SlideShare ist ein Scribd-Unternehmen logo
1 von 10
WHERE DO PHONES
GET LOST?
Mobile Lost and Found Around the World
By Lookout, Inc
Lookout estimated that lost and
stolen phones cost U.S.
consumers $30 billion in 2012
Source: 2012 Mobile Lost and Found Report, Lookout, Inc. Lookout.com
It’s not a matter of whether you’ll
misplace your phone. It’s a matter of
when and where…
Which depends on where you live.
Lookout.com
What Are the Odds?
In the U.S., people lose a smartphone about
once a year.
Phones are more often lost at night. Two-thirds
of phone loss happens between the hours of 9
p.m. and 2 a.m. local time. One of the top
places to lose your phone at is a bar. (Hmmm,
we wonder how that happens…)
Lookout.com
Most Common Places to Lose Your
Phone in the U.S.
Coffee shops
Offices
Bars
Restaurants
Gas stations or garages
Lookout.com
Most Popular Places to Lose Your
Phone, East vs. West
• Historic site
• Restaurant
• Convenience store
• Park
• Ramen or noodle house
• Hotel
• Men’s store
• Office
• Electronics store
• Train Station
• Fast food restaurant
• Gas station or garage
• Grocery or supermarket
• Coffee Shop
• Video Store
• American restaurant
• Department store
• Automotive shop
• Pizza Place
• Deli or bodega
Tokyo Seattle
Lookout.com
It’s the Most Wonderful Time of the Year
(to Lose Your Phone)
More phones are lost during festivals and
celebrations. During Christmas, more than $11
million dollars worth of phones were lost.
During the week of Carnival (aka Mardi Gras),
more phones were lost around the world than
during your average parade-less, bead-less
week. Party-goers in Cologne lost 30% more
phones and in Paris, 72% more phones were
lost.
Lookout.com
Top U.S. Cities for Phone Loss
• Philadelphia
• Seattle
• Oakland
• Long Beach
• Newark
• Detroit
• Cleveland
• Baltimore
• New York
• Boston
Many of these cities are also in the
highest ranks of the FBI’s crime stats.
— @lookout
Make sure you can find
your phone if you lose it.
Download Lookout
Mobile Security.
Lookout.com
Keep in touch with Lookout
@lookout
/mylookout
blog.lookout.com
contact@lookout.com
WANT TO KNOW MORE
ABOUT LOST PHONES?
EVERYTHING IS OK

Weitere ähnliche Inhalte

Andere mochten auch

Lost & Found Ppt
Lost & Found PptLost & Found Ppt
Lost & Found Pptceon
 
Lost And Found
Lost And FoundLost And Found
Lost And FoundNancy Poh
 
Hk training-21- lost & found
Hk  training-21- lost & foundHk  training-21- lost & found
Hk training-21- lost & foundHari Nair
 
Office Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conductOffice Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conductMonica Dhoundiyal
 
Appearance & grooming
Appearance & groomingAppearance & grooming
Appearance & groomingAman Sarao
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquetteRachel Weber
 
GROOMING PRESENTATION
GROOMING PRESENTATIONGROOMING PRESENTATION
GROOMING PRESENTATIONabhisekmehta
 
Office Etiquette PowerPoint Presentation
Office Etiquette PowerPoint PresentationOffice Etiquette PowerPoint Presentation
Office Etiquette PowerPoint PresentationAndrew Schwartz
 
Grooming Presentation
Grooming PresentationGrooming Presentation
Grooming PresentationNikhil Mathur
 
Effective Customer Communication Skills
Effective Customer Communication SkillsEffective Customer Communication Skills
Effective Customer Communication SkillsFaakor Agyekum
 
Grooming & personal hygiene
Grooming & personal hygieneGrooming & personal hygiene
Grooming & personal hygieneHari Nair
 

Andere mochten auch (14)

Lost and Found
Lost and FoundLost and Found
Lost and Found
 
Lost & found
Lost & foundLost & found
Lost & found
 
Lost & Found Ppt
Lost & Found PptLost & Found Ppt
Lost & Found Ppt
 
Lost And Found
Lost And FoundLost And Found
Lost And Found
 
Hk training-21- lost & found
Hk  training-21- lost & foundHk  training-21- lost & found
Hk training-21- lost & found
 
Office Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conductOffice Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conduct
 
Appearance & grooming
Appearance & groomingAppearance & grooming
Appearance & grooming
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquette
 
Workplace etiquette & manners
Workplace etiquette & mannersWorkplace etiquette & manners
Workplace etiquette & manners
 
GROOMING PRESENTATION
GROOMING PRESENTATIONGROOMING PRESENTATION
GROOMING PRESENTATION
 
Office Etiquette PowerPoint Presentation
Office Etiquette PowerPoint PresentationOffice Etiquette PowerPoint Presentation
Office Etiquette PowerPoint Presentation
 
Grooming Presentation
Grooming PresentationGrooming Presentation
Grooming Presentation
 
Effective Customer Communication Skills
Effective Customer Communication SkillsEffective Customer Communication Skills
Effective Customer Communication Skills
 
Grooming & personal hygiene
Grooming & personal hygieneGrooming & personal hygiene
Grooming & personal hygiene
 

Ähnlich wie Lost Phones

WiMO - Retailer Package
WiMO - Retailer PackageWiMO - Retailer Package
WiMO - Retailer PackageGoWiMO
 
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...Virginia Lee
 
PYMNTS Summer School Karen Webster Opening Keynote
PYMNTS Summer School Karen Webster Opening KeynotePYMNTS Summer School Karen Webster Opening Keynote
PYMNTS Summer School Karen Webster Opening KeynotePYMNTS.com
 
Technology in the consumer world
Technology in the consumer worldTechnology in the consumer world
Technology in the consumer worldKarenMcBride13
 
Mobile is the New Local: How to Compete presented at Big Design 2016
Mobile is the New Local: How to Compete presented at Big Design 2016Mobile is the New Local: How to Compete presented at Big Design 2016
Mobile is the New Local: How to Compete presented at Big Design 2016Advice Interactive Group
 
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013Magda Mo
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
ZOMM 2010 Update
ZOMM 2010 UpdateZOMM 2010 Update
ZOMM 2010 UpdateZ
 
Voice optimisation: Tracking voice results on Alexa and Google
Voice optimisation: Tracking voice results on Alexa and GoogleVoice optimisation: Tracking voice results on Alexa and Google
Voice optimisation: Tracking voice results on Alexa and GoogleStephanie Preyer
 
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14Nikki Wagner
 
2c1e92135a0121b3649da0c4d317f69fa4793ceb.1
2c1e92135a0121b3649da0c4d317f69fa4793ceb.12c1e92135a0121b3649da0c4d317f69fa4793ceb.1
2c1e92135a0121b3649da0c4d317f69fa4793ceb.1Mary Sclabassi
 
Marketing business environment
Marketing business environmentMarketing business environment
Marketing business environmentsohrab mahmoodi
 
Winnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
Winnipeg Real Estate Newsletter June 2014 from Bo KauffmannWinnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
Winnipeg Real Estate Newsletter June 2014 from Bo KauffmannBo Kauffmann
 
Mobile Real Estate Business & Technology
Mobile Real Estate Business & TechnologyMobile Real Estate Business & Technology
Mobile Real Estate Business & TechnologyBrad Andersohn
 
The market for smart wearables
The market for smart wearablesThe market for smart wearables
The market for smart wearablesNick Hunn
 

Ähnlich wie Lost Phones (20)

WiMO - Retailer Package
WiMO - Retailer PackageWiMO - Retailer Package
WiMO - Retailer Package
 
2005 thinking
2005 thinking2005 thinking
2005 thinking
 
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
 
PYMNTS Summer School Karen Webster Opening Keynote
PYMNTS Summer School Karen Webster Opening KeynotePYMNTS Summer School Karen Webster Opening Keynote
PYMNTS Summer School Karen Webster Opening Keynote
 
Technology in the consumer world
Technology in the consumer worldTechnology in the consumer world
Technology in the consumer world
 
Mobile is the New Local: How to Compete presented at Big Design 2016
Mobile is the New Local: How to Compete presented at Big Design 2016Mobile is the New Local: How to Compete presented at Big Design 2016
Mobile is the New Local: How to Compete presented at Big Design 2016
 
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
 
This is not a joke wake up world
This is not a joke wake up worldThis is not a joke wake up world
This is not a joke wake up world
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
ZOMM 2010 Update
ZOMM 2010 UpdateZOMM 2010 Update
ZOMM 2010 Update
 
Voice optimisation: Tracking voice results on Alexa and Google
Voice optimisation: Tracking voice results on Alexa and GoogleVoice optimisation: Tracking voice results on Alexa and Google
Voice optimisation: Tracking voice results on Alexa and Google
 
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
 
2c1e92135a0121b3649da0c4d317f69fa4793ceb.1
2c1e92135a0121b3649da0c4d317f69fa4793ceb.12c1e92135a0121b3649da0c4d317f69fa4793ceb.1
2c1e92135a0121b3649da0c4d317f69fa4793ceb.1
 
Technology
TechnologyTechnology
Technology
 
Marketing business environment
Marketing business environmentMarketing business environment
Marketing business environment
 
Digital Media in 2012
Digital Media in 2012Digital Media in 2012
Digital Media in 2012
 
Digital trends (Episode 8)
Digital trends (Episode 8) Digital trends (Episode 8)
Digital trends (Episode 8)
 
Winnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
Winnipeg Real Estate Newsletter June 2014 from Bo KauffmannWinnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
Winnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
 
Mobile Real Estate Business & Technology
Mobile Real Estate Business & TechnologyMobile Real Estate Business & Technology
Mobile Real Estate Business & Technology
 
The market for smart wearables
The market for smart wearablesThe market for smart wearables
The market for smart wearables
 

Mehr von Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 

Mehr von Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 

Kürzlich hochgeladen

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Lost Phones

  • 1. WHERE DO PHONES GET LOST? Mobile Lost and Found Around the World By Lookout, Inc
  • 2. Lookout estimated that lost and stolen phones cost U.S. consumers $30 billion in 2012 Source: 2012 Mobile Lost and Found Report, Lookout, Inc. Lookout.com
  • 3. It’s not a matter of whether you’ll misplace your phone. It’s a matter of when and where… Which depends on where you live. Lookout.com
  • 4. What Are the Odds? In the U.S., people lose a smartphone about once a year. Phones are more often lost at night. Two-thirds of phone loss happens between the hours of 9 p.m. and 2 a.m. local time. One of the top places to lose your phone at is a bar. (Hmmm, we wonder how that happens…) Lookout.com
  • 5. Most Common Places to Lose Your Phone in the U.S. Coffee shops Offices Bars Restaurants Gas stations or garages Lookout.com
  • 6. Most Popular Places to Lose Your Phone, East vs. West • Historic site • Restaurant • Convenience store • Park • Ramen or noodle house • Hotel • Men’s store • Office • Electronics store • Train Station • Fast food restaurant • Gas station or garage • Grocery or supermarket • Coffee Shop • Video Store • American restaurant • Department store • Automotive shop • Pizza Place • Deli or bodega Tokyo Seattle Lookout.com
  • 7. It’s the Most Wonderful Time of the Year (to Lose Your Phone) More phones are lost during festivals and celebrations. During Christmas, more than $11 million dollars worth of phones were lost. During the week of Carnival (aka Mardi Gras), more phones were lost around the world than during your average parade-less, bead-less week. Party-goers in Cologne lost 30% more phones and in Paris, 72% more phones were lost. Lookout.com
  • 8. Top U.S. Cities for Phone Loss • Philadelphia • Seattle • Oakland • Long Beach • Newark • Detroit • Cleveland • Baltimore • New York • Boston Many of these cities are also in the highest ranks of the FBI’s crime stats. — @lookout Make sure you can find your phone if you lose it. Download Lookout Mobile Security. Lookout.com
  • 9. Keep in touch with Lookout @lookout /mylookout blog.lookout.com contact@lookout.com WANT TO KNOW MORE ABOUT LOST PHONES?