SlideShare a Scribd company logo
1 of 50
NetWORK: How is
the Internet
enabling change in
the post-pandemic
workplace?
Evidence and Themes from Exploratory
Research
William Dutton and Patricia Esteve-González
Oxford’s Global Cybersecurity Capacity
Centre (GCSCC)
Cybersecurity Across Workplaces: Exploratory
Research
In-depth Interviews with
cybersecurity and IT
officers at major
institutions, businesses,
communication firms, and
universities*
Global survey of over 7K
adults, 18 & over, about
their perceptions,
attitudes and beliefs about
working from home and
cybersecurity
* Bispham, M., Creese, S., Dutton, W. H., Esteve-Gonzalez, P., and Goldsmith, M. (2021),
'Cybersecurity in Working from Home: An Exploratory Study’, presented at TPRC49, 22-24
September 2021. Available at: https://ssrn.com/abstract=3897380
The Changing Nature of Work: Post-Pandemic
Exploratory Survey of the Impact of the Pandemic on Work and Cybersecurity
Global Centre for Cybersecurity Capacity Building (GCSC), University of Oxford in
collaboration with GrapeData
GrapeData: “Pioneers in developing … market research platform with global coverage”
An exploratory online global survey of adults [in the field presently]
Survey on
Cybersecurity
across Workplaces
• An Exploratory Research Project
• William Dutton, Patricia Esteve-González, Ioannis
Agrafiotis, Sadie Creese, and Michael Goldsmith
• Global Cybersecurity Capacity Centre (GCSCC)
Survey and Respondents
Globally
Distributed
Demographically
Diverse but
Young
Technically
Skilled but Very
Mobile Reliant
The Global Survey with Grape Data
• Focused on cybersecurity and the respondent’s
workplace(s)
• In the field from 22 June- 2 September 2022
• 7,330 respondents, but not a random sample
• Respondents recruited and vetted
• 133 countries
• Limitations: evolving trends,
perceptions, limits of recall
• Exploratory study
Global
Distribution of
Respondents
(by
Residence)
10%
25%
28%
8%
19%
3%
6% 1%
East Asia and Pacific
Europe and Central Asia
Latin America and the
Caribbean
Middle East and North
Africa
North America
South Asia
Sub-Saharan Africa
Prefer not to answer
Demographics • Young: 86 percent between 18 and 44
years of age
• Gender: balanced with 50 percent
identifying as male
• Majority of participants (55%) live with at
least one child
• Living in big cities (40%), medium sized
cities (26%), small city or town (18%), …
with only 3 percent on a farm or home in
a rural area
• Marital Status: 45 percent single, 29
percent married, …
• 11 percent with a master’s or doctoral
degree, the modal category is high school
(36%) followed by a bachelor’s degree
(30%)
Employment Status
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
Don't know
Other categories
Retired
Unemployed
Student
Working part time
Working full time
Internet Access
• Access to Internet at Home: 47% broadband sub; 70% smartphone
• Devices: Mainly smartphone, followed by laptop
• 43% of participants use smartphone as the only way to access Internet at home
• 87% of participants have at least one desktop or laptop computer at home
• 48 percent say they are skilled online, using the internet independently and people come
to them for help on how to use it
• The pandemic did not lead most (58%) to adopt new software or apps
• About half (47%) use the internet “almost constantly”, with another 46 percent using it
“many times a day”
• 70 percent have a reliable connection at home, with 21 percent saying they have
“occasional problems connecting at home”
• 70 percent of those with connection at home describe it as “fast enough to do things I do
online”
Pre- and Post-Pandemic Workplaces
Graphic from ‘How the pandemic will shape the workplace trends of 2021’ scx2.b-cdn.net
Controversy Surrounding the Workplace
Elon Musk:
come into work,
or …
“pretend to work
somewhere
else”
John Thornhill editorial in Financial Times*
“… the Covid pandemic has permanently
changed the world of work.”
*Thornhill, J. (2022), ‘What this tech bubble got right’, Financial Times, 23 September: 25.
Workplace: Current*
0% 5% 10% 15% 20% 25% 30% 35% 40%
Decentralized Work Center
Hybrid
Office/Uni
Home
* Only those respondents working or studying
Working From Home*
0% 10% 20% 30% 40% 50% 60% 70%
Currently
During the pandemic
Before the pandemic
* Only those participants working or studying
Number in Household Working from Home
0% 5% 10% 15% 20% 25% 30% 35%
Don't know
None
One
Two
Three
More than 3
Do You Need Internet Access to Work/Study?
0% 5% 10% 15% 20% 25% 30% 35% 40%
Don't know
Never
Rarely
Minority
Most Tasks
Can’t Do Without
Working from Office or University*
0% 10% 20% 30% 40% 50% 60%
Currently
During the pandemic
Before the pandemic
* Only those participants working or studying
Working in Flexible or Hybrid Office Context*
0% 5% 10% 15% 20% 25% 30%
Currently
During the pandemic
Before the pandemic
* Only those participants working or studying
Working in Decentralized Workplace*
0% 1% 2% 3% 4% 5% 6% 7% 8% 9%
Currently
During the pandemic
Before the pandemic
* Only those participants working or studying
Change in Workplaces Through the Pandemic*
0%
10%
20%
30%
40%
50%
60%
70%
Decentralized Work
Center
Hybrid Office/Uni Home
Currently During the pandemic Before the pandemic
* Only those participants working or studying
Beliefs and Attitudes toward the Workplace
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Prefer outside home
Prefer Hybrid
Prefer WFH
Satisfied online systems
Possible to WFH
“I am more productive”
0%
10%
20%
30%
40%
50%
60%
70%
WFH Office Decentral DK N/A
“I am lonely”
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
WFH Office Decentral DK N/A
“I get more distractions”
0%
5%
10%
15%
20%
25%
30%
35%
40%
WFH Office Decentral DK N/A
“I lose touch with people important to work”
0%
5%
10%
15%
20%
25%
30%
35%
40%
WFH Office Decentral DK N/A
“I have too many problems with communication”
0%
5%
10%
15%
20%
25%
30%
35%
40%
WFH Office Decentral DK N/A
“I experience many problems with technology”
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
WFH Office Decentral DK N/A
Cybersecurity Across Workplaces
“Security is a problem”
0%
5%
10%
15%
20%
25%
30%
35%
40%
WFH Office Decentral DK N/A
“Privacy is a problem”
0%
5%
10%
15%
20%
25%
30%
35%
WFH Office Decentral DK N/A
“I haven’t faced any cybersecurity problems”
0%
5%
10%
15%
20%
25%
30%
35%
Currently During the pandemic Before the pandemic
“Did you experience more cybersecurity problems
before, during, or after the pandemic?”
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
I don't know
More before the pandemic
More after the pandemic (currently)
No difference
More during the pandemic
Cybersecurity Problems: Currently
0% 5% 10% 15% 20% 25% 30% 35%
Computer or other digital device stolen
Been a victim of online identity theft
Lost data that was on my computer or other device
Been harassed or bullied online
Tricked into providing personal information online
Personal data or passwords stolen or hacked
Saw unsolicited cruel or hateful comments or images online
Believed someone accessed your social network or e-mail account…
Tricked into opening a fraudulent message or attachment
Been a victim of a scam or fraud online
Received a virus, spyware or other malicious software
Received obscene or abusive e-mails
Cybersecurity Problems: During the Pandemic
0% 5% 10% 15% 20% 25% 30%
Computer or other digital device stolen
Lost data that was on my computer or other device
Been a victim of online identity theft
Tricked into providing personal information online
Been harassed or bullied online
Personal data or passwords stolen or hacked
Saw unsolicited cruel or hateful comments or images online
Believed someone accessed your social network or e-mail account…
Tricked into opening a fraudulent message or attachment
Been a victim of a scam or fraud online
Received a virus, spyware or other malicious software
Received obscene or abusive e-mails
Cybersecurity Problems: Before the Pandemic
0% 5% 10% 15% 20% 25%
Computer or other digital device stolen
Been a victim of online identity theft
Lost data that was on my computer or other device
Tricked into providing personal information online
Been harassed or bullied online
Personal data or passwords stolen or hacked
Been a victim of a scam or fraud online
Believed someone accessed your social network or e-mail account…
Saw unsolicited cruel or hateful comments or images online
Tricked into opening a fraudulent message or attachment
Received a virus, spyware or other malicious software
Received obscene or abusive e-mails
Current
Cybersecurity
Problems
“Received obscene or abusive e-mails”
“Received a virus, spyware or other malicious
software in your computer”
“I have been a victim of a scam or fraud online”
“Tricked into opening a fraudulent message,
attachment”
“Believed someone accessed your social network or
e-mail account without your permission”
“Saw unsolicited cruel or hateful comments or
images online”
Change in Top Cybersecurity Problems
0%
5%
10%
15%
20%
25%
30%
35%
Received obscene or
abusive e-mails
Received a virus,
spyware or other
malicious software
Been a victim of a scam
or fraud online
Tricked into opening a
fraudulent message or
attachment
Believed someone
accessed your social
network or e-mail …
Saw unsolicited cruel
or hateful comments or
images online
Currently During the pandemic Before the pandemic
Change in Lesser Cybersecurity Problems
0%
5%
10%
15%
20%
25%
30%
Personal data or
passwords stolen or
hacked
Tricked into providing
personal information
online
Been harassed or
bullied online
Lost data that was on
my computer or other
device
Been a victim of online
identity theft
Computer or other
digital device stolen
Currently During the pandemic Before the pandemic
When More Problems Were Perceived
0% 5% 10% 15% 20% 25% 30% 35% 40% 45%
I don't know
More before the pandemic
More after the pandemic (currently)
No difference
More during the pandemic
Percent Who Disagree in their Effectiveness
0% 5% 10% 15% 20% 25% 30% 35%
Being careful to avoid phishing and scam e-mails
Checking the authenticity of people who contact you online
Not visiting websites that look suspicious
Using two- or multi-factor authentication
Carefully managing your passwords
Keeping operating systems and software up to date
Using secure networks when connecting to the Internet
Not sharing personal information on social media
Using strong passwords
Blocking pop-up ads
Using licenced (not pirated) software
Managing records of your Internet use like "cookies"
Sharing virtual meetings URL securely
Using a sliding webcam cover
Keeping family members away from work devices
Did You Start Taking More Protective
Measures since the Pandemic?
0% 10% 20% 30% 40% 50% 60% 70% 80%
Don’t know
No
Yes
Devices Used when Working from Home
0% 10% 20% 30% 40% 50% 60%
Don’t know
Devices provided by your employer
A mix of corporate and personal devices
Only personal devices
What Employer Does
0% 10% 20% 30% 40% 50% 60% 70%
Provides a corporate Virtual Private Network (VPN) for…
Makes corporate applications accessible to you only via…
Provides multifactor authentification
Provides a securely configured device, such as a laptop
Provides training on good cybersecurity practices for staff
Provides secure videoconferencing software
Provides corporate centralised sotrage solutions and…
Has me use software that is pre-approved by the…
Has policies on working from home or remotely
Has clear policies for responding to any security incidents…
Provides antivirus software
Provides you access to IT support
What Employer Does Not Do
0% 5% 10% 15% 20% 25% 30% 35%
Provides you access to IT support
Has clear policies for responding to any security incidents…
Has policies on working from home or remotely
Has me use software that is pre-approved by the…
Provides corporate centralised sotrage solutions and…
Provides secure videoconferencing software
Provides antivirus software
Provides multifactor authentification
Provides training on good cybersecurity practices for staff
Makes corporate applications accessible to you only via…
Provides a securely configured device, such as a laptop
Provides a corporate Virtual Private Network (VPN) for…
Did Your Employer Start Taking More
Protective Measures since the Pandemic?
0% 10% 20% 30% 40% 50% 60%
Don’t know
No
Yes
Organizational
Perspectives
79 percent believe the
organization in which they work
is open to new ideas and
innovation
51 percent see their organization
focused on results, compared
with 41 percent focused more on
how work is done
What is the
policy of your
organization?
0% 10% 20% 30% 40% 50% 60%
Don't know
N/A
Permit WFH or on Move
Office
Allow hybrid
Some General Patterns and Themes
Workplace is a matter of contention – divided opinions
WFH has risen in practice and preferences
Pandemic accelerated WFH, despite bounce back
Pandemic hit office work but also decentralized workplaces
People prefer a Hybrid Workplace or WFH
WFH seen as productive but lonely, distracting & out of touch
Office work seen as less productive but in touch and social
Most organizations remain flexible at present
THANK YOU:
Questions or
Comments?
• Exploratory Study, perceptions, and not a
random sample from which to generalize
specific percentages, etc.
• Conceptions of the workplace are
broadening but facing uncertainty
• Cybersecurity perceived to be a somewhat
growing problem by users, but …
• Work can be done in households and hybrid
work contexts
• Has security enabled more flexibility?

More Related Content

What's hot

Pesten op school start
Pesten op school startPesten op school start
Pesten op school startdekrinkel
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Primjerena i odgovorna uporaba interneta
Primjerena i odgovorna uporaba internetaPrimjerena i odgovorna uporaba interneta
Primjerena i odgovorna uporaba internetaPogled kroz prozor
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)Sam Bowne
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineeringVi Tính Hoàng Nam
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit pptapieper
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 

What's hot (20)

Pesten op school start
Pesten op school startPesten op school start
Pesten op school start
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Primjerena i odgovorna uporaba interneta
Primjerena i odgovorna uporaba internetaPrimjerena i odgovorna uporaba interneta
Primjerena i odgovorna uporaba interneta
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)CISSP Prep: Ch 2. Security and Risk Management I (part 2)
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineering
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 

Similar to 25SEP2022 WFH Slides.pptx

Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserIT-oLogy
 
Growing Up Digital
Growing Up DigitalGrowing Up Digital
Growing Up Digitaljutecht
 
Misconceptions and mistakes: What if our approach to technology in libraries,...
Misconceptions and mistakes: What if our approach to technology in libraries,...Misconceptions and mistakes: What if our approach to technology in libraries,...
Misconceptions and mistakes: What if our approach to technology in libraries,...Technology & Social Change Group
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youthAbhishek Jain
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
1. Opportunities and barriers to children's rights in a digital, global age –...
1. Opportunities and barriers to children's rights in a digital, global age –...1. Opportunities and barriers to children's rights in a digital, global age –...
1. Opportunities and barriers to children's rights in a digital, global age –...UNICEF Office of Research - Innocenti
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thJohn Field
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying John Field
 
Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social mediaNida Rabbani
 
Jenny dewsnap
Jenny dewsnapJenny dewsnap
Jenny dewsnapAHP_SHU
 

Similar to 25SEP2022 WFH Slides.pptx (20)

Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael KaiserKeep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
 
Growing Up Digital
Growing Up DigitalGrowing Up Digital
Growing Up Digital
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 
M13 presentation
M13 presentationM13 presentation
M13 presentation
 
Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017
 
M1 presentation2
M1 presentation2M1 presentation2
M1 presentation2
 
Parenting the Net Generation - Preview Version
Parenting the Net Generation - Preview VersionParenting the Net Generation - Preview Version
Parenting the Net Generation - Preview Version
 
Misconceptions and mistakes: What if our approach to technology in libraries,...
Misconceptions and mistakes: What if our approach to technology in libraries,...Misconceptions and mistakes: What if our approach to technology in libraries,...
Misconceptions and mistakes: What if our approach to technology in libraries,...
 
Cybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter SchoolCybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter School
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
1. Opportunities and barriers to children's rights in a digital, global age –...
1. Opportunities and barriers to children's rights in a digital, global age –...1. Opportunities and barriers to children's rights in a digital, global age –...
1. Opportunities and barriers to children's rights in a digital, global age –...
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Technology Adoption by Lower Income Populations
Technology Adoption by Lower Income PopulationsTechnology Adoption by Lower Income Populations
Technology Adoption by Lower Income Populations
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
E-patients and their hunt for health information
E-patients and their hunt for health informationE-patients and their hunt for health information
E-patients and their hunt for health information
 
Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social media
 
Jenny dewsnap
Jenny dewsnapJenny dewsnap
Jenny dewsnap
 
Cybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the WorkplaceCybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the Workplace
 

More from Oxford Martin Centre, OII, and Computer Science at the University of Oxford

More from Oxford Martin Centre, OII, and Computer Science at the University of Oxford (20)

5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Dutton power corrupts-2021
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth Estate
 
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
Digital Divides tprc-2019
 
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
 
Future of public broadcasting and a university
Future of public broadcasting and a universityFuture of public broadcasting and a university
Future of public broadcasting and a university
 
Social media realitie lisbon-2018
Social media realitie lisbon-2018Social media realitie lisbon-2018
Social media realitie lisbon-2018
 
Search&politics lisbon-2018
Search&politics lisbon-2018Search&politics lisbon-2018
Search&politics lisbon-2018
 
Internet, Search and Threats to News Ecosystem
Internet, Search and Threats to News EcosystemInternet, Search and Threats to News Ecosystem
Internet, Search and Threats to News Ecosystem
 
Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017
 
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
Search and Politics: Fake News, Echo Chambers and Filter Bubbles july2017
 
Political Transformations in Network Societies - the fifth estate
Political Transformations in Network Societies - the fifth estatePolitical Transformations in Network Societies - the fifth estate
Political Transformations in Network Societies - the fifth estate
 
Tprc cultures-2016
Tprc cultures-2016Tprc cultures-2016
Tprc cultures-2016
 
5th power shift-melbourne-2016
5th power shift-melbourne-20165th power shift-melbourne-2016
5th power shift-melbourne-2016
 

Recently uploaded

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 

Recently uploaded (20)

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 

25SEP2022 WFH Slides.pptx

  • 1. NetWORK: How is the Internet enabling change in the post-pandemic workplace? Evidence and Themes from Exploratory Research William Dutton and Patricia Esteve-González Oxford’s Global Cybersecurity Capacity Centre (GCSCC)
  • 2. Cybersecurity Across Workplaces: Exploratory Research In-depth Interviews with cybersecurity and IT officers at major institutions, businesses, communication firms, and universities* Global survey of over 7K adults, 18 & over, about their perceptions, attitudes and beliefs about working from home and cybersecurity * Bispham, M., Creese, S., Dutton, W. H., Esteve-Gonzalez, P., and Goldsmith, M. (2021), 'Cybersecurity in Working from Home: An Exploratory Study’, presented at TPRC49, 22-24 September 2021. Available at: https://ssrn.com/abstract=3897380
  • 3. The Changing Nature of Work: Post-Pandemic Exploratory Survey of the Impact of the Pandemic on Work and Cybersecurity Global Centre for Cybersecurity Capacity Building (GCSC), University of Oxford in collaboration with GrapeData GrapeData: “Pioneers in developing … market research platform with global coverage” An exploratory online global survey of adults [in the field presently]
  • 4. Survey on Cybersecurity across Workplaces • An Exploratory Research Project • William Dutton, Patricia Esteve-González, Ioannis Agrafiotis, Sadie Creese, and Michael Goldsmith • Global Cybersecurity Capacity Centre (GCSCC)
  • 5. Survey and Respondents Globally Distributed Demographically Diverse but Young Technically Skilled but Very Mobile Reliant
  • 6. The Global Survey with Grape Data • Focused on cybersecurity and the respondent’s workplace(s) • In the field from 22 June- 2 September 2022 • 7,330 respondents, but not a random sample • Respondents recruited and vetted • 133 countries • Limitations: evolving trends, perceptions, limits of recall • Exploratory study
  • 7. Global Distribution of Respondents (by Residence) 10% 25% 28% 8% 19% 3% 6% 1% East Asia and Pacific Europe and Central Asia Latin America and the Caribbean Middle East and North Africa North America South Asia Sub-Saharan Africa Prefer not to answer
  • 8. Demographics • Young: 86 percent between 18 and 44 years of age • Gender: balanced with 50 percent identifying as male • Majority of participants (55%) live with at least one child • Living in big cities (40%), medium sized cities (26%), small city or town (18%), … with only 3 percent on a farm or home in a rural area • Marital Status: 45 percent single, 29 percent married, … • 11 percent with a master’s or doctoral degree, the modal category is high school (36%) followed by a bachelor’s degree (30%)
  • 9. Employment Status 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Don't know Other categories Retired Unemployed Student Working part time Working full time
  • 10. Internet Access • Access to Internet at Home: 47% broadband sub; 70% smartphone • Devices: Mainly smartphone, followed by laptop • 43% of participants use smartphone as the only way to access Internet at home • 87% of participants have at least one desktop or laptop computer at home • 48 percent say they are skilled online, using the internet independently and people come to them for help on how to use it • The pandemic did not lead most (58%) to adopt new software or apps • About half (47%) use the internet “almost constantly”, with another 46 percent using it “many times a day” • 70 percent have a reliable connection at home, with 21 percent saying they have “occasional problems connecting at home” • 70 percent of those with connection at home describe it as “fast enough to do things I do online”
  • 11. Pre- and Post-Pandemic Workplaces Graphic from ‘How the pandemic will shape the workplace trends of 2021’ scx2.b-cdn.net
  • 12. Controversy Surrounding the Workplace Elon Musk: come into work, or … “pretend to work somewhere else”
  • 13. John Thornhill editorial in Financial Times* “… the Covid pandemic has permanently changed the world of work.” *Thornhill, J. (2022), ‘What this tech bubble got right’, Financial Times, 23 September: 25.
  • 14. Workplace: Current* 0% 5% 10% 15% 20% 25% 30% 35% 40% Decentralized Work Center Hybrid Office/Uni Home * Only those respondents working or studying
  • 15. Working From Home* 0% 10% 20% 30% 40% 50% 60% 70% Currently During the pandemic Before the pandemic * Only those participants working or studying
  • 16. Number in Household Working from Home 0% 5% 10% 15% 20% 25% 30% 35% Don't know None One Two Three More than 3
  • 17. Do You Need Internet Access to Work/Study? 0% 5% 10% 15% 20% 25% 30% 35% 40% Don't know Never Rarely Minority Most Tasks Can’t Do Without
  • 18. Working from Office or University* 0% 10% 20% 30% 40% 50% 60% Currently During the pandemic Before the pandemic * Only those participants working or studying
  • 19. Working in Flexible or Hybrid Office Context* 0% 5% 10% 15% 20% 25% 30% Currently During the pandemic Before the pandemic * Only those participants working or studying
  • 20. Working in Decentralized Workplace* 0% 1% 2% 3% 4% 5% 6% 7% 8% 9% Currently During the pandemic Before the pandemic * Only those participants working or studying
  • 21. Change in Workplaces Through the Pandemic* 0% 10% 20% 30% 40% 50% 60% 70% Decentralized Work Center Hybrid Office/Uni Home Currently During the pandemic Before the pandemic * Only those participants working or studying
  • 22. Beliefs and Attitudes toward the Workplace 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Prefer outside home Prefer Hybrid Prefer WFH Satisfied online systems Possible to WFH
  • 23. “I am more productive” 0% 10% 20% 30% 40% 50% 60% 70% WFH Office Decentral DK N/A
  • 25. “I get more distractions” 0% 5% 10% 15% 20% 25% 30% 35% 40% WFH Office Decentral DK N/A
  • 26. “I lose touch with people important to work” 0% 5% 10% 15% 20% 25% 30% 35% 40% WFH Office Decentral DK N/A
  • 27. “I have too many problems with communication” 0% 5% 10% 15% 20% 25% 30% 35% 40% WFH Office Decentral DK N/A
  • 28. “I experience many problems with technology” 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% WFH Office Decentral DK N/A
  • 30. “Security is a problem” 0% 5% 10% 15% 20% 25% 30% 35% 40% WFH Office Decentral DK N/A
  • 31. “Privacy is a problem” 0% 5% 10% 15% 20% 25% 30% 35% WFH Office Decentral DK N/A
  • 32. “I haven’t faced any cybersecurity problems” 0% 5% 10% 15% 20% 25% 30% 35% Currently During the pandemic Before the pandemic
  • 33. “Did you experience more cybersecurity problems before, during, or after the pandemic?” 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% I don't know More before the pandemic More after the pandemic (currently) No difference More during the pandemic
  • 34. Cybersecurity Problems: Currently 0% 5% 10% 15% 20% 25% 30% 35% Computer or other digital device stolen Been a victim of online identity theft Lost data that was on my computer or other device Been harassed or bullied online Tricked into providing personal information online Personal data or passwords stolen or hacked Saw unsolicited cruel or hateful comments or images online Believed someone accessed your social network or e-mail account… Tricked into opening a fraudulent message or attachment Been a victim of a scam or fraud online Received a virus, spyware or other malicious software Received obscene or abusive e-mails
  • 35. Cybersecurity Problems: During the Pandemic 0% 5% 10% 15% 20% 25% 30% Computer or other digital device stolen Lost data that was on my computer or other device Been a victim of online identity theft Tricked into providing personal information online Been harassed or bullied online Personal data or passwords stolen or hacked Saw unsolicited cruel or hateful comments or images online Believed someone accessed your social network or e-mail account… Tricked into opening a fraudulent message or attachment Been a victim of a scam or fraud online Received a virus, spyware or other malicious software Received obscene or abusive e-mails
  • 36. Cybersecurity Problems: Before the Pandemic 0% 5% 10% 15% 20% 25% Computer or other digital device stolen Been a victim of online identity theft Lost data that was on my computer or other device Tricked into providing personal information online Been harassed or bullied online Personal data or passwords stolen or hacked Been a victim of a scam or fraud online Believed someone accessed your social network or e-mail account… Saw unsolicited cruel or hateful comments or images online Tricked into opening a fraudulent message or attachment Received a virus, spyware or other malicious software Received obscene or abusive e-mails
  • 37. Current Cybersecurity Problems “Received obscene or abusive e-mails” “Received a virus, spyware or other malicious software in your computer” “I have been a victim of a scam or fraud online” “Tricked into opening a fraudulent message, attachment” “Believed someone accessed your social network or e-mail account without your permission” “Saw unsolicited cruel or hateful comments or images online”
  • 38. Change in Top Cybersecurity Problems 0% 5% 10% 15% 20% 25% 30% 35% Received obscene or abusive e-mails Received a virus, spyware or other malicious software Been a victim of a scam or fraud online Tricked into opening a fraudulent message or attachment Believed someone accessed your social network or e-mail … Saw unsolicited cruel or hateful comments or images online Currently During the pandemic Before the pandemic
  • 39. Change in Lesser Cybersecurity Problems 0% 5% 10% 15% 20% 25% 30% Personal data or passwords stolen or hacked Tricked into providing personal information online Been harassed or bullied online Lost data that was on my computer or other device Been a victim of online identity theft Computer or other digital device stolen Currently During the pandemic Before the pandemic
  • 40. When More Problems Were Perceived 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% I don't know More before the pandemic More after the pandemic (currently) No difference More during the pandemic
  • 41. Percent Who Disagree in their Effectiveness 0% 5% 10% 15% 20% 25% 30% 35% Being careful to avoid phishing and scam e-mails Checking the authenticity of people who contact you online Not visiting websites that look suspicious Using two- or multi-factor authentication Carefully managing your passwords Keeping operating systems and software up to date Using secure networks when connecting to the Internet Not sharing personal information on social media Using strong passwords Blocking pop-up ads Using licenced (not pirated) software Managing records of your Internet use like "cookies" Sharing virtual meetings URL securely Using a sliding webcam cover Keeping family members away from work devices
  • 42. Did You Start Taking More Protective Measures since the Pandemic? 0% 10% 20% 30% 40% 50% 60% 70% 80% Don’t know No Yes
  • 43. Devices Used when Working from Home 0% 10% 20% 30% 40% 50% 60% Don’t know Devices provided by your employer A mix of corporate and personal devices Only personal devices
  • 44. What Employer Does 0% 10% 20% 30% 40% 50% 60% 70% Provides a corporate Virtual Private Network (VPN) for… Makes corporate applications accessible to you only via… Provides multifactor authentification Provides a securely configured device, such as a laptop Provides training on good cybersecurity practices for staff Provides secure videoconferencing software Provides corporate centralised sotrage solutions and… Has me use software that is pre-approved by the… Has policies on working from home or remotely Has clear policies for responding to any security incidents… Provides antivirus software Provides you access to IT support
  • 45. What Employer Does Not Do 0% 5% 10% 15% 20% 25% 30% 35% Provides you access to IT support Has clear policies for responding to any security incidents… Has policies on working from home or remotely Has me use software that is pre-approved by the… Provides corporate centralised sotrage solutions and… Provides secure videoconferencing software Provides antivirus software Provides multifactor authentification Provides training on good cybersecurity practices for staff Makes corporate applications accessible to you only via… Provides a securely configured device, such as a laptop Provides a corporate Virtual Private Network (VPN) for…
  • 46. Did Your Employer Start Taking More Protective Measures since the Pandemic? 0% 10% 20% 30% 40% 50% 60% Don’t know No Yes
  • 47. Organizational Perspectives 79 percent believe the organization in which they work is open to new ideas and innovation 51 percent see their organization focused on results, compared with 41 percent focused more on how work is done
  • 48. What is the policy of your organization? 0% 10% 20% 30% 40% 50% 60% Don't know N/A Permit WFH or on Move Office Allow hybrid
  • 49. Some General Patterns and Themes Workplace is a matter of contention – divided opinions WFH has risen in practice and preferences Pandemic accelerated WFH, despite bounce back Pandemic hit office work but also decentralized workplaces People prefer a Hybrid Workplace or WFH WFH seen as productive but lonely, distracting & out of touch Office work seen as less productive but in touch and social Most organizations remain flexible at present
  • 50. THANK YOU: Questions or Comments? • Exploratory Study, perceptions, and not a random sample from which to generalize specific percentages, etc. • Conceptions of the workplace are broadening but facing uncertainty • Cybersecurity perceived to be a somewhat growing problem by users, but … • Work can be done in households and hybrid work contexts • Has security enabled more flexibility?