SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Attitudes to Cybersafety and 
Online Privacy in the Middle East 
September 2014
Topicality
Are user concerns universal? 
US data 2014 
UK consumers 
2013
World Economic Forum Report 
• 5,400 adult Internet users 
• 13 countries 
“Findings from this study show that 
a global Internet culture has 
emerged as users across countries 
often share similar viewpoints 
and habits related to these vital 
matters pertaining to the Internet.”
What we did - and how we did it
Areas of study 
1. Usage of ICT and the Internet in the region 
2. Attitudes towards the Internet 
3. Concerns about safety in cyberspace 
4. Trust in different online actors 
5. Behaviors online
Methodology 
• Online survey of existing Internet users. 
• ictQATAR worked with the Oxford Internet Institute in 
collaboration with Cornell University. 
• Fieldwork by comScore and Toluna.
Countries covered 
Algeria 
Egypt 
Morocco 
Tunisia 
Iraq Jordan 
UAE 
Yemen 
Iran 
Oman 
Saudi Arabia 
Qatar 
Kuwait 
Bahrain 
MENA sample = 2,793 
* Results from 14 countries
Research sample 
• Global sample = 8,442 
* Results from 44 countries 
• Total Sample = 11,225 
* Covers 58 countries
5 KEY DIFFERENCES 
MENA VS GLOBAL
MENA VS Global 
1. MENA users are less likely to shop or bank online. 
2. Higher perception in MENA that “the Internet is making 
things better for people like me.” (49% vs. 39%) 
3. Higher desire for Government role re harmful content. 
4. Less worried about safety of personal online content. 
5. Strongly against data repurposing.
3 KEY DIFFERENCES 
GCC VS NORTH AFRICA
GCC VS North Africa 
1. GCC: more likely to access the Internet on the move. 
2. GCC: greater access to technologies like tablets (70% 
vs. 33%) and gaming machines (62% vs. 36%). 
3. North Africa: stronger sense that personal data 
put online is kept safe (22% vs. 15%).
1. TECHNOLOGY AND THE INTERNET
MENA households full of technology
VoIP is highly prevalent 
The region has some of the highest take-up of video and voice 
calls over the Internet.
2. ATTITUDES TOWARDS THE INTERNET
Generally, attitudes were… 
• Positive: Belief that the Internet brings benefits to people. 
• Safeness: Divided views on how safe the Internet is. 
• Government: Higher demand for Government to regulate, 
censor and protect Internet users from harmful content.
Higher belief in MENA that the 
Internet is “making things better”
Harmful content: Protecting Children
“Discriminatory” or “Racist” content
3. LEVELS OF CONCERN
Areas of concern 
High concerns about: 
• Being Hacked 
• Misled by false information 
• Reputation damage 
Lower concerns about: 
• Being monitored online 
• Data collection
Concerns around data repurposing
4. TRUST IN ONLINE PLAYERS
Trust in Different Online Players 
Higher trust in… 
Entities who are “offline first” 
• Mobile and telephone providers 
• Government authorities 
• Banks and financial institutions 
• Health and medical providers 
Lower trust in… 
Entities that are “online first” 
• Social networking websites 
• Online search engines 
• Online websites and newspapers 
• Online marketers and advertisers
Trust Index
5. BEHAVIOR
Inconsistency in claimed 
behaviors and actions 
SAY 
they are safety-conscious 
ACT 
safety-conscious 
Behaviors and Attitudes are not always aligned. 
Examples of potentially reckless behavior in MENA: 
• More likely: to open attachments from people they don’t know. 
• Less likely: to scan their computers/devices for viruses. 
• More likely: to “Friend” people they don’t know .
Research takeaways
Recap: 5 top-level MENA findings 
1. Broad equivalency - access to technology compared to global averages. 
2. MENA Internet users more likely to agree that “the Internet is making 
things better for people like me” compared to the world average. 
3. They are also more supportive of the idea that Government 
authorities should block harmful content than users elsewhere. 
4. Amongst different online players; banks and financial institutions in 
the region enjoy the highest levels of trust. 
5. MENA Internet users are among the most likely to open attachments, 
documents and emails from senders they do not know.
What happens next?
These issues are not going to go away…
New tech = new challenges
7 out of 10 fear security 
implications of Internet of Things 
2014 study of 1,800 consumers between the ages of 20 and 50 
who claim to be tech savvy in 11 countries, including the United States, 
Australia, China, Germany, India, and the United Kingdom.
Wearable Tech
Drones
Privacy entrepreneurship: 
Sell personal data for $8 a month 
Some start-ups allow you to sell your data 
and they then sell it on to companies.
New solutions to aid privacy 
Blackphone: Encrypted 
telephony and messaging, 
protected contact info, data 
storage encryption option. 
Confide: 
Chat app 
allows self-destructive 
messages and 
screenshot 
protection.
Taking matters into your own hands
Some ways we highlight issues 
Safespace.qa 
Training 
Workshops
Ongoing Rassed research projects 
Stay tuned… 
– How Children in Qatar use ICT 
– Understanding emerging social media platforms 
– Exploring online shopping usage in Qatar
Thank you for listening 
QUESTIONS? 
Get your copies! 
Email: rassed@ict.gov.qa

Weitere ähnliche Inhalte

Was ist angesagt?

Features and impact of technology
Features and impact of technologyFeatures and impact of technology
Features and impact of technologyDr.B.B. Tiwari
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devicesJ A Bhavsar
 
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumActiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumBusiness Development Institute
 
Accenture mobile-web-watch-internet-usage-survey-2012
Accenture mobile-web-watch-internet-usage-survey-2012Accenture mobile-web-watch-internet-usage-survey-2012
Accenture mobile-web-watch-internet-usage-survey-2012ruttens.com
 
Middle East Digital Digest Sept/Oct 2012
Middle East Digital Digest Sept/Oct 2012Middle East Digital Digest Sept/Oct 2012
Middle East Digital Digest Sept/Oct 2012Damian Radcliffe
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paperAkshay Sinha
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionKrishna De
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
 

Was ist angesagt? (17)

Features and impact of technology
Features and impact of technologyFeatures and impact of technology
Features and impact of technology
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
776 s0005
776 s0005776 s0005
776 s0005
 
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumActiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
 
Accenture mobile-web-watch-internet-usage-survey-2012
Accenture mobile-web-watch-internet-usage-survey-2012Accenture mobile-web-watch-internet-usage-survey-2012
Accenture mobile-web-watch-internet-usage-survey-2012
 
Middle East Digital Digest Sept/Oct 2012
Middle East Digital Digest Sept/Oct 2012Middle East Digital Digest Sept/Oct 2012
Middle East Digital Digest Sept/Oct 2012
 
Positive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile DevicesPositive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile Devices
 
Mobile Media Privacy
Mobile Media PrivacyMobile Media Privacy
Mobile Media Privacy
 
Singapore's regulation of cybercrime
Singapore's regulation of cybercrimeSingapore's regulation of cybercrime
Singapore's regulation of cybercrime
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
PAN CIPA Requirements
PAN CIPA RequirementsPAN CIPA Requirements
PAN CIPA Requirements
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Youth of Turkey online
Youth of Turkey onlineYouth of Turkey online
Youth of Turkey online
 
Youth of Turkey Online
Youth of Turkey OnlineYouth of Turkey Online
Youth of Turkey Online
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
 

Ähnlich wie Attitudes to Cybersafety and Online Privacy in the Middle East

Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Attitudes to online Privacy and Security
Attitudes to online Privacy and SecurityAttitudes to online Privacy and Security
Attitudes to online Privacy and SecurityMOTC Qatar
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfRidhwanMG
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_UndesirabilityMohamed Omar
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweIOSR Journals
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Where next for mobile in the Middle East?
Where next for mobile in the Middle East?Where next for mobile in the Middle East?
Where next for mobile in the Middle East?Damian Radcliffe
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatRaudhat-Rahma Shittu-Agbetola
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 

Ähnlich wie Attitudes to Cybersafety and Online Privacy in the Middle East (20)

Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Attitudes to online Privacy and Security
Attitudes to online Privacy and SecurityAttitudes to online Privacy and Security
Attitudes to online Privacy and Security
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdf
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Where next for mobile in the Middle East?
Where next for mobile in the Middle East?Where next for mobile in the Middle East?
Where next for mobile in the Middle East?
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Panel 5
Panel 5Panel 5
Panel 5
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 

Mehr von MOTC Qatar

منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015MOTC Qatar
 
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية MOTC Qatar
 
إنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثإنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثMOTC Qatar
 
Digital Digest Q3 Infographic
Digital Digest Q3 InfographicDigital Digest Q3 Infographic
Digital Digest Q3 InfographicMOTC Qatar
 
الملخص الرقمي الربع الاخير 2014
الملخص الرقمي  الربع الاخير   2014 الملخص الرقمي  الربع الاخير   2014
الملخص الرقمي الربع الاخير 2014 MOTC Qatar
 
Digital Digest Q4 2014
Digital Digest Q4 2014Digital Digest Q4 2014
Digital Digest Q4 2014MOTC Qatar
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014MOTC Qatar
 
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية MOTC Qatar
 
How Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaMOTC Qatar
 
عشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعادعشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعادMOTC Qatar
 
10 ways people are using 3D printing
10 ways people are using 3D printing10 ways people are using 3D printing
10 ways people are using 3D printingMOTC Qatar
 
Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)MOTC Qatar
 
الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014MOTC Qatar
 
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا... التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...MOTC Qatar
 
عشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديدعشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديدMOTC Qatar
 
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014MOTC Qatar
 
عشر ابتكارات في مجال التجارة الالكترونية
 عشر ابتكارات في مجال التجارة الالكترونية عشر ابتكارات في مجال التجارة الالكترونية
عشر ابتكارات في مجال التجارة الالكترونيةMOTC Qatar
 
Tech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerceTech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerceMOTC Qatar
 
Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"MOTC Qatar
 
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
عشر ابتكارات تكنولوجية في مجال الأعمال الخيريةMOTC Qatar
 

Mehr von MOTC Qatar (20)

منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015
 
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
 
إنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثإنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالث
 
Digital Digest Q3 Infographic
Digital Digest Q3 InfographicDigital Digest Q3 Infographic
Digital Digest Q3 Infographic
 
الملخص الرقمي الربع الاخير 2014
الملخص الرقمي  الربع الاخير   2014 الملخص الرقمي  الربع الاخير   2014
الملخص الرقمي الربع الاخير 2014
 
Digital Digest Q4 2014
Digital Digest Q4 2014Digital Digest Q4 2014
Digital Digest Q4 2014
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014
 
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
 
How Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social media
 
عشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعادعشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعاد
 
10 ways people are using 3D printing
10 ways people are using 3D printing10 ways people are using 3D printing
10 ways people are using 3D printing
 
Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)
 
الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014
 
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا... التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 
عشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديدعشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديد
 
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
 
عشر ابتكارات في مجال التجارة الالكترونية
 عشر ابتكارات في مجال التجارة الالكترونية عشر ابتكارات في مجال التجارة الالكترونية
عشر ابتكارات في مجال التجارة الالكترونية
 
Tech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerceTech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerce
 
Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"
 
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 

Kürzlich hochgeladen

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Kürzlich hochgeladen (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Attitudes to Cybersafety and Online Privacy in the Middle East

  • 1. Attitudes to Cybersafety and Online Privacy in the Middle East September 2014
  • 3. Are user concerns universal? US data 2014 UK consumers 2013
  • 4. World Economic Forum Report • 5,400 adult Internet users • 13 countries “Findings from this study show that a global Internet culture has emerged as users across countries often share similar viewpoints and habits related to these vital matters pertaining to the Internet.”
  • 5. What we did - and how we did it
  • 6. Areas of study 1. Usage of ICT and the Internet in the region 2. Attitudes towards the Internet 3. Concerns about safety in cyberspace 4. Trust in different online actors 5. Behaviors online
  • 7. Methodology • Online survey of existing Internet users. • ictQATAR worked with the Oxford Internet Institute in collaboration with Cornell University. • Fieldwork by comScore and Toluna.
  • 8. Countries covered Algeria Egypt Morocco Tunisia Iraq Jordan UAE Yemen Iran Oman Saudi Arabia Qatar Kuwait Bahrain MENA sample = 2,793 * Results from 14 countries
  • 9. Research sample • Global sample = 8,442 * Results from 44 countries • Total Sample = 11,225 * Covers 58 countries
  • 10. 5 KEY DIFFERENCES MENA VS GLOBAL
  • 11. MENA VS Global 1. MENA users are less likely to shop or bank online. 2. Higher perception in MENA that “the Internet is making things better for people like me.” (49% vs. 39%) 3. Higher desire for Government role re harmful content. 4. Less worried about safety of personal online content. 5. Strongly against data repurposing.
  • 12. 3 KEY DIFFERENCES GCC VS NORTH AFRICA
  • 13. GCC VS North Africa 1. GCC: more likely to access the Internet on the move. 2. GCC: greater access to technologies like tablets (70% vs. 33%) and gaming machines (62% vs. 36%). 3. North Africa: stronger sense that personal data put online is kept safe (22% vs. 15%).
  • 14. 1. TECHNOLOGY AND THE INTERNET
  • 15. MENA households full of technology
  • 16. VoIP is highly prevalent The region has some of the highest take-up of video and voice calls over the Internet.
  • 17. 2. ATTITUDES TOWARDS THE INTERNET
  • 18. Generally, attitudes were… • Positive: Belief that the Internet brings benefits to people. • Safeness: Divided views on how safe the Internet is. • Government: Higher demand for Government to regulate, censor and protect Internet users from harmful content.
  • 19. Higher belief in MENA that the Internet is “making things better”
  • 22. 3. LEVELS OF CONCERN
  • 23. Areas of concern High concerns about: • Being Hacked • Misled by false information • Reputation damage Lower concerns about: • Being monitored online • Data collection
  • 24. Concerns around data repurposing
  • 25. 4. TRUST IN ONLINE PLAYERS
  • 26. Trust in Different Online Players Higher trust in… Entities who are “offline first” • Mobile and telephone providers • Government authorities • Banks and financial institutions • Health and medical providers Lower trust in… Entities that are “online first” • Social networking websites • Online search engines • Online websites and newspapers • Online marketers and advertisers
  • 29. Inconsistency in claimed behaviors and actions SAY they are safety-conscious ACT safety-conscious Behaviors and Attitudes are not always aligned. Examples of potentially reckless behavior in MENA: • More likely: to open attachments from people they don’t know. • Less likely: to scan their computers/devices for viruses. • More likely: to “Friend” people they don’t know .
  • 31. Recap: 5 top-level MENA findings 1. Broad equivalency - access to technology compared to global averages. 2. MENA Internet users more likely to agree that “the Internet is making things better for people like me” compared to the world average. 3. They are also more supportive of the idea that Government authorities should block harmful content than users elsewhere. 4. Amongst different online players; banks and financial institutions in the region enjoy the highest levels of trust. 5. MENA Internet users are among the most likely to open attachments, documents and emails from senders they do not know.
  • 33. These issues are not going to go away…
  • 34. New tech = new challenges
  • 35. 7 out of 10 fear security implications of Internet of Things 2014 study of 1,800 consumers between the ages of 20 and 50 who claim to be tech savvy in 11 countries, including the United States, Australia, China, Germany, India, and the United Kingdom.
  • 38.
  • 39.
  • 40. Privacy entrepreneurship: Sell personal data for $8 a month Some start-ups allow you to sell your data and they then sell it on to companies.
  • 41. New solutions to aid privacy Blackphone: Encrypted telephony and messaging, protected contact info, data storage encryption option. Confide: Chat app allows self-destructive messages and screenshot protection.
  • 42. Taking matters into your own hands
  • 43. Some ways we highlight issues Safespace.qa Training Workshops
  • 44. Ongoing Rassed research projects Stay tuned… – How Children in Qatar use ICT – Understanding emerging social media platforms – Exploring online shopping usage in Qatar
  • 45. Thank you for listening QUESTIONS? Get your copies! Email: rassed@ict.gov.qa

Hinweis der Redaktion

  1. http://cdn.slashgear.com/wp-content/uploads/2014/07/fb-820x4201.jpg http://i.dailymail.co.uk/i/pix/2014/07/03/article-2678561-1F58F0DC00000578-816_634x394.jpg http://image-cdn.zap2it.com/photogallery/images/zap-jennifer-lawrence-pictures-034 http://www.foxnews.com/world/2014/09/14/digital-jihad-isis-al-qaeda-seek-cyber-caliphate-to-launch-attacks-on-us/ http://gulfnews.com/business/general/millions-of-android-smartphones-at-risk-of-hacking-in-middle-east-1.1374833 http://bits.blogs.nytimes.com/2014/09/04/apple-says-it-will-add-new-security-measures-after-celebrity-hack/?_php=true&_type=blogs&_r=0
  2. http://www.statista.com/chart/2663/when-americans-worry-about-online-privacy/ https://econsultancy.com/blog/63600-stats-internet-privacy-and-responsibility-among-consumers#i.1r28s7u6rxcw2v
  3. http://www.redorbit.com/media/uploads/2014/03/internet-thinkstock-179504580-617x416.jpg
  4. http://www.truste.com/blog/wp-content/uploads/the-internet-of-things.jpg
  5. http://www.fortinet.com/press_releases/2014/internet-of-things.html http://www.techrepublic.com/article/7-out-of-10-fear-security-implications-of-internet-of-things/
  6. http://blog.laptopmag.com/wpress/wp-content/uploads/2013/03/5-Point-Cafe-google-glass-m.jpg http://www.techloon.com/wp-content/uploads/2014/02/glass-hole-2-622x349.jpg http://stopthecyborgs.files.wordpress.com/2013/05/google-glass-ban.png
  7. http://www.airpano.ru/files/bolotnaya_2.jpg
  8. http://www.stuckincustoms.com/2014/06/19/dji-quadcopter-china-detention
  9. http://www.stuckincustoms.com/2014/06/19/dji-quadcopter-china-detention
  10. http://www.technologyreview.com/news/529686/how-much-is-your-privacy-worth/?curator=MediaREDEF
  11. Sources: http://techcrunch.com/2014/02/26/close-look-at-blackphone/?curator=MediaREDEF And https://getconfide.com/
  12. http://www.cnet.com/news/beware-google-amazon-delivery-drones-unintended-consequences/