 Payment details (credit card) Credit history Names of friends & family members Purchase histories Physical location (GPS) School or employer Home address Photos & videos Hobbies, tastes & preferences Marital status address Browser settings & histories Special dates including date of birth Phone numbers Name Gender $36.0 $29.2 $23.5 $20.6 $16.1 $13.3 $12.9 $12.2 $12.2 $8.3 $8.0 $7.1 $5.9 $5.9 $3.9 $2.9 $0.0 $10.0 $20.0 $30.0 $40.0 $50.0 $60.0 $70.0 $80.0 * This response was only available for US participants Ponemon Institute Research Report Page 17
19 Part 3. U.S., Japan and Europe Comparisons In this section, we present an analysis of findings from each country and region. As shown, although there are similarities among US, Japan and Europe, there are some differences that may be attributable to cultural differences and regional trends. Are respondents more worried about their privacy? The majority of respondents in all regions have not become more concerned about their privacy in the past five years despite mega breaches, increased surveillance and smart devices tracking behaviors and locations. Forty-five percent of US respondents, 46 percent of Japanese respondents and 49 percent of European respondents say they have become more concerned about their privacy in the past five years. Figure 18 reveals the basis of these respondents concerns. In general, they say data breaches, the sharing of medical records, increased use of mobile devices and social devices have made them more concerned about their privacy. Figure 18. Why are you more concerned about your privacy? More than one response permitted n = 885 I became a victim of a data breach 55% 56% 73% More of my personal information including medical records is being shared with third parties 40% 49% 59% I am using my mobile devices such as smartphones and tablets more often I use social media more often 46% 53% 50% 69% 66% 63% I have growing concerns about government surveillance 19% 11% 39% I know someone who became a victim of a data breach 6% 16% 18% I am using location tracking devices more often I use mobile payment methods including mobile wallet I became a victim of identity theft 15% 21% 9% 14% 13% 9% 11% 6% 5% 0% 10% 20% 30% 40% 50% 60% 70% 80% US (335) JP (274) EU (276) Ponemon Institute Research Report Page 18
20 In the US, more respondents (73 percent) are concerned about their privacy because of a data breach that resulted in the loss or theft of personal information. This might be due to the frequency of well-publicized data breaches in the US. Japanese and European respondents worry that the use of their mobile devices are putting their privacy in jeopardy (69 percent and 66 percent, respectively). It is also interesting to note that European respondents are the most concerned about government surveillance. Respondents are concerned about their privacy and security. Figure 19 reveals respondents concerns about privacy and security in IoT and social media. According to Figure 19, Europeans are much more concerned about their privacy than the US and Japanese respondents. In contrast, the majority of all respondents worry about the security of their personal information when using devices connected to the Internet or when using social media. Europeans are more concerned about security than US and Japan when using social media. Figure 19. Concerns about security and privacy in IoT and when using social media On a scale of 1 = low concern to 10 = high concern respondents who rated their concern 7+ 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 75% 83% Concerns about security in the IoT 82% 81% 68% 71% Concerns about security when using social media 62% 49% 50% 44% 46% Concerns about privacy in the IoT 68% Concerns about privacy when using social media Samples Table 1: Frequency of responses to items summarized in Figure 19 Concerns about security in the IoT Concerns about security when using social media Concerns about privacy in the IoT Concerns about privacy when using social media U.S Japan Europe Ponemon Institute Research Report Page 19
21 Little information is provided about how smart devices protect and use personal information. Respondents worries about IoT can be exacerbated by the lack of information provided by manufacturers about the security safeguards in place. When asked if manufacturers of devices provided details about how their personal information will be used, respondents say they did not receive any information or they are unsure (81 percent in US, 82 percent in Japan and 82 percent in Europe). If the manufacturer did provide information about how their personal information is protected, Figure 20 shows what respondents remember. Japan and European respondents remember the promise that their data is shared only with trusted parties (50 percent of respondents). Whereas, US respondents remember the commitment they can opt out of data collection and/or data sharing. Many respondents in all regions say they haven t received any of the information listed. Figure 20. What protections are in place to protect your personal information? More than one response permitted n = 271 My data is shared only with trusted parties I can opt out of data collection and/or data sharing I can turn off tracking activities anytime The device provides strong authentication controls My personal information collected is encrypted I can remotely disable the device if it is lost or stolen I can erase any information collected about me There is someone to contact if I have concerns about privacy None of the above 23% 24% 18% 19% 22% 23% 12% 21% 16% 13% 19% 15% 16% 16% 12% 9% 5% 10% 44% 50% 50% 49% 38% 44% 49% 40% 46% 0% 10% 20% 30% 40% 50% 60% US (97) JP (90) EU (84) Ponemon Institute Research Report Page 20
22 Europeans are more likely to agree they have control over personal data willingly shared. As shown in Figure 21, 43 percent of respondents in Europe believe even if they share their personal data with companies they have control over it. Only 22 percent of US respondents believe they have control. A possible reason is that EU laws and regulations may provide European respondents with confidence they have this control. Figure 21. Even if I willingly share my personal data with companies, I still control how they collect, share and store my personal data Strongly agree and agree response combined 50% 45% 43% 40% 35% 30% 30% 25% 22% 20% 15% 10% 5% 0% US (744) JP (595) EU (564) Pay for personal data is popular around the globe. The majority of respondents would share personal information in exchange for money. However, more European respondents would not exchange personal information for any amount of money. Figure 22. Would you be willing to provide your personal data to trusted companies in exchange for money? n = 1,903 70% 60% 50% 40% 59% 60% 50% 35% 32% 42% 30% 20% 10% 6% 8% 8% 0% Yes No, I would not provide my personal data for any amount of money Unsure US (744) JP (595) EU (564) Ponemon Institute Research Report Page 21
23 How much is one piece of data worth? We asked respondents to indicate what would be the minimum amount they would accept as compensation in exchange for different data categories. Figure 23 shows interesting differences among US, Japanese and European respondents for seven data categories. US respondents put a much higher price on information about their health condition. Japanese and European respondents would want more money for their passwords or login details. Also interesting is the value US respondents placed on GPS location compared to their Japanese and European peers. This may be due to concerns over security or possibly because many retailers are using this to drive marketing or location services. Figure 23. How much is your personal data worth? n = 1,078 Health condition $35.0 $61.6 $82.9 Passwords (login details) $67.0 $78.5 $82.0 Social Security number * $55.7 Payment details (credit card) Credit history $20.8 $26.7 $20.7 $45.1 $42.2 $40.1 Physical location (GPS) $4.8 $5.1 $38.4 Names of friends & family members $27.4 $24.2 $18.8 $0.0 $10.0 $20.0 $30.0 $40.0 $50.0 $60.0 $70.0 $80.0 $90.0 * This response was only available for US participants US (439) JP (357) EU (282) Ponemon Institute Research Report Page 22
24 Part 4. Analysis of privacy centric and privacy complacent respondents In this section, we analyze respondents according to their self-reported privacy preference. Our analysis compares respondents who are privacy centric (n = 387) versus those who are privacy complacent (n = 355). The middle category termed privacy sensitive is removed to highlight maximum differences. In general, privacy centric respondents are most concerned about the privacy and security of their personal information. However, they are also the most aware about the privacy practices of manufacturers and are more confident they have control over their personal information. In contrast, privacy complacent respondents seem to be indifferent to what might happen to their privacy and security. They also are less likely to believe they have control over how their personal information is collected, shared and stored. Events in the past five years have increased the concerns privacy centric respondents have about their privacy. As shown in Figure 24, there is a difference in the concerns expressed by privacy centric and privacy complacent respondents (e.g. a 10 percent difference between centric and complacent subsamples). Figure 24. Have you become more concerned about privacy and security of your personal data over the past 5 years? 60% 50% 40% 30% 20% 10% 53% 47% 43% 57% 0% Centric Complacent Yes No Table 3: Frequency of responses to items summarized in Figure 24 Choices Centric Complacent Yes No Total Ponemon Institute Research Report Page 23
25 Privacy centric respondents have a heightened level of concern over all factors that affect the privacy and security of their personal data. The number one concern for both centric and complacent respondents is the fact they were involved in a data breach followed by the increase use of mobile devices, as shown in Figure 25. This finding reveals that data breaches and new technologies have more impact on privacy centric respondents. Figure 25. If you became more concerned, what are the main reasons? More than one response permitted I became a victim of a data breach I am using my mobile devices such as smartphones and tablets more often 50% 62% 60% 68% More of my personal information including medical records is being shared with third parties I use social media more often 55% 48% 52% 45% I have growing concerns about government surveillance I know someone who became a victim of a data breach 13% 11% 20% 33% I became a victim of identity theft 3% 10% 0% 10% 20% 30% 40% 50% 60% 70% 80% Centric (n = 205) Complacent n = 153) Table 4: Frequency of responses to items summarized in Figure 25 Choices Centric Complacent I became a victim of a data breach I am using my mobile devices such as smartphones and tablets more often More of my personal information including medical records is being shared with third parties I use social media more often I have growing concerns about government surveillance I know someone who became a victim of a data breach I became a victim of identity theft 21 5 Ponemon Institute Research Report Page 24
26 Complacent respondents are more likely to use IoT devices such as Google Glass, smart kitchen appliances, smart TV and smartphones. As shown in Figure 26, centric and complacent respondents agree on fitness wearables, smart meters and smart thermostats. Figure 26. Respondents who say they have no plan to use the presented smart device More than one response permitted Smartphone/Tablet 18% 29% Smart TV 30% 23% Smart electric meter Smart kitchen appliances Smart home thermostat 48% 56% 53% 65% 69% 65% Fitness status tracking wearable Smart security systems 79% 80% 83% 79% Google Glass 69% 93% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Centric (n =265) Complacent (n = 193) Table 4: Frequency of responses to items summarized in Figure 26 Choices Centric Complacent Smartphone/Tablet Smart TV Smart electric meter Smart kitchen appliances Smart home thermostat Fitness status tracking wearable Smart security systems Google Glass Ponemon Institute Research Report Page 25
27 Privacy centric respondents are more aware of the communications from companies about privacy of personal information. However, as shown in Figure 27, it is still a small percentage of respondents in both classifications who are aware of information about how their personal data will be used. However, it is likely that privacy complacent respondents do not look for such information from manufacturers. Figure 27. Did any of the manufacturers of the devices you use (or plan to use) provide you with information about how your personal information will be used? 70% 60% 60% 50% 47% 40% 32% 30% 20% 16% 21% 24% 10% 0% Yes No Unsure Centric Complacent Table 5: Frequency of responses to items summarized in Figure 27 Choices Centric Complacent Yes No Unsure Ponemon Institute Research Report Page 26
28 Privacy centric respondents are much more concerned about maintaining their privacy in IoT. As shown in Figure 28, 45 percent of privacy centric respondents rate their concern about IoT privacy as very high. The implication is that manufacturers of IoT devices should understand the concerns of these potential consumers of their products. Figure 28. How concerned are you about maintaining your privacy in IoT? 10-point scale from 1 = low to 10 = high 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% 45% 36% 33% 21% 16% 18% 15% 12% 4% 0% 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Centric Complacent Table 5: Frequency of responses to items summarized in Figure 28 Choices Centric Complacent 1 or 2 (low) or or or or 10 (high) Total Ponemon Institute Research Report Page 27
29 Privacy centric respondents are also much more concerned about maintaining their security in IoT. Again, manufacturers should be attuned to the concerns of the privacy centric respondents, according to Figure 29. As discussed previously, privacy complacent respondents are not concerned about how their information is collected, used and shared by manufacturers. Figure 29. How concerned are you about your security in IoT? 10-point scale from 1 = low to 10 = high 70% 60% 58% 50% 40% 30% 20% 10% 0% 34% 32% 19% 20% 12% 15% 8% 0% 2% 1 or 2 (low) 3 or 4 5 or 6 7 or 8 9 or 10 (high) Centric Complacent Table 6: Frequency of responses to items summarized in Figure 29 Choices Centric Complacent 1 or 2 (low) or or or or 10 (high) Total Ponemon Institute Research Report Page 28
30 Despite being concerned about their privacy, privacy centric respondents are more convinced than privacy complacent respondents that the benefits of IoT outweigh their worries. A possible explanation is that privacy centric respondents believe they are more aware of the privacy issues and understand how they can best protect their personal information. As shown in Figure 30, 60 percent of privacy centric respondents vs. 40 percent of privacy complacent respondents say the benefits of IoT outweigh concerns. Figure 30. Do you believe the benefits of IoT outweigh your concerns about privacy or security? 70% 60% 60% 50% 40% 40% 39% 34% 30% 20% 21% 10% 0% Yes No Unsure 6% Centric Complacent Table 7: Frequency of responses to items summarized in Figure 30 Choices Centric Complacent Yes No Unsure Total Ponemon Institute Research Report Page 29
31 Privacy centric respondents are more likely to believe they are in control when sharing their personal information with companies. According to Figure 31, 54 percent of privacy centric respondents are confident they can control how their personal information is used when willingly sharing it with companies. These respondents are also more likely to think of their personal data as a financial asset. Figure 31. Attributions about personal information Strongly agree and agree response combine My personal data is a financial asset similar to traded goods, currencies or commodities. 47% 70% Even if I willingly share my personal data with companies, I still control how they collect, share and store my personal data. 25% 54% 0% 10% 20% 30% 40% 50% 60% 70% 80% Centric Complacent Table 8: Frequency of responses to items summarized in Figure 31 Choices Centric Complacent My personal data is a financial asset similar to traded goods, currencies or commodities Even if I willingly share my personal data with companies, I still control how they collect, share and store my personal data Ponemon Institute Research Report Page 30
32 Privacy centric respondents also believe they have more control over their personal information when browsing websites and making purchases. As shown in Figure 32, 49 percent of privacy centric respondents are confident that most or some of the time they have control over how their personal data is used by online companies. In contrast, only 22 percent of privacy complacent respondents say they have control. One possible explanation is that privacy complacent respondents admit to not caring about how their personal information is used and believe they have relinquished control. Figure 32. After browsing websites and/or making online purchases, do you believe you have control over how your personal data is used? 60% 56% 50% 40% 39% 30% 20% 10% 21% 9% 28% 13% 12% 22% 0% Yes, most of the time Yes, some of the time Rarely No Centric Complacent Table 9: Frequency of responses to items summarized in Figure 32 Choices Centric Complacent Yes, most of the time Yes, some of the time Rarely No Total Ponemon Institute Research Report Page 31
33 Privacy centric respondents care more about the privacy of their personal information than exchanging it for money. According to Figure 33, 65 percent of privacy centric respondents would not give their personal information away for any amount of money. Figure 33. Would you be willing to provide your personal data to trusted companies in exchange for money? 80% 70% 67% 65% 60% 50% 40% 30% 23% 23% 20% 10% 12% 10% 0% Yes No, I would not provide my personal data for any amount of money Unsure Centric Complacent Table 10: Frequency of responses to items summarized in Figure 33 Choices Centric Complacent Yes No, I would not provide my personal data for any amount of money Unsure Total Ponemon Institute Research Report Page 32
34 Privacy centric respondents put a higher price on their personal information. On average, privacy complacent respondents would provide sensitive and personal information to organizations at a very low price, as revealed in Figure 34. Figure 34. How much would a trusted company have to pay you to obtain the following data about you? Average for 19 personal data categories $35.00 $32.10 $30.00 $25.00 $20.00 $15.00 $14.50 $10.00 $5.00 $0.00 Centric Complacent Ponemon Institute Research Report Page 33
35 Conclusion The objective of the study is to understand what consumers throughout the world think about the quickly emerging IoT. With many IoT devices flooding the marketplace and becoming part of our everyday life, how can consumers truly understand the impact on their privacy and security? As evidence, respondents are not often informed and aware about what personal information is collected, used, shared and how it is protected. While security of personal information in IoT and social media is shown in this research as being most important, privacy still matters. Eighty-one percent of respondents are either privacy centric or sensitive and the lack of control over personal information is a major worry. Another concern is the lack of knowledge about what information is collected about them. Therefore, it makes sense that so many respondents do not plan to use many of the IoT devices featured in this research. These findings reveal the following opportunities and responsibilities for companies operating in the IoT space: Create communications and outreach programs to inform consumers about what personal data is collected, how it is shared, how to get additional information about the privacy and security of their information and how they can opt out of any data collection or sharing. Provide consumers with assurance they have control over their information and it is secure. Explain how they can disable tracking features, erase information collected and remotely disable the device if it is lost or stolen. Describe security features such as encryption of personal information and the authentication controls in place. Educate and train employees about the importance of safeguarding consumers information. Create and enforce privacy and security policies. Consider the creation of industry standards on achieving privacy and security in IoT. The IoT can provide many benefits. However, for IoT to succeed consumers must have confidence and trust that companies will respect their privacy and security concerns. Ponemon Institute Research Report Page 34
36 Part 5. Methods A sampling frame composed of 55,687 consumers located in the United States, Japan and Europe were selected for participation in this survey. As shown in the Table 3, 2,033 respondents completed the survey. Screening removed 130 surveys. The final sample was 1,903 surveys (or a 3.4 percent response rate). All survey responses were captured November 11 through December 8. Table 3. Sample response US JP EU Global Total sampling frame 24,008 15,649 16,030 55,687 Total returns ,033 Rejected or screened surveys Final sample ,903 Response Rate 3.1% 3.8% 3.5% 3.4% Pie Chart 1 reports the highest level of education of respondents. More than half of respondents (58 percent) reported having attended college or earning a college degree. Pie Chart 1. Highest level of education n = 1,903 8% 1% 19% High School Vocational 25% College (attended, no degree) College (4 year degree) 23% Post Graduate Doctorate 24% Ponemon Institute Research Report Page 35
37 According to Pie Chart 2, more than half of the respondents (59 percent) reported their income to be less than $60,000. Forty-one percent reported their income to be greater than $60,000. The average respondent s income was $69,067. Pie Chart 2. Household income Expressed in US $, n = 1,903 8% 6% 2% 11% Less than $25,000 10% 17% 21% $25,000 to $40,000 $40,001 to $60,000 $60,001 to $80,000 $80,001 to $100,000 $100,001 to $150,000 $150,001 to $250,000 27% More than $250,000 Pie Chart 3 reports the age of respondents. More than half of the respondents (64 percent) are between the ages of 18 and 45. Pie Chart 3. Age of respondents n = 1,903 13% 7% 21% 18 to 25 15% 24% 26 to to to to % Ponemon Institute Research Report Page 36
38 As shown in Pie Chart 4, there are 15 countries represented in the European cluster. The largest country segments are: United Kingdom (21 percent), Germany (17 percent) and France (14 percent). Pie Chart 4. Countries represented in the European cluster sample n = % 10% 4% 4% 12% 2% 1% 1% 14% 21% 17% United Kingdom Germany France Spain Benelux Italy Poland Russian Federation Denmark Ireland Switzerland Sweden Slovenia Greece Ponemon Institute Research Report Page 37
39 Part 6. Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most web-based surveys. Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of individuals, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the instrument. Sampling-frame bias: The accuracy is based on contact information and the degree to which the list is representative of individuals who are consumers. We also acknowledge that the results may be biased by external events such as media coverage. We also acknowledge bias caused by compensating subjects to complete this research within a holdout period. Self-reported results: The quality of survey research is based on the integrity of confidential responses received from subjects. While certain checks and balances can be incorporated into the survey process, there is always the possibility that a subject did not provide a truthful response. Ponemon Institute Research Report Page 38
40 Appendix: Detailed Survey Results The following tables provide the frequency or percentage frequency of responses to all survey questions contained in this study. All survey responses were captured November 11 through December 8. Consolidated global consumer survey response Freq Pct% Total sampling frame 55, % Total returns 2, % Rejected or screened surveys % Final sample 1, % Part 1. Privacy profile and the Internet of Things Q1. Based on the descriptions above, what is your privacy profile today? Pct% Privacy complacent 19% Privacy sensitive 61% Privacy centric 20% Total 100% Q2. Based on the descriptions above, what was your privacy profile five years ago? Pct% 2 Privacy complacent 17% Privacy sensitive 56% Privacy centric 26% Total 99% Q3a. Have you become more concerned about privacy and security of your personal data over the past 5 years? Pct% Yes 47% No 53% 2 The total percentage does not sum to 100 percent because of a rounding error. Ponemon Institute Research Report Page 39
41 Q3b. If you became more concerned about the privacy and security of your personal data over the past five years, why? Please select all the reasons why you have become more concerned. Pct% I became a victim of a data breach 61% I became a victim of identity theft 7% I have growing concerns about government surveillance 23% I use social media more often 53% I am using location tracking devices more often 15% I know someone who became a victim of a data breach 13% I am using my mobile devices such as smartphones and tablets more often 63% I use mobile payment methods including mobile wallet 12% More of my personal information including medical records is being shared with third parties 49% Total 297% Q4. Please rate your level of knowledge or familiarity about each device presented using the following scale: 1 = Very familiar, 2 = Familiar, 3 = Somewhat familiar and 4 = Not familiar Total Fitness status tracking wearable 9% 12% 34% 45% 100% Google Glass 11% 15% 21% 54% 100% Smart home thermostat 13% 14% 24% 49% 100% Smart TV 40% 27% 27% 7% 100% Smart kitchen appliances 24% 21% 16% 40% 100% Smart security systems 10% 8% 22% 61% 100% Smart electric meter 21% 20% 24% 35% 100% Smartphone/Tablet 44% 23% 26% 7% 100% Q5. [If not familiar skip to Q8] Do you currently use or plan to use this smart device? No plan to use Use Plan to use Total Fitness status tracking wearable 8% 21% 71% 100% Google Glass 6% 16% 79% 100% Smart home thermostat 9% 21% 70% 100% Smart TV 30% 40% 30% 100% Smart kitchen appliances 19% 25% 57% 100% Smart security systems 5% 11% 84% 100% Smart electric meter 17% 29% 55% 100% Smartphone/Tablet 43% 33% 24% 100% Ponemon Institute Research Report Page 40
42 Q6. What personal information do you believe is collected by the devices listed above? Check your answers in each cell of the following matrix for these smart devices Fitness tracking Google Glass Smart thermostat Smart TV Smart kitchen Smart security Smart meter Smart phone or tablet Browser settings & histories 47% 96% 24% 90% 20% 29% 14% 86% Credit history 0% 5% 2% 1% 3% 8% 4% 5% address 86% 79% 57% 93% 81% 80% 77% 85% Health condition 76% 12% 6% 6% 19% 20% 13% 15% Hobbies, tastes & preferences 33% 69% 11% 50% 36% 22% 6% 42% Home address 46% 70% 84% 55% 80% 79% 82% 90% Marital status 37% 78% 4% 22% 38% 51% 24% 31% Name 83% 85% 78% 68% 53% 77% 62% 59% Names of friends & family members 26% 51% 12% 62% 45% 58% 13% 62% Payment account details 29% 54% 34% 61% 21% 47% 58% 63% Phone numbers 16% 28% 21% 26% 15% 90% 20% 92% Photos & videos 64% 54% 8% 36% 8% 88% 4% 85% Physical location (GPS) 45% 82% 16% 14% 36% 87% 88% 76% Purchase histories 1% 69% 1% 45% 39% 12% 1% 41% Social Security number 0% 6% 2% 3% 0% 26% 0% 6% Special dates including date of birth 6% 13% 2% 9% 30% 20% 2% 3% Gender 84% 90% 25% 46% 36% 82% 5% 38% School or employer 2% 42% 2% 4% 7% 40% 5% 41% Average 38% 55% 22% 38% 31% 51% 26% 51% Q7a. [Only those who use or plan to use] Did any of the manufacturers of the devices you use (or plan to use) provide you with information about how your personal information is protected? Pct% Yes 18% No 60% Unsure 22% Total 100% Ponemon Institute Research Report Page 41
43 Q7b. If yes, what protections are in place to protect your personal information? Pct% My data is shared only with trusted parties 48% I can turn off tracking activities anytime 22% The device provides strong authentication controls 21% I can remotely disable the device if it is lost or stolen 16% I can erase any information collected about me 15% I can opt out of data collection and/or data sharing 44% My personal information collected is encrypted 16% There is someone to contact if I have concerns about privacy 8% None of the above 45% Total 234% Q8. Did any of the manufacturers of the devices you use (or plan to use) provide you with information about how your personal information will be used? Pct% Yes 18% No 58% Unsure 24% Total 100% Q9. How concerned are you about maintaining your privacy in the IoT? Pct% 1 or 2 (low) 7% 3 or 4 10% 5 or 6 31% 7 or 8 23% 9 or 10 (high) 29% Total 100% Q10. How concerned are you about your security in the IoT? Pct% 1 or 2 (low) 3% 3 or 4 4% 5 or 6 13% 7 or 8 24% 9 or 10 (high) 56% Total 100% Ponemon Institute Research Report Page 42
44 Q11. How concerned are you about the security of your personal data when using social media (such as Facebook and Google)? Pct% 1 or 2 (low) 7% 3 or 4 7% 5 or 6 13% 7 or 8 30% 9 or 10 (high) 44% Total 100% Q12. How concerned are you about the privacy of your personal data when using social media (such as Facebook and Google)? Pct% 1 or 2 (low) 11% 3 or 4 10% 5 or 6 25% 7 or 8 30% 9 or 10 (high) 24% Total 100% Q13. How much control do you have over how your personal information is collected, shared and stored when using smart devices connected to the IoT? Pct% 1 or 2 (low) 48% 3 or 4 27% 5 or 6 9% 7 or 8 10% 9 or 10 (high) 6% Total 100% Q14. Do you believe the benefits of the IoT outweigh your concerns about privacy or security? Pct% Yes 44% No 42% Unsure 14% Total 100% Ponemon Institute Research Report Page 43
45 Q15. I believe the manufacturer of smart devices that connect to the IoT should provide the following information. Please check all that apply. Pct% Tell me what information is collected 71% Tell me how the information is used 71% Allow me to control what information is collected (opt-in and opt-out of information that is collected) 60% Let me know how I can protect my information from being lost or stolen 50% Tell me what I should do if the smart device is hacked 60% Assurance that my data is safeguarded 52% No information is necessary 14% Tell me when my personal information is lost or stolen 57% Compensate me if my information is lost or stolen 74% Don t know 17% Total 525% Q16. Does your employer have the right to access personal data on your Smart device if you use it at work or connect to your employer s Internet? Pct% Yes 39% No 52% Unsure 9% Total 100% Part 2. Value of your personal data Q17. The personal data I provide to companies is valuable because it helps them to market and sell products to others and me. Pct% Strongly agree 29% Agree 32% Unsure 23% Disagree 11% Strongly disagree 5% Total 100% Ponemon Institute Research Report Page 44
46 Q18. My personal data is a financial asset similar to traded goods, currencies or commodities. Pct% Strongly agree 25% Agree 28% Unsure 22% Disagree 17% Strongly disagree 8% Total 100% Q19. Even if I willingly share my personal data with companies, I still control how they collect, share and store my personal data. Pct% Strongly agree 13% Agree 19% Unsure 21% Disagree 30% Strongly disagree 18% Total 100% Q20. After browsing websites and/or making online purchases, do you believe you have control over how your personal data is used? Pct% Yes, most of the time 13% Yes, some of the time 17% Rarely 51% No 19% Total 100% Q21. Do you believe that when you shop at a store and share personal information you have control over how your personal data is used? Pct% Yes, most of the time 15% Yes, some of the time 23% Rarely 42% No 21% Total 100% Ponemon Institute Research Report Page 45
47 Q22. When you browse the Internet, shop online or make instore purchases, your personal data is collected. What do you believe companies do with your personal data? Pct% The data is used to understand my preferences 62% The data is used to provide me with better security 38% The data is used to understand other consumers preferences 57% The data is sold by those collecting it for unknown purposes 42% I do not know how companies use my personal data 25% Total 224% Q23. When you receive ads based upon your purchasing and browsing habits, do you believe this is helpful to you? Pct% Yes, most of the time 20% Yes, some of the time 25% Rarely 18% No 37% Total 100% Q24. Do you belong to one or more loyalty programs that provide benefits in exchange for purchases (such as those offered by grocery stores, retailers, pharmacies, credit card companies, airlines and others)? Pct% Yes 67% No (Skip to Q28) 33% Total 100% Q25. How are you compensated for your participation in loyalty programs? Please select all that apply. Pct% Discounts on future purchases 64% Early access to sales or discounts or hard to get products or services (i.e. tickets to a playoff game) 48% Cash back or reimbursements 28% Free goods and services 13% Free and upgraded flights 29% Concierge services 13% Total 195% Ponemon Institute Research Report Page 46
48 Q26. Do you understand how your personal data is being used by your loyalty programs? Pct% Yes, full understanding 24% Yes, some understanding 32% No 44% Total 100% Q27. Do you believe you are adequately compensated for participation in your loyalty programs? Pct% Yes 39% No 40% Unsure 21% Total 100% Q28a. Would you be willing to provide your personal data to trusted companies in exchange for money? Pct% Yes 56% No, I would not provide my personal data for any amount of money 36% Unsure 7% Total 100% Q28b. If yes, how much would a trusted company have to pay you to obtain the following data about you? Please identify only one minimum amount for each data category listed. Response scale was converted from Euros to US$. < $1 $1 to 5 $6 to $10 $11 to $25 $26 to $50 $51 to $100 > $100 Browser settings & histories 26% 44% 11% 12% 7% 0% 0% Credit history 10% 9% 13% 24% 32% 6% 6% address 33% 20% 32% 11% 2% 2% 0% Health condition 13% 13% 7% 7% 8% 18% 34% Hobbies, tastes & preferences 33% 24% 17% 7% 14% 4% 0% Home address 37% 25% 15% 8% 8% 7% 1% Marital status 40% 33% 14% 7% 2% 3% 1% Name 44% 42% 9% 2% 1% 1% 0% Names of friends & family members 23% 13% 17% 14% 20% 8% 4% Passwords (login details) 2% 2% 4% 11% 16% 26% 40% Payment details (credit card) 11% 13% 9% 19% 19% 22% 7% Phone numbers 29% 30% 31% 7% 2% 0% 0% Photos & videos 24% 28% 17% 18% 9% 2% 1% Physical location (GPS) 20% 27% 24% 9% 12% 4% 3% Purchase histories 9% 11% 29% 28% 15% 5% 3% Social Security number Special dates including date of birth 45% 32% 11% 8% 4% 1% 0% Gender 70% 22% 4% 3% 2% 0% 0% School or employer 28% 23% 19% 13% 9% 7% 0% Ponemon Institute Research Report Page 47
49 Part 3. Demographics D1. Gender Pct% Female 51% Male 49% Total 100% D2. Age Pct% 18 to 25 21% 26 to 35 24% 36 to 45 19% 46 to 55 15% 56 to 65 13% 65+ 7% Total 100% D3. Highest Level of Education (US scale presented): Pct% High School 19% Vocational 23% College (attended, no degree) 24% College (4 year degree) 25% Post Graduate 8% Doctorate 1% Total 100% D4. Household Income (Expressed in US$): Pct% Less than $25,000 11% $25,000 to $40,000 21% $40,001 to $60,000 27% $60,001 to $80,000 17% $80,001 to $100,000 10% $100,001 to $150,000 8% $150,001 to $250,000 6% More than $250,000 2% Total 100% Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute Research Report Page 48
Privacy and Security in a Connected Life: A Study of European Consumers
Privacy and Security in a Connected Life: A Study of European Consumers Sponsored by Trend Micro Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research
Global Insights on Document Security
Global Insights on Document Security Sponsored by Adobe Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report Global Insights on Document Security
Third Annual Study: Is Your Company Ready for a Big Data Breach?
Third Annual Study: Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute
A Study of Retail Banks & DDoS Attacks
A Study of Retail Banks & DDoS Attacks Sponsored by Corero Network Security Independently conducted by Ponemon Institute LLC Publication Date: December 2012 Ponemon Institute Research Report A Study of
How Much Is the Data on Your Mobile Device Worth?
How Much Is the Data on Your Mobile Device Worth? Sponsored by Lookout Independently conducted by Ponemon Institute LLC Publication Date: January 2016 Ponemon Institute Research Report Part 1. Introduction
Challenges of Cloud Information
The Challenges of Cloud Information Governance: A Global Data Security Study Sponsored by SafeNet Independently conducted by Ponemon Institute LLC Publication Date: October 2014 Ponemon Institute Research
The Importance of Cyber Threat Intelligence to a Strong Security Posture
The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier Effect Sponsored by Netskope Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report Part 1. Introduction Data Breach:
Exposing the Cybersecurity Cracks: A Global Perspective
Exposing the Cybersecurity Cracks: A Global Perspective Part I: Deficient, Disconnected & in the Dark Sponsored by Websense, Inc. Independently conducted by Ponemon Institute LLC Publication Date: April
Reputation Impact of a Data Breach U.S. Study of Executives & Managers
Reputation Impact of a Data Breach U.S. Study of Executives & Managers Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: November 2011 Ponemon
The State of Data Security Intelligence. Sponsored by Informatica. Independently conducted by Ponemon Institute LLC Publication Date: April 2015
The State of Data Security Intelligence Sponsored by Informatica Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report The State of Data Security
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb? Sponsored by Varonis Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report Corporate
The Cost of Web Application Attacks
The Cost of Web Application Attacks Sponsored by Akamai Technologies Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Ponemon Institute Research Report Part 1. Introduction The
Understanding Security Complexity in 21 st Century IT Environments:
Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted
Security of Paper Records & Document Shredding. Sponsored by Cintas. Independently conducted by Ponemon Institute LLC Publication Date: January 2014
Security of Paper Records & Document Shredding Sponsored by Cintas Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction
Sponsored by Zimbra. The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA
The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA Sponsored by Zimbra Independently conducted by Ponemon Institute LLC Publication Date: November 2014 Ponemon Institute
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013
The Security Impact of Mobile Device Use by Employees
The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security
The State of Data Centric Security
The State of Data Centric Security Sponsored by Informatica Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report State of Data Centric Security
Data Security in Development & Testing
Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development
Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014
Achieving Security in Workplace File Sharing Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction Achieving
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication
Defining the Gap: The Cybersecurity Governance Study
Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining
The Unintentional Insider Risk in United States and German Organizations
The Unintentional Insider Risk in United States and German Organizations Sponsored by Raytheon Websense Independently conducted by Ponemon Institute LLC Publication Date: July 2015 2 Part 1. Introduction
Security of Cloud Computing Users Study
Security of Cloud Computing Users Study Sponsored by CA Technologies Independently conducted by Ponemon Institute, LLC Publication Date: March 2013 Security of Cloud Computing Users Study March 2013 Part
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon
How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United States
How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United States Sponsored by Imprivata Independently conducted by Ponemon Institute LLC Publication Date:
Risk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin
Risk & Innovation in Cybersecurity Investments Sponsored by Lockheed Martin Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report Part 1. Introduction
The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations
Threat Intelligence & Incident Response: A Study of U.S. & EMEA Organizations Sponsored by AccessData Independently conducted by Ponemon Institute LLC Publication Date: February 2014 Ponemon Institute
Exposing the Cybersecurity Cracks: A Global Perspective
Exposing the Cybersecurity Cracks: A Global Perspective Part 2: Roadblocks, Refresh and Raising the Human Security IQ Sponsored by Websense Independently conducted by Ponemon Institute LLC Publication
Aftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
The Importance of Senior Executive Involvement in Breach Response
The Importance of Senior Executive Involvement in Breach Response Sponsored by HP Enterprise Security Services Independently conducted by Ponemon Institute LLC Publication Date: October 2014 The Importance
The State of Mobile Application Insecurity
The State of Mobile Application Insecurity Sponsored by IBM Independently conducted by Ponemon Institute LLC Publication Date: February 2015 Ponemon Institute Research Report Part 1. Introduction The State
Smartphone Security Survey of U.S. consumers
Smartphone Security Survey of U.S. consumers Sponsored by AVG Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon Institute Research Report Smartphone Security
Understaffed and at Risk: Today s IT Security Department. Sponsored by HP Enterprise Security
Understaffed and at Risk: Today s IT Security Department Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: February 2014 Ponemon Institute Research
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from: Kaiser Permanente, ID Experts, Experian Data Breach Resolution and Identity Finder, LLC
Cloud Security: Getting It Right
Cloud Security: Getting It Right Sponsored by Armor Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute Research Report Cloud Security: Getting It Right Ponemon
Efficacy of Emerging Network Security Technologies
Efficacy of Emerging Network Security Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: February 2013 Ponemon Institute Research Report Part
Data Loss Risks During Downsizing As Employees Exit, so does Corporate Data
Data Loss Risks During Downsizing As Employees Exit, so does Corporate Data Independently conducted by Ponemon Institute LLC Publication Date: February 23, 2009 Sponsored by Symantec Corporation Ponemon
Breaking Bad: The Risk of Insecure File Sharing
Breaking Bad: The Risk of Insecure File Sharing Sponsored by Intralinks Independently conducted by Ponemon Institute LLC Publication Date: October 2014 Ponemon Institute Research Report Breaking Bad: The
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
The TCO of Software vs. Hardware-based Full Disk Encryption Summary
The TCO of vs. -based Full Disk Encryption Summary Sponsored by WinMagic Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Industry Co-Sponsors Ponemon Institute Research Report
Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers
Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers Independently Conducted by Ponemon Institute LLC February 2012 Leading Practices in Behavioral
The SQL Injection Threat Study
The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April 2014 1 The SQL Injection Threat Study Presented by Ponemon Institute, April
The Security of Cloud Infrastructure Survey of U.S. IT and Compliance Practitioners
The Security of Cloud Infrastructure Survey of U.S. IT and Compliance Practitioners Sponsored by Vormetric Independently conducted by Ponemon Institute LLC Publication Date: November 2011 Ponemon Institute
National Survey on Data Center Outages
National Survey on Data Center Outages Independently conducted by Ponemon Institute LLC Publication Date: 30 September 2010 Part 1. Executive Summary National Survey on Data Center Outages Ponemon Institute,
Privileged User Abuse & The Insider Threat
Privileged User Abuse & The Insider Threat Commissioned by Raytheon Company Independently conducted by Ponemon Institute LLC Publication Date: May 2014 1 Privileged User Abuse & The Insider Threat Ponemon
2015 Global Study on IT Security Spending & Investments
2015 Study on IT Security Spending & Investments Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Sponsored by Part 1. Introduction Security risks are pervasive and becoming
The 2013 ecommerce Cyber Crime Report: Safeguarding Brand And Revenue This Holiday Season
The 2013 ecommerce Cyber Crime Report: Safeguarding Brand And Revenue This Holiday Season Sponsored by RSA Security Independently conducted by Ponemon Institute, LLC Publication Date: October 2013 Ponemon
Security of Cloud Computing Providers Study
Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011 Ponemon Institute Research Report I. Executive Summary
2015 Global Megatrends in Cybersecurity
2015 Global Megatrends in Cybersecurity Sponsored by Raytheon Independently conducted by Ponemon Institute LLC Publication Date: February 2015 Ponemon Institute Research Report 2015 Global Megatrends in
2015 Global Encryption & Key Management Trends Study. Sponsored by Thales e-security
2015 Global Encryption & Key Management Trends Study Sponsored by Thales e-security Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report 2015
The Post Breach Boom. Sponsored by Solera Networks. Independently conducted by Ponemon Institute LLC Publication Date: February 2013
The Post Breach Boom Sponsored by Solera Networks Independently conducted by Ponemon Institute LLC Publication Date: February 2013 Ponemon Institute Research Report Part 1. Introduction The Post Breach
The State of USB Drive Security
The State of USB Drive Security U.S. survey of IT and IT security practitioners Sponsored by Kingston Independently conducted by Ponemon Institute LLC Publication Date: July 2011 Ponemon Institute Research
EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013
EUROPEAN MOBILE INSIGHTS 2012 NORTON CYBERCRIME REPORT APRIL 2013 EUROPEAN MOBILE INSIGHTS: 2012 NORTON CYBERCRIME REPORT 9 COUNTRIES DENMARK, FRANCE, GERMANY, ITALY, NETHERLANDS, POLAND, RUSSIA, SWEDEN,
2012 Application Security Gap Study: A Survey of IT Security & Developers
2012 Application Gap Study: A Survey of IT & s Research sponsored by Innovation Independently Conducted by Ponemon Institute LLC March 2012 1 2012 Application Gap Study: A Survey of IT & s March 2012 Part
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned
State of Web Application Security U.S. Survey of IT & IT security practitioners
State of Web Application Security U.S. Survey of IT & IT security practitioners Sponsored by Cenzic & Barracuda Networks Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon
KEY FINDINGS. 2 New trends in global shopping habits. Smartphones are increasingly important during all stages of the consumer journey
KEY FINDINGS 1 Smartphones are increasingly important during all stages of the consumer journey 2 New trends in global shopping habits 3 Social media s influence varies widely by country METHODOLOGY To
The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations
The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations Independently conducted by Ponemon Institute LLC Publication Date: 30 September 2010 Ponemon Institute Research Report Part
Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013
Internet Security Priorities Prepared for: Presented by: Benenson Strategy Group and American Viewpoint December 20, 2013 Methodology The Benenson Strategy Group and American Viewpoint conducted 1,000
Global Survey on Social Media Risks Survey of IT & IT Security Practitioners
0 Global Survey on Social Media Risks Survey of IT & IT Security Practitioners Sponsored by Websense Independently conducted by Ponemon Institute LLC Publication Date: September 2011 1 Global Survey on
How To Prevent Cybercrime
2013 NORTON REPORT 2013 NORTON REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND, RUSSIA, SAUDI ARABIA,
Mobile Apps: What Consumers Really Need and Want. A Global Study of Consumers Expectations and Experiences of Mobile Applications
Mobile Apps: What Consumers Really Need and Want A Global Study of Consumers Expectations and Experiences of Mobile Applications The Difference Between a Mobile App and a Mobile Website Before we evaluate
Cyber Security on the Offense: A Study of IT Security Experts
Cyber Security on the Offense: A Study of IT Security Experts Co-authored with Radware Independently conducted by Ponemon Institute LLC Publication Date: November 2012 Ponemon Institute Research Report
Special Eurobarometer 423 CYBER SECURITY SUMMARY
Special Eurobarometer 423 CYBER SECURITY SUMMARY Fieldwork: October 2014 Publication: February 2015 This survey has been requested by the European Commission, Directorate-General for Home Affairs and co-ordinated
BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence
BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence 90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner.
