.

Friday, March 1, 2019

Smart Phone

Smartph single bail panorama of U. S. con summariseers Sponsored by AVG Techno poundies Independently conducted by Ponemon add LLC Publication learn exhibit 2011 Ponemon land query history Smart predict Security Survey of U. S. Consumers Ponemon wreak, March 2011 Part 1. Introduction Ponemon fetch is pleased to presend the purposes of the Smartphone Security Survey A Study of U. S. Consumers sponsored by AVG Technologies. The goal of the research is to determine consumers perceptions nigh the effectiveness privacy and shelter assay of infections when victimisation their smartphones.In addition, we wanted to learn if participants in our study cargon closely these risks and if they take warrantor measure precautions. We keep an eye oned 734 consumers who atomic act 18 18 years and older and own a smartphone. The risks that we cover in our gaze cin one casern location tracking, infection of confidential relentment without the uptakers knowledge or con direct, diallerwargon (specialized malw ar unique to smartphones), spyw atomic number 18, vir offices from unsafe WiFi entanglements and others. What we learned is that virtually of the consumers in our study ar employ their smartphones without understanding that they atomic number 18 exposing their stark naked randomness to the risks c areened above.We as well believe the findings of this study signal a potential protection system risk for organizations beca enjoyment so many consumers succeeded white plague their smartphones for twain(prenominal) melodic phrase and person-to-personisedisedised commit. With moving in confidential makeive knowledge stored on these smartphones, organizations should make accredited employees and contractors take appropriate precautions to secure such sensitive information. We also advocate that certificate policies state these precautions and ensure they are enforced. hobby are the well-nigh salient research highlights ?Eighty- four part call the same smartphone for twain business and private purposes. The cross over of business and ad hominem workout means much more(prenominal) sensitive and confidential information is at risk and suggests that the smartphone is with them most of the time. 66 pct admit they keep a moderate or signifi senst nub of face-to-face information on their smartphones. Such in-person selective information include email address, name, contact lists, photos, videos, anniversary and personal dates, melody, Sixty-seven share of consumers dealed assign they are come to rough receiving marketing ads and promotions.However, less than half (44 portion) are touch on somewhat having a computer virus flak on their smartphone when it is connected to an insecure earnings ne devilrk. In addition to using it as a phone, 89 portion part their smartphone for personal email and 82 percent persona it for business email. A smaller section of consumers apply their smart phones for monetary transactions including salarys. In fact, 38 percent of consumers wasting disease the smartphone to make payments and 14 percent use it for banking. Sixty- hexad percent of consumers prepare stipendiary at least once for an stage using their smartphone.In addition, 12 percent of consumers say they spend a penny see a fraud attempt vis-a-vis a erratic payment scheme. contempt this fact, lonesome(prenominal) hexad percent say they con their spry board or statement e actually month and eight percent brand the statement when the level is higher than chronic. lviii percent of consumers say that establish on how they utilise the smartphone for purchases, earnings search and location they were targeted by marketers. Accordingly, 67 percent say they are genuinely touch on or touch on close aggressive or abusive marketing practices. ? ? ? ? ? Ponemon instal investigate cover up paginate 1 ?Despite bail risks, less than half of consumers use blusherpad locks or passwords to secure their smartphones. In addition, and 29 percent of consumers said they have considered installing an anti-virus harvest to protect their smartphone. rallyinal percent of consumers who use favorable networking apps say they entrust smartphone versions of long-familiar social networking applications such as Facebook to access the same key chains, passwords and log-ins that they use of their backcloths, laptops or tablet. Only 10 percent of consumers say they stoop off Bluetooth ascertainable status on their smartphone when non in use. ? ?Ponemon bring in query history summon 2 Part 2. Key Findings In this report we have organized the findings from the study accept to the pursual topics Consumers use of smartphones, consumers cognizantness rough the security risks that ac political party their use of smartphones, scenarios that illustrate potential smartphone security risks and how consumers are or are non managing these risks . Consumers use of smartphones Most consumers use their smartphone for both business and personal use. Forty percent use their smartphone for business and personal use equally and 25 percent use it for personal besides some business use ( demote chart 1).Only 6 percent of consumers discerned use their smartphone exclusively for business. proscribe chart 1. What best describes your smartphone use? Both business and personal use equally 40% in general personal hardly some business use 25% Personal use wholly 16% Mostly business but some personal use 13% calling use only 0% 5% 6% 10% 15% 20% 25% 30% 35% 40% 45% Despite using the Smartphone for personal use, 34 percent say their employer purchased the smartphone and pays all monthly charges. As shown in turf out graph 2, 35 percent say they purchased it without any reimbursement. stymy chart 2 Who purchased your smartphone and who pays the monthly aid fee? I purchased it without any reimbursement from my employer My employer purchased it and pays monthly charges I purchased it and my employer supportd some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges 0% 5% 13% 35% 34% 10% 8% 10% 15% 20% 25% 30% 35% 40% Ponemon set up seek Report Page 3 Smartphones tidy sum perform a wide run of tasks. However, the most pop use next to the phone is business and personal emailing.The most popular smartphone uses are embarrassing both personal and business email, using it as an address book, texting, Internet browsing, storing or moving data, obtaining and viewing documents, as a calendar and listening to melody ( beat map 3). Least popular are banking, travel assistance and video conferencing. (For a fatten up list of tasks, please see Q. 24 in the Appendix to this paper. ) We suggest this finding whitethorn indicate why many in our study are not pertain most the security risks. Because consumers believe its primary use is as a phone or t o email they whitethorn phone (incorrectly) that there are negligible security or privacy risks.Bar chart 3 Tasks that consumers do on their smartphone Phone Personal email line of merchandise email Address book Texting Store or move data Internet browsing Obtain documents Calendar View documents Listen to music Schedule tasks Shop Camera Social networking 0% 20% one hundred% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 40% 60% 80% vitamin C% 120% As report in Bar map 4, 66 percent have paid for an item via their smartphone once, irregularly (once any two months) or regularly (whitethornbe once a month). Fifty-one percent were surprised that they were charged for a do of harvest-festival they signed up for.Bar chart 4 Key questions about smartphone use for each one bar defines the percentage yes chemical reaction Did you ever pay for an item via the mobile phone? Did you e actually sign-up for a dish out or product on a mobile without realizing that there wou ld be a cost? sop up you ever signed a toll and conditions communicate on your mobile phone? 66% 51% 46% Have you ever been the victim of mobile payments fraud? 0% 10% 12% 20% 30% 40% 50% 60% 70% Ponemon bring enquiry Report Page 4 Consumers store confidential information on their smartphones. Sixty-six percent (40+26) of consumers store a moderate or a signifi crappert amount of personal data.Bar map 5 shows that only 11 percent say they do not store personal data on their smartphone. Bar chart 5 How much personal data do you store on your smartphone? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% A moderate amount of A signifi apprizet amount of personal data personal data A small amount of personal data None 11% 26% 23% 40% As shown in Bar Chart 6, data most often stored on smartphones include email addresses, names, contact lists, photos, anniversary and other personal dates and location. Consumers are less likely to store planned future purchases, purchase history, wellness data a nd security test questions (see Q. 3 in the Appendix for the complete list). Bar Chart 6 What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary & personal dates posture music Home address Confidential business documents Date of wear gender Credit or debit taunt numbers Videos Passwords 0% 20% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 40% 60% 80% light speed% 120% Ponemon Institute Research Report Page 5 Many consumers surveyed have used email and text to sign up for run or products without realizing they would be charged.As noted previously in Bar Chart 4, 51 percent do what they thought was a free service and later piece out they were charged for it. Bar Chart 7 shows most of these purchases were made by consumers using email (46 percent), text message (34 percent) and website (31 percent). Bar Chart 7 The methods used to sign-up for services or products on your smartphone 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Email Text message Website Other 12% 34% 31% 46% Despite these unexpected charges, Bar Chart 8 shows consumers surveyed rarely check their bills for unusual or unidentified payments.Only six percent check their bills e precise month and eight percent check their bills only if it is higher than usual. Fifty-two percent never check their smartphone bills. Bar Chart 8 Do you check your mobile bill or statement for unidentified charges? 60% 52% 50% 40% 30% 20% 10% 0% Never Yes, occasionally Yes, but only if the bill is higher than usual Yes, I check it e truly month 8% 6% 34% As previously noted in Bar Chart 4, the volume of consumers (78 percent) say they have not experienced any mobile payments fraud. Twelve percent say they have experienced such fraud and 10 percent are not certain. Ponemon Institute Research ReportPage 6 Consumers informedness about the security risks that accompany their use of smartphones Marketing messagesnot privacy and security risks like consumers. While the majority of consumers do not discover their private information is at risk or that their smartphone will be hacked (56 percent and 58 percent, respectively), they do worry about receiving unclaimed marketing messages. A shown in Bar Chart 9, consumers also worry about being tracked when using their smartphone (64 percent). Bar Chart 9 Attributions about privacy and security risks The agree response is a combination of strongly agree and agree.The disagree response is the sum of incertain, disagree and strongly disagree. I worry more about the security of my desktop or laptop computer than my smartphone. When downloading software system to my smartphone I do not always check to see if the app is from a trustworthy source. I do not worry that a hacker will attempt my smartphone. I do not feel my private information or privacy is at risk when I use my smartphone. I do not worry about losing my smartphone go traveling. I do not worry about being tracked when using my smartpho ne. I do not worry about receiving marketing messages on my smartphone. 5% 35% 62% 38% 58% 42% 56% 44% 50% 50% 36% 64% 33% 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% coke% consent Disagree They also worry more about the security of their desktop and laptop computers than the security of their smartphone. Because of these perceptions about the security of the smartphone, they are not likely to check to see if an application comes from a trustworthy source before downloading it. Scenarios concerning smartphone risks In the survey, we asked consumers to respond to eleven scenarios illustrating a range of security issues and risks.Specifically, they were asked if they are certified that what is described in the scenario could obtain to them, if they are aware that they experienced what was described in the scenario and what was their level of concern. Following are the 11 scenarios 1. kettle of fish data embedded onto image files can aftermath in the tracking of the smartphone user. 2. Smartphone apps can transmit confidential payment information (i. e. credit card lucubrate) without the users knowledge or consent. Ponemon Institute Research Report Page 7 3.Smartphones can be give by specialized malware called diallerware that modifys criminals to make use of premium services or numbers resulting in unexpected monthly charges. 4. Smartphone apps may book spyware that allows criminals to access the private information matched on a smartphone. 5. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. 6. If a social network app is downloaded on a smartphone, weakness to log off powerful could allow an imposter to post vixenish details or change personal settings without the users knowledge. . A smartphone can be disposed of or transferred to another user without flop removing sensitive data, allowing an intruder to access private data on the stratagem. 8. In many case s, people use their smartphone for both business and personal usage, indeed set confidential business information at risk (a. k. a. cross-over risk). 9. A smartphone can connect to the Internet through a local wireless local area network network that is insecure. This may result in a virus attack to the smartphone. 10.Smartphones dispel basic security protections that can be disenable by jailbreaking, thus making the smartphone more dangerous to spyware or malware attacks. 11. Smartphone users can be targeted by marketers ground on how the phone is used for purchases, Internet browsing and location. As a result, the user may receive outcast marketing ads and promotions their smartphone. Bar Chart 10 summarizes the consumers level of awareness about the above-mentioned smartphone security risks. Consumers are most aware of receiving unwanted marketing messages based on their smartphone usage (60 percent).They also understand that they may be putting business confidential infor mation at risk when using the smartphone for both personal and business use (55 percent), and that they are vulnerable to a virus when connecting to the Internet through a local wireless local area network network is insecure (35 percent). Bar Chart 10 Are you aware of the followers smartphone security risks? Each bar defines the percentage yes response Marketing abuse Cross-over unstable WIFI outlawed organization Location tracking Jailbreaking Spyware Social network snafu Auto contagious disease Diallerware specialised malware 0% 11% 11% 10% 9% 10% 20% 30% 40% 50% 15% 15% 21% 35% 31% 55% 0% 60% 70% Ponemon Institute Research Report Page 8 Bar Chart 11 reports consumers actual experience with these security issues. Fifty-eight percent of consumers say they indeed have received unwanted marketing messages. In addition, 52 percent say they have experienced cross-over risk wherein the security of business information was jeopardized because of the personal use of the smartphone. Bar Chart 11 Have any of these situations run intoed to you? Each bar defines the combined very relate and concern responseMarketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Spyware Jailbreaking Social network snafu Diallerware Auto transmission Specialized malware 0% 5% 10% 20% 30% 40% 50% 8% 8% 6% 11% 10% 16% 13% 23% 52% 58% 60% 70% Bar Chart 12 summarizes consumers level of concern about eleven smartphone security risks. Accordingly, a large percentage of these consumers say they are very bear on or implicated about each scenario happening to them, especially diallerware (68 percent), unwanted marketing (67 percent), and the auto transmission of personal data from the phone (66 percent).Bar Chart 12 Are you concerned about of the pastime smartphone security risks? Each bar defines the combined very concerned and concerned response Diallerware outcaste marketing Auto transmission Jailbreaking Spyware Location tracking Specialized malware Improper disposal Social networking snafu Insecure WIFI Cross-over 0% 10% 20% 30% 42% 40% 40% 50% 60% 51% 50% 60% 68% 67% 66% 65% 65% 65% 70% 80% Consumers are concerned about being tracked while using their smartphones or having their security protections disabled through jailbreaking but generally are not aware of this risk.In Ponemon Institute Research Report Page 9 contrast, only 40 percent of consumers are very concerned or concerned about cross-over and 42 percent about an insecure smartphone-to-WIFI connection. While there is some awareness that a smartphone that is disposed of or transferred to another user without removing sensitive data could allow someone to access private data on the device, about half of consumers are not very concerned about this occurring.In summary, consumers surveyed are least aware that the following can happen on their smartphone the transmission of confidential payment information without their knowledge or consent, downloading a financial app for their s martphone that has specialized malware designed to steal credit card numbers and online banking credentials, diallerware infections that enable criminals to make use of premium services or numbers resulting in unexpected charges and spyware that allows criminals to access the private information contained on a smartphone.Those who are aware of these risks are generally very concerned about how these risks may affect their smartphone. Line Graph 1 Summary of consumer responses to eleven smartphone security risks 80% 70% 60% 50% 40% 30% 20% 10% 0% Location tracking Auto Diallerware transmission Spyware Specialized malware Social network snafu Improper disposal Cross-over Insecure WIFI Jailbreaking Marketing abuse Are you aware? Has this happened to you? Level of concern Ponemon Institute Research Report Page 10 Part 3.How consumers are managing security risks associated with smartphones Despite the confidential information on their smartphones, consumers are not pickings appropriate s ecurity precautions. As showing in Bar Chart 13, less than half (43 percent) of consumers surveyed consider security features to be important when decision making which smartphone to purchase. It is not surprising, therefore, that they are not taking security precautions. Bar Chart 13 How important is security as a feature on your smartphone? 60% 50% 43% 40% 30% 20% 10% 0% Important Not important 57%Bar Chart 14 shows 51 percent of consumers surveyed have uncomplete keypad locks nor passwords on their smartphone. Nineteen percent have passwords and 10 percent have both keypad locks and passwords. However, when we analyzed the responses of the more experienced users the percentage dropped to 31 percent who do not use keypad locks or passwords on their smartphone. Bar Chart 14 Do you have keypad locks or passwords on your smartphone? 60% 51% 50% 40% 30% 20% 10% 0% No, neither Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords 20% 19% 10% Ponemon Institute Research Report Page 11Forty-two percent of consumers allow smartphone versions of well-known social networking applications such as Facebook to access their key chains, passwords and log-ins that are used on their desktop computer or tablet (see Bar Chart 15). Twenty-nine percent of consumers say they have considered installing an anti-virus product and 10 percent turn off Bluetooth discoverable status on their device when they are not using it. Only 10 percent set up download controls on their smartphone to protect against apps and games that may contain malware. Bar Chart 15 Security habits of smartphone users Each bar defines the percentage yes responseDo you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet (only for those who use social networks)? Have you considered installing an anti-virus product on your smartphone? 29% 42% Do you turn off Bluetooth discoverable status on your device when you are not using it? 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Ponemon Institute Research Report Page 12 Part 4. Methods put back 1 summarizes the assay response for this study of US consumers who own or use smartphones.Our sample frame consisted of nearly 30,000 adult-aged consumers located in the combine States. These individuals were screened to ensure they use a smartphone for both personal and business purposes. A innate of 793 responded to our web-based survey. Fifty-nine surveys failed reliability tests, resulting in a final sample of 734 consumers (2. 5 percent response rate). Table 1 Sample response Sample frame Invitations sent pith returns Rejections Final sample oftenness 29,921 27,498 793 59 734 part% speed of light. 0% 91. 9% 2. 7% 0. 2% 2. 5% Table 2a provides the types of smartphones used by consumers.Table 2b lists the operating systems contained on these smartphones. As can be seen, the top rated smartphones are App les iPhone, sass berry and Google Nexus One. Accordingly, the top rated operating systems are iPhoneOS, RIM and Windows mobile. Table 2a. eccentric of smartphone Apple iPhone RIM blackberry bush Google Nexus One Nokia N8 Motorola Droid X T-Mobile G2 elan HTC EVO 4G Palm Pre Plus Samsung Epic 4G Other arrive per centum% 27% 21% 12% 9% 9% 6% 6% 5% 4% 0% vitamin C% Table 2b. Operating system iPhoneOS RIM Windows Mobile Android Symbian OS Linux Maemo Garnet OS Bada MeeGo Other or unsure do pct% 24% 19% 12% 9% 3% 3% 2% 2% 1% 1% 25% blow%Pie Chart 1 reports the age range of consumers in our study. Pie chart 2 shows the employment status of consumers. The largest segment of consumers are aged 36 to 45 (21 percent), and 52 percent are employed in a full phase of the moon or part-time position. Pie Chart 1 Age range 10% 2% 18% 18 to 25 26 to 35 36 to 45 46 to 55 19% 17% 56 to 65 66 to 75 75+ 21% 14% 10% 9% 52% 8% Pie Chart 2 Employment status 5%2% Employee Homemaker Retired Studen t sluggish Business owner active military 13% Ponemon Institute Research Report Page 13 Pie Chart 3 reports the household income of consumers.Pie Chart 4 shows the location of consumers according to their region in the united States. A total of 44 states are represented in our sample. The median household income of consumers is $81,000 per year. Pie Chart 3 class income Pie Chart 4 Regional location 1% 4% 10% 13% Below $20k 20 to $40k 41 to $60k 19% 19% neon Mid-Atlantic 14% 20% 61 to $80k 81 to $ one hundredk 101 to $150k 12% 18% Midwest Southeast southwesterly 15% 17% peaceable west 16% 22% 151 to $200k Over $200k In addition to web-based survey analysis, we conducted debriefing interviews with a random cross-section of consumers.In total 128 individuals were contacted, resulting in 66 one-to-one interviews to discuss certain questions and probe for additional insights from the consumers when appropriate. A total of 53 percent of consumers are female, 47 percent male. Forty percent of consumers say they use their smartphone for both business and personal reasons. Only six percent say they use their smartphone solely for business (see Bar Chart 1). Ponemon Institute Research Report Page 14 Part 5. windup The key finding from this research is that consumers in our survey are unconscious(predicate) of the security risks associated with their smartphones.This could be attributed, in part, to the lack of information being make about smartphone security risks. We also conclude that there may be a perception that because the most popular uses are phoning and emailing they are not putting the data on their smartphones at risk. In contrast, the security of desktop and laptop computers receives much more attention. It is not surprising, therefore, that consumers surveyed are more broken about protecting their computers from security risks. This is despite the fact these devices can contain just as much sensitive data that if lost or stolen could result in fi nancial harm.Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most Web-based surveys. ? Non-response bias The circulating(prenominal) findings are based on a sample of survey returns. We sent surveys to a representative sample of adult-aged consumers in the United States, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that auditors who did not participate are substantially different in terms of vestigial beliefs from those who completed the survey.Sampling-frame bias The accuracy is based on contact information and the degree to which the list is representative of individuals who are information system auditors. We also acknowledge that responses from paper, interviews or telephone might result in a different pattern of findings. Self-reported results The property of sur vey research is based on the integrity of confidential responses received from consumers. While certain checks and balances were incorporated into our survey evaluation process, there is always the possibility that certain consumers did not provide responses that reflect their true opinions. B ? ? Ponemon Institute Research Report Page 15 Appendix Detailed Survey receptions Following are the survey results for a final sample of 734 adult-aged consumers located in all regions of the United States. Fieldwork concluded in February 2011. Sample response Sample frame Invitations sent join returns Rejections Final sample Part 1. Background Q1a. enliven learn the smartphone that you presently use. If you use more than one smartphone, please withdraw the one you use most frequently.T-Mobile G2 Apple iPhone Motorola Droid X Samsung Epic 4G RIM Blackberry Sprint HTC EVO 4G Nokia N8 Google Nexus One Palm Pre Plus Other (please specify) measure Q1b. revel select the operating system your smartphone runs on. Symbian OS Android Linux Windows Mobile Bada MeeGo Maemo Garnet OS iPhoneOS RIM Other faint-hearted add up Q2. What best describes your smartphone use? Please select only one. Business use only Mostly business but some personal use Personal use only Mostly personal but some business use Both business and personal use equally add frequence 29,921 27,498 793 59 734 part% 100. 0% 91. 9% 2. 7% 0. % 2. 5% per centum% 6% 27% 9% 4% 21% 6% 9% 12% 5% 0% 100% pct% 3% 9% 3% 12% 1% 1% 2% 2% 24% 19% 0% 25% 100% portion% 6% 13% 16% 25% 40% 100% Ponemon Institute Research Report Page 16 Q3. Who purchased your smartphone and who pays the monthly service (usage) fee? Please select only one. I purchased it without any reimbursement from my employer I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges My employer purchased it and pays monthly charges get Q4. Please select all the tasks that you do on your smartphone?Phone Personal email Business email Address book Texting Internet browsing Store or move data Obtain documents View documents Calendar Listen to music Schedule tasks Shop Camera Social networking Payments Games Maps and navigation Upload videos Location services Watch TV/films Banking Travel assistance Video conferencing monitor health Q5. Have you ever paid for any item via your mobile phone? Yes, only once Yes, irregularly (maybe once every two months) Yes, regularly (maybe once a month) Never sum Q6a. Have you every signed up for a service or product on your mobile without realizing that there would be a cost?Yes No innate Q6b. If yes, please select the all the methods you used to sign up for the service or product. Text message Email Website Other sum total part% 35% 13% 10% 8% 34% 100% part% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 38% 34% 24% 24% 23% 21% 14% 10% 9% 5% Pct% 11% 32% 23% 34% 100% Pct% 5 1% 49% 100% Pct% 34% 46% 31% 12% 123% Ponemon Institute Research Report Page 17 Q7. Do you check your mobile bill or statement for unusual or unidentified payments? Yes, I check it every month Yes, but only if the bill is higher than usual Yes, occasionally Never Total Q8.Have you ever signed a terms and conditions request on your mobile phone? Yes No timid Total Q9. Have you ever been the victim of mobile payments fraud? Yes No Unsure Total Part 2. Attributions Q10. Please rate each one of the following statements using the master provided below each item. strongly agree and agree shown. Q10a. I do not feel my private information or privacy is at risk when I use my smartphone. Q10b. I do not worry that a hacker will attack my smartphone. Q10c. I do not worry about receiving marketing messages on my smartphone. Q10d. I do not worry about being tracked when using my smartphone.Q10e. I do not worry about losing my smartphone while traveling. Q10f. I worry more about the security of my desktop or laptop computer than my smartphone. Q10g. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. Part 3. Scenarios Pct% 6% 8% 34% 52% 100% Pct% 46% 21% 33% 100% Pct% 12% 78% 10% 100% Strongly agree 18% 25% 10% 11% 18% 25% 21% Agree 38% 33% 23% 25% 32% 40% 41% Q11. Sometimes location data can be embedded onto image files such as digital photos contained on your smartphone so that other people can track where you are.Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 21% 45% 34% 100% Pct% 13% 28% 59% 100% Ponemon Institute Research Report Page 18 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your location could be tracked while using your smart phone? touch on and very concerned shown. reply Q12. Smartphone apps can transmit confidential payment information such as credit card detail s without the users knowledge or consent. Were you aware that this could happen?Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your credit card details could be transmitted with your knowledge or consent? concern and very concerned shown. rejoinder Q13. Smartphones can be infected by specialized malware called diallerware that enable criminals to make use of premium services or numbers resulting in unexpected monthly charges. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by diallerware? touch on and very concerned shown. Response Q14. Smartphone apps may contain spyware that allows criminals to access the private information contained on a s martphone. Were you aware that this could happen? Yes No Unsure Total genuinely concerned 29% have-to doe with 36% Pct% 11% 53% 36% 100% Pct% 6% 41% 53% 100% genuinely concerned 31% come to 35% Pct% 10% 58% 32% 100% Pct% 8% 65% 27% 100% Very concerned 36% Concerned 32%Pct% 15% 53% 32% 100% Ponemon Institute Research Report Page 19 If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by spyware? Concerned and very concerned shown. Response Q15. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone or downloaded apps cou ld be infected by this specific type of malware? Concerned and very concerned shown. Response Q16. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the users knowledge. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your failure to close the social networking app on your smartphone could allow unauthorized access and/or malicious posts your user method of accounting? Concerned and very concerned shown. Response Pct% 11% 56% 33% 100% Very concerned 33% Concerned 32% Pct% 9% 57% 34% 100% Pct% 5% 66% 29% 100% Very concerned 32% Concerned 28% Pct% 11% 56% 33% 100% Pct% 8% 55% 37% 100% Very concerned 26% Concerned 23% Ponemon Institute Research Report Page 20 Q17.A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 31% 36% 33% 100% Pct% 16% 54% 30% 100% On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that private information on the smartphone would not be removed properly before disposing of it or transferring it to another user? Concerned and very concerned shown. Response Q18.In many cases, people use their smartphone for both business and personal usage, thus putting confidential business information at risk. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your use of a smartphone for personal reasons could put the confid ential information of your business at risk? Concerned and very concerned shown. Response Q19. A smartphone can connect to the Internet through a local WIFI network that is insecure.This may result in a virus attack to the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 23% Concerned 28% Pct% 55% 28% 17% 100% Pct% 52% 36% 12% 100% Very concerned 19% Concerned 21% Pct% 35% 42% 23% 100% Pct% 23% 45% 32% 100% Ponemon Institute Research Report Page 21 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone when connected to an insecure Internet network may result in a virus attack?Concerned and very concerned shown. Response Q20. Smartphones contain basic security protection that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. Were you aware that this could happen? Yes No Un sure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphones security settings could be disabled remotely by a leash party without your knowledge or consent?Concerned and very concerned shown. Response Q21. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing, and location. As result, the user may receive unwanted marketing ads and promotions. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 22% Concerned 20% Pct% 15% 57% 28% 100% Pct% 10% 55% 35% 100% Very concerned 34% Concerned 31% Pct% 60% 17% 23% 100% Pct% 58% 15% 27% 100%On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could receive marketing ads and promotions? Concerned and very concerned shown. Response Part 4. Other Questions Q22. On average, how much personal data do you store on your smartphone? None (Go to Q24) Only a small amount of personal data A moderate amount of personal data A significant amount of personal data Unsure Very concerned 31% Concerned 36% Pct% 11% 23% 40% 26% 100% Ponemon Institute Research Report Page 22 Q23.What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary and other personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords PIN number Hobbies, sports and travel interests Ages and gender of children Names of children Alarm codes Planned future purchases buy history Health data Security test questions Q24. Do you use a one Gigabyte (or higher) storage device on your smartphone? Yes No Unsure Total Q25. What do you worry more about?Losing my pocket book/purse Losing my smartphone I worry about both equally Total Q26. What do you worry more about? Losing my laptop computer Losing my smartphone I worry about both equally I dont have a laptop computer Total Q27. Do you have keypad locks or passwords on your smartphone? Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords No, neither Total Pct% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 19% 15% 13% 13% 11% 8% 8% 5% 2% Pct% 19% 68% 13% 100% Pct% 50% 23% 27% 100% Pct% 38% 10% 19% 33% 100% Pct% 20% 19% 10% 51% 100%Ponemon Institute Research Report Page 23 Q28a. Do you synch your smartphone with any of the following devices? laptop Desktop Another smartphone An online backup storage solution None of the above Total Q28b. How regularly do you synch your smartphone with any of the devices listed in Q28a? Hourly perfunctory Weekly Monthly Irregularly Total Q29. Do you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you us e on your desktop computer or tablet?Yes No Unsure I dont use social networking apps Total Q30. Do you turn off Bluetooth discoverable status on your device when you are not using it? Yes No Unsure Total Q31. Have you considered installing an anti-virus product on your smartphone? Yes No Total Q32a. Do your children have a mobile/cell smartphone? Yes No I dont have children Total Q32b. If yes, do you use your childrens smartphone to keep track of them (from a security perspective)? Yes No Total Pct% 44% 38% 9% 8% 45% 144% Pct% 25% 29% 14% 8% 24% 100% Pct% 21% 25% 4% 50% 100%Adjusted 42% 50% 8% 0% 100% Pct% 10% 83% 7% 100% Experienced 30% 62% 8% 100% Pct% 29% 71% 100% Pct% 22% 33% 45% 100% Experienced 53% 47% 100% Pct% 41% 59% 100% Ponemon Institute Research Report Page 24 Q32c. If yes, do you set up parental controls on the smartphone to protect your children when they access the Internet? Yes No Total Q33. Do you set up download controls on your smartphone to protect against apps a nd games that may contain malware? Yes No Unsure Total Q34. When deciding which smartphone to purchase, how important are its security features?Very important and important shown. Response Part 5. Demographics D1. Please check your age range. 18 to 25 26 to 35 36 to 45 46 to 55 56 to 65 66 to 75 75+ Total D2. What is your present employment status? Full-time employee temporary employee Business owner Homemaker Retired Student Active military Unemployed Total D3. What range best defines your annual household income? Below $20k 20 to $40k 41 to $60k 61 to $80k 81 to $100k 101 to $150k 151 to $200k Over $200k Total Pct% 21% 79% 100% Pct% 10% 74% 16% 100% Very important 21% Important 22%Pct% 18% 19% 21% 17% 13% 10% 2% 100% Pct% 48% 6% 5% 13% 10% 9% 2% 8% 100% Pct% 13% 20% 22% 17% 14% 10% 4% 1% 100% Ponemon Institute Research Report Page 25 D4. What is your highest level of statement attained? High school Vocational University or college Post grade Doctorate Other Total D5. Please che ck gender feminine Male Total D6. Are you head of household? Yes No Total D7. US Region Northeast Mid-Atlantic Midwest Southeast Southwest Pacific Total D8. Please rate each one of the following statements using the following five-point scale.Strongly agree and agree sown. The Internet is central to my life style I often give advice to others about how best to use computers and software I need to ask for help if something goes wrong with my computer I always enterprise to spend as little time as possible online I am often confused when I try to use the Internet to do things I am really concerned about online threats Only people who do risky things on the Internet are at risk to online threats I dont feel the online threat is that significantPct% 21% 22% 45% 7% 1% 4% 100% Pct% 53% 47% 100% Pct% 48% 52% 100% Pct% 19% 18% 17% 15% 12% 19% 100% Strongly agree 25% 19% 22% 16% 23% 18% 15% 18% Agree 32% 21% 23% 24% 24% 35% 28% 34% Ponemon Institute Research Report Page 26 Please contact us at 231. 938. 9900 or send an email to emailprotected org. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to self-supporting research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on full of life issues affecting he management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO),we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute Research Report Page 27

No comments:

Post a Comment