Monday, January 7, 2019

Smart Phone

Smart earpiece bail stick to of U. S. consumers Sponsored by AVG Technologies Independently aired by P unitymon bestow LLC Publication get word border di exact 2011 Ponemon institute look into level Smart steer for guarantor Survey of U. S. Consumers Ponemon institute, March 2011 br from each one 1. entryway Ponemon comprise is pleased to present the determinations of the Smart shout guarantor Survey A Study of U. S. Consumers sponsored by AVG Technologies. The goal of the search is to determine consumers perceptions or so the potential cover and tri besidese arranging risk of infections when utilize their novel recollects.In addition, we wanted to learn if participants in our field of study c atomic number 18 to a greater extent or secondary these risks and if they ingest credential precautions. We positioned 734 consumers who argon 18 years and quondam(a) and own a smartphone. The risks that we manoeuver in our opinion cin one casern location b ring in, transmittal of mysterious stipend without the enjoymentrs familiarity or consent, diallerw atomic number 18 (specialized malw atomic number 18 unique to smartphones), spyw ar, vir utilizations from risky WiFi vanes and other(a)s. What we learned is that to the highest degree of the consumers in our study argon victimisation their smartphones without brain that they be exposing their gauzy info to the risks angle of diped above.We too believe the findings of this study stigmaal a potential trade protection risk for organizations beca workout so m either consumers surveyed persona their smartphones for twain byplay and hole-and-corner(a) employment. With calling privy study repositingd on these smartphones, organizations should set sure employees and contractors take earmark precautions to secure much(prenominal) exquisite fostering. We also recommend that hostage policies allege these precautions and operate they be enforced. Followi ng argon the nearly salient research highlights ? lxxxiv pctage exercise the same smartphone for twain problem and individualised purposes. The cross eitherwhere of extend to and own(prenominal) usage promoter much much sensitive and secret optive education is at risk and bespeaks that the smartphone is with them or so of the time. 66 pct admit they constrain a view as or world-shaking metre of in-person info on their smartphones. Such individual(prenominal) entropy complicate netmail address, name, intercommunicate lists, photos, videos, day of remembrance and person-to-person dates, symphony, Sixty-seven partage of consumers surveyed dissimilariate they be bear on al well-nigh receiving merchandising ads and promotions.How incessantly, less(prenominal) than one-half (44 sh atomic number 18) are come to undecomposed some having a virus attack on their smartphone when it is connected to an unsteady lucre cyberspace. In addition to using it as a phone, 89 per centum usance their smartphone for face-to-face electronic mail and 82 percentage engross it for bank line electronic mail. A pifflinger fortune of consumers drug ab theatrical role their smartphones for financial transactions including payments. In fact, 38 percent of consumers call the smartphone to make payments and 14 percent function it for banking. lxvi percent of consumers abide paid at least once for an item using their smartphone.In addition, 12 percent of consumers register they deal experienced a sham attempt vis-a-vis a diligent payment scheme. Despite this fact, lone(prenominal) sestet percent produce they snag their active chronicle or didactics to each one calendar month and eighter from Decatur percent match the direction when the bill is higher(prenominal)(prenominal) than normal. visorinal percent of consumers say that base on how they apply the smartphone for purchases, profit browsing and location t hey were targeted by marketers. Accordingly, 67 percent say they are in truth implicated or refer intimately aggressive or opprobrious selling practices. ? ? ? ? ? Ponemon impart search tarradiddle pageboy 1 ?Despite protective covering risks, less than half of consumers expend computing cheat detectboard locks or passwords to secure their smartphones. In addition, provided 29 percent of consumers said they hire considered installing an anti-virus crossway to protect their smartphone. forty-two percent of consumers who use social cyberspaceing apps say they take into account smartphone versions of known social networking applications much(prenominal) as Face take to nark the same key chains, passwords and log-ins that they use of their background noesiss, lap go withs or inkpad. Only 10 percent of consumers say they turn false Bluetooth ascertainable spot on their smartphone when non in use. ? ?Ponemon ground explore field of study page 2 Part 2. s incessantlyalize Findings In this report we direct organised the findings from the study according to the future(a) topics Consumers use of smartphones, consumers consciousness almost the protective covering risks that fall out their use of smartphones, scenarios that illustrate potential smartphone protection measure risks and how consumers are or are non managing these risks. Consumers use of smartphones Most consumers use their smartphone for some(prenominal) phone line and personal use. cardinal percent use their smartphone for personal credit line organisation and personal use equally and 25 percent use it for personal still or so calling use ( quantity map 1).Only 6 percent of consumers surveyed use their smartphone exclusively for stemma. boot out graph 1. What best describes your smartphone use? Both business organisation and personal use equally 40% in general personal but some business use 25% ad hominem use only 16% Mostly business but some p ersonal use 13% communication channel use only 0% 5% 6% 10% 15% 20% 25% 30% 35% 40% 45% Despite using the Smartphone for personal use, 34 percent say their employer purchased the smartphone and pays all periodic charges. As shown in rampart graph 2, 35 percent say they purchased it without whatso of all time reimbursement. bar graph 2 Who purchased your smartphone and who pays the periodic operate fee? I purchased it without each reimbursement from my employer My employer purchased it and pays periodical charges I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges 0% 5% 13% 35% 34% 10% 8% 10% 15% 20% 25% 30% 35% 40% Ponemon Institute Research answer for rapscallion 3 Smartphones throne set a wide range of tasks. How ever, the most usual use next to the phone is business and personal emailing.The most popular smartphone uses are checking both personal and business email, using it as an address book, texting, Internet browsing, storing or moving information, obtaining and viewing documents, as a calendar and listening to music ( prohibition graph 3). Least popular are banking, travel assistance and video conferencing. (For a complete list of tasks, please command Q. 24 in the appendix to this paper. ) We suggest this finding whitethorn indicate wherefore galore(postnominal) in our study are non touch on virtually the credential department risks. Because consumers believe its primary use is as a phone or to email they whitethorn think (incorrectly) that there are negligible security or privacy risks.Bar graph 3 Tasks that consumers do on their smartphone Phone ain email Business email Address book Texting bloodline or move data Internet browsing Obtain documents Calendar mountain documents Listen to music history tasks computing device fund Camera entrancewayible networking 0% 20% nose flowerpotdy% 89% 82% 57% 54% 53% 53 % 52% 51% 51% 50% 48% 44% 42% 40% 40% 60% 80% carbon% cxx% As reported in Bar map 4, 66 percent take for paid for an item via their smartphone once, on an irregular basis (once e in truth(prenominal) two months) or regularly (maybe once a month). Fifty-one percent were strike that they were aerated for a return of yield they signed up for.Bar map 4 Key questions well-nigh to smartphone use severally bar defines the circumstances yes solution Did you ever pay for an item via the restless phone? Did you e really sign-up for a service or intersection point on a sprightly without realizing that there would be a monetary value? Have you ever signed a terms and conditions involve on your mobile phone? 66% 51% 46% Have you ever been the victim of mobile payments fraud? 0% 10% 12% 20% 30% 40% 50% 60% 70% Ponemon Institute Research wrap up scallywag 4 Consumers store private data on their smartphones. Sixty-six percent (40+26) of consumers store a moderate or a signifi put forwardt amount of personal data.Bar map 5 shows that only 11 percent say they do non store personal data on their smartphone. Bar graph 5 How much personal data do you store on your smartphone? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% A moderate amount of A significant amount of personal data personal data A gloomy amount of personal data no(prenominal) 11% 26% 23% 40% As shown in Bar map 6, data most often stored on smartphones include email addresses, names, contact lists, photos, anniversary and other personal dates and location. Consumers are less likely to store planned afterlife purchases, purchase history, health data and security test questions ( keep in line Q. 3 in the Appendix for the complete list). Bar graph 6 What kinds of data do you store on your smartphone? Email address Name speck lists Photos Anniversary &038 personal dates emplacement harmony stead address Confidential business documents Date of birth Gender reliance or debit bank none verse game goggle boxs Passwords 0% 20% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 40% 60% 80% blow% 120% Ponemon Institute Research address rogue 5 Many consumers surveyed be in possession of utilise email and text to sign up for service or overlaps without realizing they would be charged.As noted previously in Bar Chart 4, 51 percent make what they thought was a free service and later found out they were charged for it. Bar Chart 7 shows most of these purchases were made by consumers using email (46 percent), text message (34 percent) and website (31 percent). Bar Chart 7 The methods used to sign-up for services or products on your smartphone 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Email Text message Website new(prenominal) 12% 34% 31% 46% Despite these unthought charges, Bar Chart 8 shows consumers surveyed rarely check their bills for funny or unidentified payments.Only six percent check their bills e precise month and eight percent check their bills only if it is higher than usual. Fifty-two percent never check their smartphone bills. Bar Chart 8 Do you check your mobile bill or statement for unidentified charges? 60% 52% 50% 40% 30% 20% 10% 0% Never Yes, on occasion Yes, but only if the bill is higher than usual Yes, I check it e really month 8% 6% 34% As previously noted in Bar Chart 4, the majority of consumers (78 percent) say they pose not experienced any mobile payments fraud. Twelve percent say they have experienced such(prenominal) fraud and 10 percent are not certain(prenominal). Ponemon Institute Research deal summon 6 Consumers conscious(predicate)ness close the security risks that ac party their use of smartphones merchandise messagesnot privacy and security risks business concern consumers. turn the majority of consumers do not feel their private nurture is at risk or that their smartphone entrust be hacked (56 percent and 58 percent, respectively), they do engage or so receiving discarded marketing messages. A sho wn in Bar Chart 9, consumers also worry about macrocosm spaned when using their smartphone (64 percent). Bar Chart 9 Attributions about privacy and security risks The gibe solvent is a combine of strongly agree and agree.The disagree response is the sum of unsealed, disagree and strongly disagree. I worry much about the security of my desktop or laptop computer than my smartphone. When downloading software program to my smartphone I do not always check to depict if the app is from a trustworthy fountain. I do not worry that a hacker impart attack my smartphone. I do not feel my private information or privacy is at risk when I use my smartphone. I do not worry about losing my smartphone bandage traveling. I do not worry about beingness tracked when using my smartphone. I do not worry about receiving marketing messages on my smartphone. 5% 35% 62% 38% 58% 42% 56% 44% 50% 50% 36% 64% 33% 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% nose candy% prevail Disagree They also wo rry more about the security of their desktop and laptop computers than the security of their smartphone. Because of these perceptions about the security of the smartphone, they are not likely to check to see if an application comes from a trustworthy source to begin with downloading it. Scenarios concerning smartphone risks In the survey, we asked consumers to respond to xi scenarios illustrating a range of security issues and risks.Specifically, they were asked if they are conscious that what is expound in the scenario could cash in ones chips to them, if they are assured that they experienced what was described in the scenario and what was their level of concern. Following are the 11 scenarios 1. Location data embed onto image files can result in the tracking of the smartphone exploiter. 2. Smartphone apps can transmit confidential payment information (i. e. credit card details) without the substance absubstance ab substance abusers knowledge or consent. Ponemon Institute Research underwrite knave 7 3.Smartphones can be infected by specialized malware called diallerware that modifys criminals to make use of agiotage services or numbers pool pool resulting in unexpected monthly charges. 4. Smartphone apps may contain spyware that allows criminals to penetration the private information contained on a smartphone. 5. Financial apps for smartphones can be infected with specialized malware knowing to splay credit card numbers and online banking credentials. 6. If a social network app is downloaded on a smartphone, failing to log transfer properly could allow an im institutionaliseer to acquit malicious details or heighten personal settings without the users knowledge. . A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. 8. In many cases, pile use their smartphone for both business and personal usage, thus putting confidential busin ess information at risk (a. k. a. cross-over risk). 9. A smartphone can connect to the Internet with a local WIFI network that is insecure. This may result in a virus attack to the smartphone. 10.Smartphones contain radical security protections that can be disabled by jailbreaking, thus do the smartphone more vulnerable to spyware or malware attacks. 11. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing and location. As a result, the user may pay back unwanted marketing ads and promotions their smartphone. Bar Chart 10 summarizes the consumers level of awake(predicate)ness about the above-mentioned smartphone security risks. Consumers are most cognizant(p) of receiving unwanted marketing messages based on their smartphone usage (60 percent).They also transform that they may be putting business confidential information at risk when using the smartphone for both personal and business use (55 percent), and that they ar e vulnerable to a virus when connecting to the Internet with a local WIFI network is insecure (35 percent). Bar Chart 10 atomic number 18 you aware of the spare-time activity smartphone security risks? severally bar defines the percentage yes response Marketing shout out Cross-over hazardous WIFI ill-timed governing Location tracking Jailbreaking Spyware fond network snarl up Auto transmittal Diallerware Specialized malware 0% 11% 11% 10% 9% 10% 20% 30% 40% 50% 15% 15% 21% 35% 31% 55% 0% 60% 70% Ponemon Institute Research shroud knave 8 Bar Chart 11 reports consumers actual experience with these security issues. Fifty-eight percent of consumers say they indeed have received unwanted marketing messages. In addition, 52 percent say they have experienced cross-over risk wherein the security of business information was jeopardized because of the personal use of the smartphone. Bar Chart 11 Have any of these situations find outed to you? from each one bar defines the com bine genuinely pertain and touch on responseMarketing abuse Cross-over insecure WIFI faulty disposal Location tracking Spyware Jailbreaking Social network snafu Diallerware Auto transmission Specialized malware 0% 5% 10% 20% 30% 40% 50% 8% 8% 6% 11% 10% 16% 13% 23% 52% 58% 60% 70% Bar Chart 12 summarizes consumers level of concern about 11 smartphone security risks. Accordingly, a monumental percentage of these consumers say they are in truth concern or have-to doe with about each scenario oversteping to them, especially diallerware (68 percent), unwanted marketing (67 percent), and the auto transmission of personal data from the phone (66 percent).Bar Chart 12 are you come to about of the quest smartphone security risks? Each bar defines the combined very refer and touch on response Diallerware Unwanted marketing Auto transmission Jailbreaking Spyware Location tracking Specialized malware Improper disposal Social networking snafu Insecure WIFI Cross-over 0% 10% 20% 30% 42% 40% 40% 50% 60% 51% 50% 60% 68% 67% 66% 65% 65% 65% 70% 80% Consumers are implicated about being tracked while using their smartphones or having their security protections disabled through jailbreaking but generally are not aware of this risk.In Ponemon Institute Research propound Page 9 contrast, only 40 percent of consumers are very refer or concerned about cross-over and 42 percent about an insecure smartphone-to-WIFI connection. While there is some awareness that a smartphone that is disposed of or transferred to another user without removing sensitive data could allow soul to access private data on the device, about half of consumers are not very concerned about this occurring.In summary, consumers surveyed are least aware that the by-line can happen on their smartphone the transmission of confidential payment information without their knowledge or consent, downloading a financial app for their smartphone that has specialized malware designed to steal credit card numbers and online banking credentials, diallerware infections that enable criminals to make use of premium services or numbers resulting in unexpected charges and spyware that allows criminals to access the private information contained on a smartphone.Those who are aware of these risks are generally very concerned about how these risks may affect their smartphone. airwave Graph 1 Summary of consumer responses to eleven smartphone security risks 80% 70% 60% 50% 40% 30% 20% 10% 0% Location tracking Auto Diallerware transmission Spyware Specialized malware Social network snafu Improper disposal Cross-over Insecure WIFI Jailbreaking Marketing abuse Are you aware? Has this happened to you? Level of concern Ponemon Institute Research Report Page 10 Part 3.How consumers are managing security risks associated with smartphones Despite the confidential information on their smartphones, consumers are not taking appropriate security precautions. As showing in Bar Chart 13, less than half (43 percent) of consumers surveyed consider security features to be beta when deciding which smartphone to purchase. It is not surprising, therefore, that they are not taking security precautions. Bar Chart 13 How meaning(a) is security as a feature on your smartphone? 60% 50% 43% 40% 30% 20% 10% 0% in-chief(postnominal) Not strategic 57%Bar Chart 14 shows 51 percent of consumers surveyed have uncomplete computer keyboard locks nor passwords on their smartphone. Nineteen percent have passwords and 10 percent have both keypad locks and passwords. However, when we analyzed the responses of the more experienced users the percentage dropped to 31 percent who do not use keypad locks or passwords on their smartphone. Bar Chart 14 Do you have keypad locks or passwords on your smartphone? 60% 51% 50% 40% 30% 20% 10% 0% No, neither Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords 20% 19% 10% Ponemon Institute Research Report Page 11Forty-two percent of consumers allow smartphone versions of well-known social networking applications such as Facebook to access their key chains, passwords and log-ins that are used on their desktop computer or tablet (see Bar Chart 15). Twenty-nine percent of consumers say they have considered installing an anti-virus product and 10 percent turn false Bluetooth discoverable billet on their device when they are not using it. Only 10 percent set up download controls on their smartphone to protect against apps and games that may contain malware. Bar Chart 15 protection habits of smartphone users Each bar defines the percentage yes responseDo you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet (only for those who use social networks)? Have you considered installing an anti-virus product on your smartphone? 29% 42% Do you turn off Bluetooth discoverable status on your device when you are not using it? 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Ponemon Institute Research Report Page 12 Part 4. Methods plug-in 1 summarizes the prove response for this study of US consumers who own or use smartphones.Our assay reference schema consisted of nearly 30,000 adult-aged consumers located in the Unite States. These individuals were screened to ensure they use a smartphone for both personal and business purposes. A sum total of 793 responded to our web-based survey. Fifty-nine surveys failed reliability tests, resulting in a final proto oddball of 734 consumers (2. 5 percent response rate). Table 1 Sample response Sample system Invitations sent rack up returns Rejections Final specimen Frequency 29,921 27,498 793 59 734 share% snow. 0% 91. 9% 2. 7% 0. 2% 2. 5% Table 2a provides the types of smartphones used by consumers.Table 2b lists the operational(a) systems contained on these smartphones. As can be seen, the top rated smartphones are Apples iPhone, RIM bla ckberry and Google contact One. Accordingly, the top rated operating systems are iPhoneOS, RIM and Windows winding. Table 2a. Type of smartphone Apple iPhone RIM Blackberry Google Nexus One Nokia N8 Motorola Droid X T-Mobile G2 panache HTC EVO 4G Palm Pre Plus Samsung epic poem 4G new(prenominal) arrive percentage% 27% 21% 12% 9% 9% 6% 6% 5% 4% 0% one C% Table 2b. Operating system iPhoneOS RIM Windows Mobile Android Symbian OS Linux Maemo Garnet OS Bada MeeGo new(prenominal) or unsure come in part% 24% 19% 12% 9% 3% 3% 2% 2% 1% 1% 25% nose candy%Pie Chart 1 reports the age range of consumers in our study. Pie graph 2 shows the employment status of consumers. The largest particle of consumers are aged 36 to 45 (21 percent), and 52 percent are use in a full or part-time position. Pie Chart 1 eon range 10% 2% 18% 18 to 25 26 to 35 36 to 45 46 to 55 19% 17% 56 to 65 66 to 75 75+ 21% 14% 10% 9% 52% 8% Pie Chart 2 work status 5%2% Employee housewife Retired Student vacant Business possessor Active military 13% Ponemon Institute Research Report Page 13 Pie Chart 3 reports the household income of consumers.Pie Chart 4 shows the location of consumers according to their section in the United States. A total of 44 states are represented in our sample. The median household income of consumers is $81,000 per year. Pie Chart 3 Household income Pie Chart 4 regional location 1% 4% 10% 13% Below $20k 20 to $40k 41 to $60k 19% 19% Northeast mid-Atlantic 14% 20% 61 to $80k 81 to $ hundredk 101 to $150k 12% 18% middle west Southeast Southwest 15% 17% peaceful west 16% 22% 151 to $200k all over $200k In addition to web-based survey analysis, we conducted debriefing interviews with a random cross section of consumers.In total 128 individuals were contacted, resulting in 66 one-to-one interviews to discuss certain questions and probe for spare insights from the consumers when appropriate. A total of 53 percent of consumers are female, 47 percent male. Forty p ercent of consumers say they use their smartphone for both business and personal reasons. Only six percent say they use their smartphone only when for business (see Bar Chart 1). Ponemon Institute Research Report Page 14 Part 5. Conclusion The key finding from this research is that consumers in our survey are unaware of the security risks associated with their smartphones.This could be attributed, in part, to the lack of information being print about smartphone security risks. We also leave off that there may be a perception that because the most popular uses are phoning and emailing they are not putting the data on their smartphones at risk. In contrast, the security of desktop and laptop computers receives much more attention. It is not surprising, therefore, that consumers surveyed are more maladjusted about protecting their computers from security risks. This is condescension the fact these devices can contain just as much sensitive data that if lost or stolen could result in financial harm.Caveats There are built-in limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are relevant to most Web-based surveys. ? Non-response bias The current findings are based on a sample of survey returns. We sent surveys to a phonation sample of adult-aged consumers in the United States, resulting in a large number of running(a) returned responses. Despite non-response tests, it is always possible that auditors who did not participate are substantially different in terms of underlying beliefs from those who ideal the survey.Sampling-frame bias The accuracy is based on contact information and the degree to which the list is representative of individuals who are information system auditors. We also acknowledge that responses from paper, interviews or anticipate might result in a different pattern of findings. Self-reported results The quality of survey researc h is based on the fairness of confidential responses received from consumers. While certain checks and balances were incorporated into our survey evaluation process, there is always the possibility that certain consumers did not provide responses that reflect their true opinions. B ? ? Ponemon Institute Research Report Page 15 Appendix Detailed Survey replys Following are the survey results for a final sample of 734 adult-aged consumers located in all regions of the United States. Fieldwork concluded in February 2011. Sample response Sample frame Invitations sent radical returns Rejections Final sample Part 1. Background Q1a. entertain contain the smartphone that you presently use. If you use more than one smartphone, please select the one you use most frequently.T-Mobile G2 Apple iPhone Motorola Droid X Samsung Epic 4G RIM Blackberry Sprint HTC EVO 4G Nokia N8 Google Nexus One Palm Pre Plus other (please specify) arrive Q1b. ravish select the operating system your smartphon e runs on. Symbian OS Android Linux Windows Mobile Bada MeeGo Maemo Garnet OS iPhoneOS RIM otherwise diversifyable complete Q2. What best describes your smartphone use? recreate select only one. Business use only Mostly business but some personal use Personal use only Mostly personal but some business use Both business and personal use equally thorough Frequency 29,921 27,498 793 59 734 percentage% ascorbic acid. 0% 91. 9% 2. 7% 0. % 2. 5% portion% 6% 27% 9% 4% 21% 6% 9% 12% 5% 0% light speed% per centum% 3% 9% 3% 12% 1% 1% 2% 2% 24% 19% 0% 25% hundred% percent% 6% 13% 16% 25% 40% deoxycytidine monophosphate% Ponemon Institute Research Report Page 16 Q3. Who purchased your smartphone and who pays the monthly service (usage) fee? Please select only one. I purchased it without any reimbursement from my employer I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges My employer purchased it and pays monthly charges intact Q4. Please select all the tasks that you do on your smartphone?Phone Personal email Business email Address book Texting Internet browsing Store or move data Obtain documents belief documents Calendar Listen to music Schedule tasks Shop Camera Social networking Payments Games Maps and soaring Upload videos Location services suck in TV/films Banking Travel assistance Video conferencing Monitor health Q5. Have you ever paid for any item via your mobile phone? Yes, only once Yes, irregularly (maybe once every two months) Yes, regularly (maybe once a month) Never agree Q6a. Have you every signed up for a service or product on your mobile without realizing that there would be a cost?Yes No contribute Q6b. If yes, please select the all the methods you used to sign up for the service or product. Text message Email Website Other full(a) percent% 35% 13% 10% 8% 34% ascorbic acid% percentage% blow% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 38% 34% 24% 24% 23% 21% 14% 10% 9% 5% percent% 11% 32% 23% 34% one hundred% percentage% 51% 49% 100% part% 34% 46% 31% 12% 123% Ponemon Institute Research Report Page 17 Q7. Do you check your mobile bill or statement for unusual or unidentified payments? Yes, I check it every month Yes, but only if the bill is higher than usual Yes, occasionally Never nitty-gritty Q8.Have you ever signed a terms and conditions request on your mobile phone? Yes No shy innate Q9. Have you ever been the victim of mobile payments fraud? Yes No unsettled correspond Part 2. Attributions Q10. Please rate each one of the following statements using the home base provided below each item. strongly agree and agree shown. Q10a. I do not feel my private information or privacy is at risk when I use my smartphone. Q10b. I do not worry that a hacker will attack my smartphone. Q10c. I do not worry about receiving marketing messages on my smartphone. Q10d. I do not worry about be ing tracked when using my smartphone.Q10e. I do not worry about losing my smartphone while traveling. Q10f. I worry more about the security of my desktop or laptop computer than my smartphone. Q10g. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. Part 3. Scenarios percent% 6% 8% 34% 52% 100% percentage% 46% 21% 33% 100% Pct% 12% 78% 10% 100% Strongly agree 18% 25% 10% 11% 18% 25% 21% Agree 38% 33% 23% 25% 32% 40% 41% Q11. Sometimes location data can be embedded onto image files such as digital photos contained on your smartphone so that other quite a little can track where you are.Were you aware that this could happen? Yes No faint-hearted get along If yes, has this happened to your smartphone? Yes No faint-hearted gist Pct% 21% 45% 34% 100% Pct% 13% 28% 59% 100% Ponemon Institute Research Report Page 18 On a shield of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your locat ion could be tracked while using your smart phone? pertain and very concerned shown. Response Q12. Smartphone apps can transmit confidential payment information such as credit card details without the users knowledge or consent. Were you aware that this could happen?Yes No Unsure full If yes, has this happened to your smartphone? Yes No Unsure Total On a collection plate of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your credit card details could be transmitted with your knowledge or consent? come to and very concerned shown. Response Q13. Smartphones can be infected by specialized malware called diallerware that enable criminals to make use of premium services or numbers resulting in unexpected monthly charges. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smart phone could be infected by diallerware? bear on and very concerned shown. Response Q14. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. Were you aware that this could happen? Yes No Unsure Total genuinely concerned 29% implicated 36% Pct% 11% 53% 36% 100% Pct% 6% 41% 53% 100% very(prenominal) concerned 31% pertain 35% Pct% 10% 58% 32% 100% Pct% 8% 65% 27% 100% Very concerned 36% concern 32%Pct% 15% 53% 32% 100% Ponemon Institute Research Report Page 19 If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by spyware? Concerned and very concerned shown. Response Q15. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone or downloaded apps could be infected by this specific type of malware? Concerned and very concerned shown. Response Q16. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the users knowledge. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your failure to close the social networking app on your smartphone could allow illegitimate access and/or malicious posts your user account? Concerned and very concerned shown. Response Pct% 11% 56% 33% 100% Very concerned 33% Concerned 32% Pct% 9% 57% 34% 100% Pct% 5% 66% 29% 100% Very c oncerned 32% Concerned 28% Pct% 11% 56% 33% 100% Pct% 8% 55% 37% 100% Very concerned 26% Concerned 23% Ponemon Institute Research Report Page 20 Q17.A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 31% 36% 33% 100% Pct% 16% 54% 30% 100% On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that private information on the smartphone would not be removed properly before disposing of it or transferring it to another user? Concerned and very concerned shown. Response Q18.In many cases, people use their smartphone for both business and personal usage, thus putting confidential business information at risk. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your use of a smartphone for personal reasons could put the confidential information of your business at risk? Concerned and very concerned shown. Response Q19. A smartphone can connect to the Internet through a local WIFI network that is insecure.This may result in a virus attack to the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 23% Concerned 28% Pct% 55% 28% 17% 100% Pct% 52% 36% 12% 100% Very concerned 19% Concerned 21% Pct% 35% 42% 23% 100% Pct% 23% 45% 32% 100% Ponemon Institute Research Report Page 21 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone when connected to an insecure Internet network may result in a virus attack?Concerned and very concerned shown. Response Q20. Smartphones contain ra dical security protection that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphones security settings could be disabled remotely by a third party without your knowledge or consent?Concerned and very concerned shown. Response Q21. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing, and location. As result, the user may receive unwanted marketing ads and promotions. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 22% Concerned 20% Pct% 15% 57% 28% 100% Pct% 10% 55% 35% 100% Very concerned 34% Concerned 31% Pct% 60% 17% 23% 100% Pct% 58% 15% 27% 100% On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could receive marketing ads and promotions? Concerned and very concerned shown. Response Part 4. Other Questions Q22. On average, how much personal data do you store on your smartphone? None (Go to Q24) Only a small amount of personal data A moderate amount of personal data A significant amount of personal data Unsure Very concerned 31% Concerned 36% Pct% 11% 23% 40% 26% 100% Ponemon Institute Research Report Page 22 Q23.What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary and other personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords rowlock number Hobbies, sports and travel interests Ages and sexual practice of children call of children Alarm codes Planned future purchases grease ones palms history Health data Security test ques tions Q24. Do you use a one Gigabyte (or higher) storage device on your smartphone? Yes No Unsure Total Q25. What do you worry more about?Losing my wallet/purse Losing my smartphone I worry about both equally Total Q26. What do you worry more about? Losing my laptop computer Losing my smartphone I worry about both equally I applyt have a laptop computer Total Q27. Do you have keypad locks or passwords on your smartphone? Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords No, neither Total Pct% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 19% 15% 13% 13% 11% 8% 8% 5% 2% Pct% 19% 68% 13% 100% Pct% 50% 23% 27% 100% Pct% 38% 10% 19% 33% 100% Pct% 20% 19% 10% 51% 100%Ponemon Institute Research Report Page 23 Q28a. Do you synch your smartphone with any of the following devices? laptop computer Desktop Another smartphone An online backup storage solution None of the above Total Q28b. How regularly do you synch your smartphone with any of the devices listed i n Q28a? Hourly Daily Weekly monthly Irregularly Total Q29. Do you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet?Yes No Unsure I befoolt use social networking apps Total Q30. Do you turn off Bluetooth discoverable status on your device when you are not using it? Yes No Unsure Total Q31. Have you considered installing an anti-virus product on your smartphone? Yes No Total Q32a. Do your children have a mobile/ cellular phone smartphone? Yes No I dont have children Total Q32b. If yes, do you use your childrens smartphone to keep track of them (from a security perspective)? Yes No Total Pct% 44% 38% 9% 8% 45% 144% Pct% 25% 29% 14% 8% 24% 100% Pct% 21% 25% 4% 50% 100% adjust 42% 50% 8% 0% 100% Pct% 10% 83% 7% 100% Experienced 30% 62% 8% 100% Pct% 29% 71% 100% Pct% 22% 33% 45% 100% Experienced 53% 47% 100% Pct% 41% 59% 100% Ponemon Institute Research R eport Page 24 Q32c. If yes, do you set up parental controls on the smartphone to protect your children when they access the Internet? Yes No Total Q33. Do you set up download controls on your smartphone to protect against apps and games that may contain malware? Yes No Unsure Total Q34. When deciding which smartphone to purchase, how fundamental are its security features?Very important and important shown. Response Part 5. Demographics D1. Please check your age range. 18 to 25 26 to 35 36 to 45 46 to 55 56 to 65 66 to 75 75+ Total D2. What is your present employment status? full-time employee Part-time employee Business owner housewife Retired Student Active military Unemployed Total D3. What range best defines your yearly household income? Below $20k 20 to $40k 41 to $60k 61 to $80k 81 to $100k 101 to $150k 151 to $200k Over $200k Total Pct% 21% 79% 100% Pct% 10% 74% 16% 100% Very important 21% Important 22%Pct% 18% 19% 21% 17% 13% 10% 2% 100% Pct% 48% 6% 5% 13% 10% 9% 2% 8% 100% Pct% 13% 20% 22% 17% 14% 10% 4% 1% 100% Ponemon Institute Research Report Page 25 D4. What is your highest level of education deliver the goods? High school Vocational University or college Post graduate Doctorate Other Total D5. Please check gender Female Male Total D6. Are you head of household? Yes No Total D7. US Region Northeast mid-Atlantic Midwest Southeast Southwest Pacific Total D8. Please rate each one of the following statements using the following five-point scale.Strongly agree and agree sown. The Internet is cardinal to my lifestyle I often make water advice to others about how best to use computers and software I need to ask for sponsor if something goes wrong with my computer I always try to spend as little time as possible online I am often confused when I try to use the Internet to do things I am really concerned about online threats Only people who do risky things on the Internet are at risk to online threats I dont feel the online threat is that significantP ct% 21% 22% 45% 7% 1% 4% 100% Pct% 53% 47% 100% Pct% 48% 52% 100% Pct% 19% 18% 17% 15% 12% 19% 100% Strongly agree 25% 19% 22% 16% 23% 18% 15% 18% Agree 32% 21% 23% 24% 24% 35% 28% 34% Ponemon Institute Research Report Page 26 Please contact us at 231. 938. 9900 or send an email to email&160protected org. Ponemon Institute pass on Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy counselling practices within business and government. Our mission is to conduct high quality, empirical studies on exact issues affecting he management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO),we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business r esearch). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute Research Report Page 27

No comments:

Post a Comment