SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
ARE YOU NERVOUS ABOUT
SHARING ONLINE?
 THIS IS WHAT OTHERS SAY:                                                                             OF THE PEOPLE INTERVIEWED



                                      agree with the                                                  99%
    70%                               statement:                                                      have computers



                                                                                                      58%
                                      “I’m concerned about who
                                      else can access my
                                      content.”

                                                                                                      have smartphones
  YET, PEOPLE ARE SHARING
  MORE CONTENT THAN EVER.
                                                                                                      50%                    use social networks to share
                                                                                                                             pictures, videos and documents
                                                                                                                             with friends and family.




                                                                                                                             76%
 HOW ARE WE GOING ONLINE?


 95%
 use computers



 45%
                                                                                                                             are concerned about their
                                                                                                                             privacy on social media
 use smartphones



 18%
                                                                                                                             feel they are losing control of


                                                                                                      43%
                                                                                                                             their content on social media
 use tablets




80%                                        think content is more
                                           important than the
                                           device it is used on.

                                                                                                                     Looking for freedom to
                                                                                                       connect, create and discover online without worries?
                                                                                                            Check out F-Secure’s Content Anywhere.
                            vs                                                                              www.f-secure.com/content-anywhere




*The F-Secure broadband survey covered web interviews of 6,400 broadband subscribers aged 20–60
years from 14 countries: France, the UK, Germany, Sweden, Finland, Italy, Spain, the Netherlands,
Belgium, USA, Canada, Brazil, India and Japan. The survey was completed by GfK, 25 May–1 June 2012.

Mais conteúdo relacionado

Semelhante a Are you nervous about sharing online?

Listening and Responding to Your Customers and Prospects
Listening and Responding to Your Customers and ProspectsListening and Responding to Your Customers and Prospects
Listening and Responding to Your Customers and ProspectsLaSandra Brill
 
Life on Demand: Performics MENA
Life on Demand: Performics MENALife on Demand: Performics MENA
Life on Demand: Performics MENAPerformics
 
Infographic1 behaviors-life ondemand-performics2012
Infographic1 behaviors-life ondemand-performics2012Infographic1 behaviors-life ondemand-performics2012
Infographic1 behaviors-life ondemand-performics2012Performics
 
Social Media Week 2013 Presentation: Life on Demand
Social Media Week 2013 Presentation: Life on DemandSocial Media Week 2013 Presentation: Life on Demand
Social Media Week 2013 Presentation: Life on DemandPerformics
 
Social Media Week New York 2013 - Life on Demand
Social Media Week New York 2013 - Life on DemandSocial Media Week New York 2013 - Life on Demand
Social Media Week New York 2013 - Life on DemandPerformics
 
¿Por qué compartimos?
¿Por qué compartimos?¿Por qué compartimos?
¿Por qué compartimos?AriadnaMB
 
What Does an Influencer Really Look Like? How to Measure Online Influence tha...
What Does an Influencer Really Look Like? How to Measure Online Influence tha...What Does an Influencer Really Look Like? How to Measure Online Influence tha...
What Does an Influencer Really Look Like? How to Measure Online Influence tha...Social Media Today
 
Yahoo! Vertical Study On Connected Devices
Yahoo! Vertical Study On Connected DevicesYahoo! Vertical Study On Connected Devices
Yahoo! Vertical Study On Connected DevicesYahoo Deutschland
 
Value, Engagement and Trust in the Era of Social Entertainment and Second Scr...
Value, Engagement and Trust in the Era of Social Entertainment and Second Scr...Value, Engagement and Trust in the Era of Social Entertainment and Second Scr...
Value, Engagement and Trust in the Era of Social Entertainment and Second Scr...Edelman_UK
 
How Audiences Share and Discuss Entertainment Content
How Audiences Share and Discuss Entertainment ContentHow Audiences Share and Discuss Entertainment Content
How Audiences Share and Discuss Entertainment ContentEdelman
 
Using Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the ClassroomUsing Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the ClassroomJackie Gerstein, Ed.D
 
10 Facts About Why and How Consumers “Like” and Subscribe (Chadwick Martin Ba...
10 Facts About Why and How Consumers “Like” and Subscribe (Chadwick Martin Ba...10 Facts About Why and How Consumers “Like” and Subscribe (Chadwick Martin Ba...
10 Facts About Why and How Consumers “Like” and Subscribe (Chadwick Martin Ba...Retelur Marketing
 
Performics Life on Demand 2012 Infographic
Performics Life on Demand 2012 InfographicPerformics Life on Demand 2012 Infographic
Performics Life on Demand 2012 InfographicPerformics
 
Yahoo! Mexico's Mobile Modes Research
Yahoo! Mexico's Mobile Modes ResearchYahoo! Mexico's Mobile Modes Research
Yahoo! Mexico's Mobile Modes ResearchNick Drew
 

Semelhante a Are you nervous about sharing online? (20)

Listening and Responding to Your Customers and Prospects
Listening and Responding to Your Customers and ProspectsListening and Responding to Your Customers and Prospects
Listening and Responding to Your Customers and Prospects
 
Life on Demand: Performics MENA
Life on Demand: Performics MENALife on Demand: Performics MENA
Life on Demand: Performics MENA
 
Connected results
Connected resultsConnected results
Connected results
 
The Future of Internet Experiences
The Future of Internet ExperiencesThe Future of Internet Experiences
The Future of Internet Experiences
 
Infographic1 behaviors-life ondemand-performics2012
Infographic1 behaviors-life ondemand-performics2012Infographic1 behaviors-life ondemand-performics2012
Infographic1 behaviors-life ondemand-performics2012
 
Social Media Week 2013 Presentation: Life on Demand
Social Media Week 2013 Presentation: Life on DemandSocial Media Week 2013 Presentation: Life on Demand
Social Media Week 2013 Presentation: Life on Demand
 
Social Media Week New York 2013 - Life on Demand
Social Media Week New York 2013 - Life on DemandSocial Media Week New York 2013 - Life on Demand
Social Media Week New York 2013 - Life on Demand
 
Celebrate Your Content
Celebrate Your ContentCelebrate Your Content
Celebrate Your Content
 
¿Por qué compartimos?
¿Por qué compartimos?¿Por qué compartimos?
¿Por qué compartimos?
 
What Does an Influencer Really Look Like? How to Measure Online Influence tha...
What Does an Influencer Really Look Like? How to Measure Online Influence tha...What Does an Influencer Really Look Like? How to Measure Online Influence tha...
What Does an Influencer Really Look Like? How to Measure Online Influence tha...
 
Yahoo! Vertical Study On Connected Devices
Yahoo! Vertical Study On Connected DevicesYahoo! Vertical Study On Connected Devices
Yahoo! Vertical Study On Connected Devices
 
2012 dii-e book-1
2012 dii-e book-12012 dii-e book-1
2012 dii-e book-1
 
Value, Engagement and Trust in the Era of Social Entertainment and Second Scr...
Value, Engagement and Trust in the Era of Social Entertainment and Second Scr...Value, Engagement and Trust in the Era of Social Entertainment and Second Scr...
Value, Engagement and Trust in the Era of Social Entertainment and Second Scr...
 
How Audiences Share and Discuss Entertainment Content
How Audiences Share and Discuss Entertainment ContentHow Audiences Share and Discuss Entertainment Content
How Audiences Share and Discuss Entertainment Content
 
Using Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the ClassroomUsing Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the Classroom
 
Mobile is the Needle, Social is the Thread: How Information Today is Woven In...
Mobile is the Needle, Social is the Thread: How Information Today is Woven In...Mobile is the Needle, Social is the Thread: How Information Today is Woven In...
Mobile is the Needle, Social is the Thread: How Information Today is Woven In...
 
10 Facts About Why and How Consumers “Like” and Subscribe (Chadwick Martin Ba...
10 Facts About Why and How Consumers “Like” and Subscribe (Chadwick Martin Ba...10 Facts About Why and How Consumers “Like” and Subscribe (Chadwick Martin Ba...
10 Facts About Why and How Consumers “Like” and Subscribe (Chadwick Martin Ba...
 
Lee Rainie
Lee Rainie Lee Rainie
Lee Rainie
 
Performics Life on Demand 2012 Infographic
Performics Life on Demand 2012 InfographicPerformics Life on Demand 2012 Infographic
Performics Life on Demand 2012 Infographic
 
Yahoo! Mexico's Mobile Modes Research
Yahoo! Mexico's Mobile Modes ResearchYahoo! Mexico's Mobile Modes Research
Yahoo! Mexico's Mobile Modes Research
 

Mais de F-Secure Corporation

How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?F-Secure Corporation
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!F-Secure Corporation
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsF-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace F-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceF-Secure Corporation
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3F-Secure Corporation
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2F-Secure Corporation
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeF-Secure Corporation
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Corporation
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsF-Secure Corporation
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big businessF-Secure Corporation
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業F-Secure Corporation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetF-Secure Corporation
 

Mais de F-Secure Corporation (20)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
Six things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutionsSix things to take into account when choosing cloud solutions
Six things to take into account when choosing cloud solutions
 
Small and midsize business security is big business
Small and midsize business security is big businessSmall and midsize business security is big business
Small and midsize business security is big business
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Are you nervous about sharing online?

  • 1. ARE YOU NERVOUS ABOUT SHARING ONLINE? THIS IS WHAT OTHERS SAY: OF THE PEOPLE INTERVIEWED agree with the 99% 70% statement: have computers 58% “I’m concerned about who else can access my content.” have smartphones YET, PEOPLE ARE SHARING MORE CONTENT THAN EVER. 50% use social networks to share pictures, videos and documents with friends and family. 76% HOW ARE WE GOING ONLINE? 95% use computers 45% are concerned about their privacy on social media use smartphones 18% feel they are losing control of 43% their content on social media use tablets 80% think content is more important than the device it is used on. Looking for freedom to connect, create and discover online without worries? Check out F-Secure’s Content Anywhere. vs www.f-secure.com/content-anywhere *The F-Secure broadband survey covered web interviews of 6,400 broadband subscribers aged 20–60 years from 14 countries: France, the UK, Germany, Sweden, Finland, Italy, Spain, the Netherlands, Belgium, USA, Canada, Brazil, India and Japan. The survey was completed by GfK, 25 May–1 June 2012.