SlideShare uma empresa Scribd logo
1 de 18
Feeling Secure Online?
Beliefs and Attitudes on Security and Privacy
Bill Dutton
with Grant Blank, Gillian Bolsover, Elizabeth Dubois, SoumitraDutta, and
Ginette Law, Oxford Internet Institute, University of Oxford
Presentation for the Global Cyber Security Capacity Centre Inaugural
Conference, Oxford Martin School, University of Oxford, 25 November 2013.
• Devices
• Networks
• Trusted Platforms

Technical
Infrastructures

Institutional Policies
and Practices
• Insider Threats
• Unauthorized Access
• Monitoring
• Rights

• Security
• Privacy
• Trust

Public Perceptions
Social and Cultural Dimensions of
Cyber Security

Attitudes

• Concerns
• Trust

Beliefs

• Privacy
• Security

Practices

• Know-how
• Actions taken
Questions about Attitudes and Beliefs

How serious are public concerns?

How have they changed overtime?

How are they distributed – socially and globally?
Research Foundations for Study of Public Attitudes and Beliefs

Oxford Internet
Survey 2003-13

• Over 2000 face-to-face interviews
• Multi-stage probability sample of UK
• Every two years – Feb-March 2013

WEF 2010

• Web-based stratified sample survey, English
• Oct-Nov 2010 by comScore
• 5,400 Internet users, 13 countries

WEF 2012

• Web-based stratified sample survey, 9 languages
• July-Sept 2012 by ComScore, Toluna (ictQATAR)
• 11,225 respondents, 63 countries
High
Penetration

Moderate
Penetration

Low
Penetration

Fringe
Penetration

USA

Argentina

Mexico

South
Africa

Canada

Columbia

Brazil

India

UK

Italy

Peru

France

Spain

China

Germany

Australia

Japan
South
Korea

Saudi
Arabia
Egypt

Nations with
over 300
respondents
in 2012 WEF
Survey.
Dutton, W. H., Law, G., Bolsover, G., and
Dutta, S. (2013), The Internet Trust Bubble.
New York: WEF.

Dutta, S., Dutton, W. H., and Law, G.
(2011), The New Internet World.
New York: WEF, April.
The Internet Values Project:
‘The New Internet World’
1. New online nations are
dominant in the New World;
2. Users developing a global
Internet culture: sharing similar
values and attitudes;
3. Newly adopting countries are
as liberal, if not more so, such
as in support for freedom of
expression, privacy;
4. Users in the newly adopting
nations are more innovative in
some patterns of
use, e.g., social networking.
An Internet Trust Bubble?
Support for
Freedom of
Expression, but …
Concern over
Privacy &
Security

Trust in
Authenticity of
Information?

• 78% view access to the Internet as a fundamental right
• 75% believe people should be able to say what they feel about
their government online, and be anonymous at times (61%) but …
• Bare majority (54%) believe it is safe to express views online
• 71% of users careful about what they do or say online

• 61% believe the Internet puts privacy at risk, and 67% feel
organizations ask for too much information
• 63% concerned about being monitored online
• Users in emerging nations less aware of risks, more trusting

•
•
•
•

Online news as trusted as traditional news, but …
only 43% trust social media as a source
48% do not trust information written and edited by many people
One in four concerned about authenticity of online information
Beliefs about Online Privacy
• Organizations, companies ask for too much
personal information online (67%)
• People who go online put their privacy at risk
(61%)
• There is personal information about me that is
collected on the Internet for reasons I do not
know (58%)
• People I do not know have access to my online
personal information (57%)
• The government monitors what people do on the
Internet (50%)
Beliefs about Security Online
• I have control over the information I disclose
about myself online (62%)
• The personal information I put online is kept
safe (45%)
• I feel safe providing some personal
information such as my name, birth date, or
phone number on the Internet (41%)

N = 10,208.
Concerns about Online Security
• Someone breaking into your Internet account
or e-mail (72%)
• Information you provided for one purpose is
being used for another purpose online (67%)
Practices to Protect Privacy-Security
• Scan your computer for mobile devices for
viruses or spyware (65%)
• Check your privacy and security settings
online (54%)
• Read privacy policies before using a Web site
or service (41%)
Trust to Protect your Personal Data
Percent Trusting
Banks, financial inst.
Prov. Health, medical
Gov't authorities
ISPs
Mobile phone comp.
Percent Trusting

Telephone Comp.
Search engines
Shops, dept stores
SNS providers
Online marketers, ad
0

10

20

30

40

50

60

70
Trends Over Time: Focus on the UK
Stability
Steady or
Declining Bad
Experiences
Small but
Increasing
Problems

• Level of concern over privacy
• Comfort revealing personal details
online
• Viruses
• Bank details
• Obscene emails

• Misrepresentation
• Stolen credit card details
Concerns and Actions to Address Bad Experiences, UK, 2013
90

80

70

60

50

Concerned
40

Did Something

30

20

10

0
Unpleasant experience

Spam

Viruses via email
An Internet Trust Bubble?
Norms
Support Core
Values

• Freedom of Expression
• Privacy, Security & Authenticity

Global
Concerns

• Expressing Views Online
• Privacy and Security
• Governmental Monitoring & Surveillance
• Authenticity of Information

Research Foci

• Patterns of Cross-national Differences
• Differences among Users
• Implications for the Vitality of the Internet

Mais conteúdo relacionado

Mais procurados

e-Patients and Healthcare Social Media (#hcsm)
e-Patients and Healthcare Social Media (#hcsm)e-Patients and Healthcare Social Media (#hcsm)
e-Patients and Healthcare Social Media (#hcsm)Stanford University
 
Information policy ppt
Information policy pptInformation policy ppt
Information policy pptKabir Khan
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State FilterAndrew Davies
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianDamar Juniarto
 
Cooperation SIG Report
Cooperation SIG ReportCooperation SIG Report
Cooperation SIG ReportAPNIC
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacymrzapper
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessMark Jhon Oxillo
 
Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)Eleonora Rosati
 

Mais procurados (20)

e-Patients and Healthcare Social Media (#hcsm)
e-Patients and Healthcare Social Media (#hcsm)e-Patients and Healthcare Social Media (#hcsm)
e-Patients and Healthcare Social Media (#hcsm)
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
Information policy ppt
Information policy pptInformation policy ppt
Information policy ppt
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
2.2.1 dr jill tomlinson
2.2.1 dr jill tomlinson2.2.1 dr jill tomlinson
2.2.1 dr jill tomlinson
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Cooperation SIG Report
Cooperation SIG ReportCooperation SIG Report
Cooperation SIG Report
 
Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
Reflecting on the ICT Learning Process
Reflecting on the ICT Learning ProcessReflecting on the ICT Learning Process
Reflecting on the ICT Learning Process
 
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
 
What's next
What's nextWhat's next
What's next
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
 
Mobile Practice Management
Mobile Practice ManagementMobile Practice Management
Mobile Practice Management
 
Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)Google transparency and the challenges of content control (E Rosati)
Google transparency and the challenges of content control (E Rosati)
 

Destaque

Edtc6320 ssanchez project3revised
Edtc6320 ssanchez project3revisedEdtc6320 ssanchez project3revised
Edtc6320 ssanchez project3revisedSally Sanchez
 
Tracel 2011 3rd international symposium on trace elements & health
Tracel 2011   3rd international symposium on trace elements & healthTracel 2011   3rd international symposium on trace elements & health
Tracel 2011 3rd international symposium on trace elements & healthOBenavente
 
Ds272 2556 criticalthinkingppt
Ds272 2556 criticalthinkingpptDs272 2556 criticalthinkingppt
Ds272 2556 criticalthinkingpptmatanaslideshare
 
Can You Draw Me An Arrow
Can You Draw Me An ArrowCan You Draw Me An Arrow
Can You Draw Me An ArrowWeLoveStories
 
Bauhina Genome slides for school visit
Bauhina Genome slides for school visitBauhina Genome slides for school visit
Bauhina Genome slides for school visitScott Edmunds
 
disability and/or mental illness for hospital dentistry
disability and/or mental illness for hospital dentistrydisability and/or mental illness for hospital dentistry
disability and/or mental illness for hospital dentistrymatanaslideshare
 
Artihistoria laiagemmaanna
Artihistoria laiagemmaannaArtihistoria laiagemmaanna
Artihistoria laiagemmaannaGemma Palet
 
BGI training lecture: Scott Edmunds - Science 2.0, why new developments on th...
BGI training lecture: Scott Edmunds - Science 2.0, why new developments on th...BGI training lecture: Scott Edmunds - Science 2.0, why new developments on th...
BGI training lecture: Scott Edmunds - Science 2.0, why new developments on th...Scott Edmunds
 

Destaque (20)

Texas policy 2016
Texas policy 2016Texas policy 2016
Texas policy 2016
 
Edtc6320 ssanchez project3revised
Edtc6320 ssanchez project3revisedEdtc6320 ssanchez project3revised
Edtc6320 ssanchez project3revised
 
Why Journalism Needs the Fifth Estate
Why Journalism Needs the Fifth EstateWhy Journalism Needs the Fifth Estate
Why Journalism Needs the Fifth Estate
 
Inside tempdb
Inside tempdbInside tempdb
Inside tempdb
 
Tracel 2011 3rd international symposium on trace elements & health
Tracel 2011   3rd international symposium on trace elements & healthTracel 2011   3rd international symposium on trace elements & health
Tracel 2011 3rd international symposium on trace elements & health
 
Bibliomist online presence
Bibliomist online presenceBibliomist online presence
Bibliomist online presence
 
Conte col·laboratiu
Conte col·laboratiuConte col·laboratiu
Conte col·laboratiu
 
Media Literacy Audit
Media Literacy AuditMedia Literacy Audit
Media Literacy Audit
 
Trip on westfalia
Trip on westfaliaTrip on westfalia
Trip on westfalia
 
Ds272 2556 criticalthinkingppt
Ds272 2556 criticalthinkingpptDs272 2556 criticalthinkingppt
Ds272 2556 criticalthinkingppt
 
Can You Draw Me An Arrow
Can You Draw Me An ArrowCan You Draw Me An Arrow
Can You Draw Me An Arrow
 
5th manheim
5th manheim5th manheim
5th manheim
 
The Internet and the Rise of a Fifth Estate
The Internet and the Rise of a Fifth EstateThe Internet and the Rise of a Fifth Estate
The Internet and the Rise of a Fifth Estate
 
Bauhina Genome slides for school visit
Bauhina Genome slides for school visitBauhina Genome slides for school visit
Bauhina Genome slides for school visit
 
disability and/or mental illness for hospital dentistry
disability and/or mental illness for hospital dentistrydisability and/or mental illness for hospital dentistry
disability and/or mental illness for hospital dentistry
 
5th Estate in China-2012
5th Estate in China-20125th Estate in China-2012
5th Estate in China-2012
 
5th estate presentation to CRASSH, Cambridge
5th estate presentation to CRASSH, Cambridge5th estate presentation to CRASSH, Cambridge
5th estate presentation to CRASSH, Cambridge
 
Fred williams ica-2012
Fred williams ica-2012Fred williams ica-2012
Fred williams ica-2012
 
Artihistoria laiagemmaanna
Artihistoria laiagemmaannaArtihistoria laiagemmaanna
Artihistoria laiagemmaanna
 
BGI training lecture: Scott Edmunds - Science 2.0, why new developments on th...
BGI training lecture: Scott Edmunds - Science 2.0, why new developments on th...BGI training lecture: Scott Edmunds - Science 2.0, why new developments on th...
BGI training lecture: Scott Edmunds - Science 2.0, why new developments on th...
 

Semelhante a Do you feel secure online? Beliefs and Attitudes on Security and Privacy

Data halo presentation from NHS Citizen Bristol Design Workshop
Data halo presentation from NHS Citizen Bristol Design WorkshopData halo presentation from NHS Citizen Bristol Design Workshop
Data halo presentation from NHS Citizen Bristol Design WorkshopNHSCitizen
 
UW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
UW Extension Broadband Boot Camp 2016 Breakout: Aging in PlaceUW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
UW Extension Broadband Boot Camp 2016 Breakout: Aging in PlaceWI Broadband
 
UW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
UW Extension Broadband Boot Camp 2016 Breakout: Aging in PlaceUW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
UW Extension Broadband Boot Camp 2016 Breakout: Aging in PlaceWI Broadband
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastMOTC Qatar
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1KR_Barker
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Health-related Information as Personal Data in Europe: Results from a Represe...
Health-related Information as Personal Data in Europe: Results from a Represe...Health-related Information as Personal Data in Europe: Results from a Represe...
Health-related Information as Personal Data in Europe: Results from a Represe...Francisco Lupiáñez-Villanueva
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationStephen Cobb
 
Professionalism and health care social media
Professionalism and health care social mediaProfessionalism and health care social media
Professionalism and health care social mediaFarris Timimi
 

Semelhante a Do you feel secure online? Beliefs and Attitudes on Security and Privacy (20)

Data halo presentation from NHS Citizen Bristol Design Workshop
Data halo presentation from NHS Citizen Bristol Design WorkshopData halo presentation from NHS Citizen Bristol Design Workshop
Data halo presentation from NHS Citizen Bristol Design Workshop
 
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
UW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
UW Extension Broadband Boot Camp 2016 Breakout: Aging in PlaceUW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
UW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
 
UW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
UW Extension Broadband Boot Camp 2016 Breakout: Aging in PlaceUW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
UW Extension Broadband Boot Camp 2016 Breakout: Aging in Place
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle East
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Dave Taylor
Dave TaylorDave Taylor
Dave Taylor
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Internet, Search and Threats to News Ecosystem
Internet, Search and Threats to News EcosystemInternet, Search and Threats to News Ecosystem
Internet, Search and Threats to News Ecosystem
 
Health-related Information as Personal Data in Europe: Results from a Represe...
Health-related Information as Personal Data in Europe: Results from a Represe...Health-related Information as Personal Data in Europe: Results from a Represe...
Health-related Information as Personal Data in Europe: Results from a Represe...
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Professionalism and health care social media
Professionalism and health care social mediaProfessionalism and health care social media
Professionalism and health care social media
 

Mais de Oxford Martin Centre, OII, and Computer Science at the University of Oxford

Mais de Oxford Martin Centre, OII, and Computer Science at the University of Oxford (20)

5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx
 
Cybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the WorkplaceCybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the Workplace
 
Changing Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptxChanging Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptx
 
25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Dutton power corrupts-2021
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth Estate
 
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
Digital Divides tprc-2019
 
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
 
Future of public broadcasting and a university
Future of public broadcasting and a universityFuture of public broadcasting and a university
Future of public broadcasting and a university
 
Social media realitie lisbon-2018
Social media realitie lisbon-2018Social media realitie lisbon-2018
Social media realitie lisbon-2018
 
Search&politics lisbon-2018
Search&politics lisbon-2018Search&politics lisbon-2018
Search&politics lisbon-2018
 
Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017
 
Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017
 
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
 

Último

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Último (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

Do you feel secure online? Beliefs and Attitudes on Security and Privacy

  • 1. Feeling Secure Online? Beliefs and Attitudes on Security and Privacy Bill Dutton with Grant Blank, Gillian Bolsover, Elizabeth Dubois, SoumitraDutta, and Ginette Law, Oxford Internet Institute, University of Oxford Presentation for the Global Cyber Security Capacity Centre Inaugural Conference, Oxford Martin School, University of Oxford, 25 November 2013.
  • 2. • Devices • Networks • Trusted Platforms Technical Infrastructures Institutional Policies and Practices • Insider Threats • Unauthorized Access • Monitoring • Rights • Security • Privacy • Trust Public Perceptions
  • 3. Social and Cultural Dimensions of Cyber Security Attitudes • Concerns • Trust Beliefs • Privacy • Security Practices • Know-how • Actions taken
  • 4. Questions about Attitudes and Beliefs How serious are public concerns? How have they changed overtime? How are they distributed – socially and globally?
  • 5. Research Foundations for Study of Public Attitudes and Beliefs Oxford Internet Survey 2003-13 • Over 2000 face-to-face interviews • Multi-stage probability sample of UK • Every two years – Feb-March 2013 WEF 2010 • Web-based stratified sample survey, English • Oct-Nov 2010 by comScore • 5,400 Internet users, 13 countries WEF 2012 • Web-based stratified sample survey, 9 languages • July-Sept 2012 by ComScore, Toluna (ictQATAR) • 11,225 respondents, 63 countries
  • 7. Dutton, W. H., Law, G., Bolsover, G., and Dutta, S. (2013), The Internet Trust Bubble. New York: WEF. Dutta, S., Dutton, W. H., and Law, G. (2011), The New Internet World. New York: WEF, April.
  • 8. The Internet Values Project: ‘The New Internet World’ 1. New online nations are dominant in the New World; 2. Users developing a global Internet culture: sharing similar values and attitudes; 3. Newly adopting countries are as liberal, if not more so, such as in support for freedom of expression, privacy; 4. Users in the newly adopting nations are more innovative in some patterns of use, e.g., social networking.
  • 9. An Internet Trust Bubble? Support for Freedom of Expression, but … Concern over Privacy & Security Trust in Authenticity of Information? • 78% view access to the Internet as a fundamental right • 75% believe people should be able to say what they feel about their government online, and be anonymous at times (61%) but … • Bare majority (54%) believe it is safe to express views online • 71% of users careful about what they do or say online • 61% believe the Internet puts privacy at risk, and 67% feel organizations ask for too much information • 63% concerned about being monitored online • Users in emerging nations less aware of risks, more trusting • • • • Online news as trusted as traditional news, but … only 43% trust social media as a source 48% do not trust information written and edited by many people One in four concerned about authenticity of online information
  • 10. Beliefs about Online Privacy • Organizations, companies ask for too much personal information online (67%) • People who go online put their privacy at risk (61%) • There is personal information about me that is collected on the Internet for reasons I do not know (58%) • People I do not know have access to my online personal information (57%) • The government monitors what people do on the Internet (50%)
  • 11. Beliefs about Security Online • I have control over the information I disclose about myself online (62%) • The personal information I put online is kept safe (45%) • I feel safe providing some personal information such as my name, birth date, or phone number on the Internet (41%) N = 10,208.
  • 12. Concerns about Online Security • Someone breaking into your Internet account or e-mail (72%) • Information you provided for one purpose is being used for another purpose online (67%)
  • 13. Practices to Protect Privacy-Security • Scan your computer for mobile devices for viruses or spyware (65%) • Check your privacy and security settings online (54%) • Read privacy policies before using a Web site or service (41%)
  • 14. Trust to Protect your Personal Data Percent Trusting Banks, financial inst. Prov. Health, medical Gov't authorities ISPs Mobile phone comp. Percent Trusting Telephone Comp. Search engines Shops, dept stores SNS providers Online marketers, ad 0 10 20 30 40 50 60 70
  • 15. Trends Over Time: Focus on the UK Stability Steady or Declining Bad Experiences Small but Increasing Problems • Level of concern over privacy • Comfort revealing personal details online • Viruses • Bank details • Obscene emails • Misrepresentation • Stolen credit card details
  • 16. Concerns and Actions to Address Bad Experiences, UK, 2013 90 80 70 60 50 Concerned 40 Did Something 30 20 10 0 Unpleasant experience Spam Viruses via email
  • 17.
  • 18. An Internet Trust Bubble? Norms Support Core Values • Freedom of Expression • Privacy, Security & Authenticity Global Concerns • Expressing Views Online • Privacy and Security • Governmental Monitoring & Surveillance • Authenticity of Information Research Foci • Patterns of Cross-national Differences • Differences among Users • Implications for the Vitality of the Internet