SlideShare a Scribd company logo
1 of 17
Attitudes to Privacy and Security
Damian Radcliffe
Social Impact Department Manager
ICT and Society
Damian Radcliffe
Email: dradcliffe@ict.gov.qa
Twitter: @damianradcliffe
2
MENA fastest growing online region
Online penetration still quite low, especially in North
Africa, but the MENA region will see the fastest levels
of take up in the coming years.
3
And eCommerce will be part of this mix
4
But, comparatively, MENA remains
a small international B2C market
North America & Asia-Pacific dominate global
share; with Asia-Pacific becoming the
predominant B2C market this year
So what do we know about what people do
online, and their attitudes and behaviors?
5
ICT Penetration among Individuals
6
Examples of tasks performed
by Internet users in Qatar
7
8
Concerns of Internet users in Qatar
Many similarities to those not online
Skills: Don’t know how to do a certain task.
Knowledge: Don’t understand how the Internet benefits them.
Trust: Don’t trust the Internet for certain tasks.
Or the Internet more generally.
Fear of virus and malware.
Preferences: Face to face communication remains popular.
9
10
In a good place to move forward
11
But need to remain vigilant
12
Online activity does not
necessarily equate to feeling safe online
An idea perhaps reflected in
what people in MENA do online
13
14
Especially when compared
with online activities globally
Yet compelling propositions can
help override many user concerns
15
UK data suggests concerns
relating to personal privacy,
security or fraud don’t
appear to inhibit online
behaviors.
People’s propensity to trust
a website increases if their
desire for the product or
service on offer is great
• Concerns re privacy and security will continue especially
as new technology is rolled out e.g. NFC, newer Apps etc.
• We need to continue to sell the benefits of being online to
both non-users and users.
• You can also play a role in helping promote being safe and
secure online.
16
Future Considerations
We look forward to working with you
and making this happen.
1717
Thanks for listening.
Find out more on Internet usage in Qatar: www.ictqatar.qa
Get our quarterly digest of emerging issues and evidence of
ICT behaviors in the MENA region at:
www.slideshare.net/ictqatar

More Related Content

What's hot

Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
lichuyuliting
 

What's hot (18)

Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Cybercrime (sociology)
Cybercrime (sociology)Cybercrime (sociology)
Cybercrime (sociology)
 
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
cyber crime
cyber crimecyber crime
cyber crime
 
Unleashing Technology to Advance Social and Economic Development
Unleashing Technology to Advance Social and Economic DevelopmentUnleashing Technology to Advance Social and Economic Development
Unleashing Technology to Advance Social and Economic Development
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected Society
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
 
Android Security: Art of Exploitation
Android Security: Art of ExploitationAndroid Security: Art of Exploitation
Android Security: Art of Exploitation
 
Privacy is for losers 2016
Privacy is for losers 2016Privacy is for losers 2016
Privacy is for losers 2016
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 

Similar to Attitudes to online Privacy and Security

Forbes Africa - Africa ICT Outlook 2016
Forbes Africa - Africa ICT Outlook 2016Forbes Africa - Africa ICT Outlook 2016
Forbes Africa - Africa ICT Outlook 2016
Tebogo Mogapi
 
THE INCLUSIVE INTERNET INDEX: Bridging digital divides
THE INCLUSIVE INTERNET INDEX:  Bridging digital dividesTHE INCLUSIVE INTERNET INDEX:  Bridging digital divides
THE INCLUSIVE INTERNET INDEX: Bridging digital divides
Peerasak C.
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
Zsolt Nemeth
 

Similar to Attitudes to online Privacy and Security (20)

Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle East
 
Positive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile DevicesPositive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile Devices
 
Digital life south africa event jan 2012 mark short
Digital life south africa event jan 2012 mark shortDigital life south africa event jan 2012 mark short
Digital life south africa event jan 2012 mark short
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial System
 
Protecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial SystemProtecting the Resilience of Canada’s Financial System
Protecting the Resilience of Canada’s Financial System
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Forbes Africa - Africa ICT Outlook 2016
Forbes Africa - Africa ICT Outlook 2016Forbes Africa - Africa ICT Outlook 2016
Forbes Africa - Africa ICT Outlook 2016
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
A4 melinda(1)
A4 melinda(1)A4 melinda(1)
A4 melinda(1)
 
People Centered Internet Briefing Jan 30 2016
People Centered Internet Briefing Jan 30 2016People Centered Internet Briefing Jan 30 2016
People Centered Internet Briefing Jan 30 2016
 
10 Most Influential Leaders in Cybersecurity, 2022.pdf
10 Most Influential Leaders in Cybersecurity, 2022.pdf10 Most Influential Leaders in Cybersecurity, 2022.pdf
10 Most Influential Leaders in Cybersecurity, 2022.pdf
 
Policy options for connecting and enabling the next billion – phase iii cal...
Policy options for connecting and enabling the next billion – phase iii   cal...Policy options for connecting and enabling the next billion – phase iii   cal...
Policy options for connecting and enabling the next billion – phase iii cal...
 
E Marketing Lecture Part 2
E Marketing Lecture Part 2E Marketing Lecture Part 2
E Marketing Lecture Part 2
 
Materi Perlindungan Konsumen.pdf
Materi Perlindungan Konsumen.pdfMateri Perlindungan Konsumen.pdf
Materi Perlindungan Konsumen.pdf
 
THE INCLUSIVE INTERNET INDEX: Bridging digital divides
THE INCLUSIVE INTERNET INDEX:  Bridging digital dividesTHE INCLUSIVE INTERNET INDEX:  Bridging digital divides
THE INCLUSIVE INTERNET INDEX: Bridging digital divides
 
Impact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday NigeriaImpact of the Internet in Nigeria - Mobile Monday Nigeria
Impact of the Internet in Nigeria - Mobile Monday Nigeria
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Panel 5
Panel 5Panel 5
Panel 5
 

More from MOTC Qatar

إنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثإنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالث
MOTC Qatar
 
الملخص الرقمي الربع الاخير 2014
الملخص الرقمي  الربع الاخير   2014 الملخص الرقمي  الربع الاخير   2014
الملخص الرقمي الربع الاخير 2014
MOTC Qatar
 
Digital Digest Q4 2014
Digital Digest Q4 2014Digital Digest Q4 2014
Digital Digest Q4 2014
MOTC Qatar
 

More from MOTC Qatar (20)

منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015
 
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
 
إنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثإنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالث
 
Digital Digest Q3 Infographic
Digital Digest Q3 InfographicDigital Digest Q3 Infographic
Digital Digest Q3 Infographic
 
الملخص الرقمي الربع الاخير 2014
الملخص الرقمي  الربع الاخير   2014 الملخص الرقمي  الربع الاخير   2014
الملخص الرقمي الربع الاخير 2014
 
Digital Digest Q4 2014
Digital Digest Q4 2014Digital Digest Q4 2014
Digital Digest Q4 2014
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014
 
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
 
How Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social media
 
عشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعادعشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعاد
 
10 ways people are using 3D printing
10 ways people are using 3D printing10 ways people are using 3D printing
10 ways people are using 3D printing
 
Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)
 
الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014
 
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا... التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 
عشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديدعشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديد
 
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
 
عشر ابتكارات في مجال التجارة الالكترونية
 عشر ابتكارات في مجال التجارة الالكترونية عشر ابتكارات في مجال التجارة الالكترونية
عشر ابتكارات في مجال التجارة الالكترونية
 
Tech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerceTech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerce
 
Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"
 
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Attitudes to online Privacy and Security

  • 1. Attitudes to Privacy and Security Damian Radcliffe Social Impact Department Manager ICT and Society Damian Radcliffe Email: dradcliffe@ict.gov.qa Twitter: @damianradcliffe
  • 2. 2 MENA fastest growing online region Online penetration still quite low, especially in North Africa, but the MENA region will see the fastest levels of take up in the coming years.
  • 3. 3 And eCommerce will be part of this mix
  • 4. 4 But, comparatively, MENA remains a small international B2C market North America & Asia-Pacific dominate global share; with Asia-Pacific becoming the predominant B2C market this year
  • 5. So what do we know about what people do online, and their attitudes and behaviors? 5
  • 6. ICT Penetration among Individuals 6
  • 7. Examples of tasks performed by Internet users in Qatar 7
  • 8. 8 Concerns of Internet users in Qatar
  • 9. Many similarities to those not online Skills: Don’t know how to do a certain task. Knowledge: Don’t understand how the Internet benefits them. Trust: Don’t trust the Internet for certain tasks. Or the Internet more generally. Fear of virus and malware. Preferences: Face to face communication remains popular. 9
  • 10. 10 In a good place to move forward
  • 11. 11 But need to remain vigilant
  • 12. 12 Online activity does not necessarily equate to feeling safe online
  • 13. An idea perhaps reflected in what people in MENA do online 13
  • 14. 14 Especially when compared with online activities globally
  • 15. Yet compelling propositions can help override many user concerns 15 UK data suggests concerns relating to personal privacy, security or fraud don’t appear to inhibit online behaviors. People’s propensity to trust a website increases if their desire for the product or service on offer is great
  • 16. • Concerns re privacy and security will continue especially as new technology is rolled out e.g. NFC, newer Apps etc. • We need to continue to sell the benefits of being online to both non-users and users. • You can also play a role in helping promote being safe and secure online. 16 Future Considerations We look forward to working with you and making this happen.
  • 17. 1717 Thanks for listening. Find out more on Internet usage in Qatar: www.ictqatar.qa Get our quarterly digest of emerging issues and evidence of ICT behaviors in the MENA region at: www.slideshare.net/ictqatar

Editor's Notes

  1. http://cdn.thenextweb.com/wp-content/blogs.dir/1/files/2012/10/asia-internet-users-520x391.png
  2. Needs info re sample size
  3. When? Source?
  4. e.g. 55% of UK adult internet users admit they use the same password for most, if not all, websites. 26% admit to using easy to remember passwords such as birthdays or names, potentially opening themselves up to the threat of account hacking.