SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
Social Networking at Work

Survey Results
Methodology
• Survey performed on Zoomerang
  – Fielded online
  – 346 responses
  – Taken by US-based employees
Social networking at work
                      Q1: On average, how many times per day do you access social
                       networking sites such as Facebook or YouTube from work?
                0%             10%              20%          30%                 40%   50%



           0                                                               37%




        1-2                                                          34%




        3-5                               16%




       6 - 10                 8%




      11 - 20        2%




More than 20         2%
Reasons for social networking at work



       Q2: What percentage of the time you spend accessing social
       networks while at work is for each of the following? (Must
       add to 100%) Means shown.
       Business reasons                                    53.334%
       Personal reasons                                    46.178%
Devices used



       Q3: Considering the full amount of time you spend daily
       accessing social networks while at work, please indicate what
       percentage of that time is done via each of these devices.
       (Must add to 100%) Means shown.
       Desktop or laptop computer                            75.24%
       Company mobile device                                   8.26%
       Personal mobile device                                15.22%
       Other                                                   1.38%
Work policies
                 Q4: What best describes your company's policy concerning accessing
                                  social networking sites at work?
                                                                          0%              10%         20%   30%     40%         50%


                                                     Access is blocked               5%



                      Access blocked, access granted only in rare cases         2%



Access blocked, access granted to those who have been through training     0%



   Access blocked, access granted upon request -- there are many users         1%



                        No blocking, but they specify business use only                                           36%



                                      No blocking, no policy about use                                                    42%



               No blocking, policy exists that encourages employee use                          14%
How important?
                  Q5: If a company had a ban on accessing social networks from the
                 workplace, how relevant would that ban be when deciding whether or
                                    not to work for the company?
                                          0%   10%         20%           30%         40%   50%



 Significantly relevant to my decision               12%




  Somewhat relevant to my decision                           20%




                               Neutral                             22%




 Somewhat irrelevant to my decision                  12%




Significantly irrelevant to my decision                                        34%
Company presence
               Q6: Does a company's presence in social networks impact how you feel
               about the company's brand? For example, if they have a Facebook page
                                         or use Twitter.
                                                                  0%        10%     20%   30%     40%         50%



Significantly impacts my opinion of a company in a positive way                   16%




  Somewhat impacts my opinion of a company in a positive way                                    36%




                                                       Neutral                                          45%




 Somewhat impacts my opinion of a company in a negative way            1%




Significantly impacts my opinion of a company in a negative way        1%
Work breaks



      Q7: How many times a day do you take the following breaks?
                                  Mean              Median
      Snack or coffee     2.016               2
      Smoking             0.346               0
      Restroom            2.842               2
      Social Networking   1.714               1
Facebook or no?
                Q8: Answer the following scenario: You have 5 minutes until your next
                  meeting and need to use the restroom, but you haven't checked
                           Facebook all day. You do one of the following:
                                                                               0%          20%   40%   60%   80%         100%




                                                        Go to the restroom                                         87%




                                        Cross your legs and check Facebook          2%




Bring your mobile device to the restroom with you to kill two birds with one
                                                                                         11%
                                                                       stone
Industry
                                      What industry do you work in?
                            0%        20%          40%          60%   80%         100%

Technology and Software                                                     82%
                                 4%
                Services        3%
                               2%
             Agriculture      1%
                              1%
     Consumer Products        1%
                              1%
              Education       1%
                              1%
               Insurance      1%
                              1%
    Telecommunications        1%
                             0%
             Automotive      0%
                             0%
     Cable and Wireless      0%
                             0%
            Credit Cards     0%
                             0%
          Entertainment      0%
                             0%
  Hospitality and Leisure    0%
                             0%
              Non-Profit     0%
                             0%
               Research      0%
                             0%
         Transportation      0%
Job function
                                                What is your job function/role?
                         0%                    10%               20%         30%   40%   50%


     Senior Executive          2%


       Vice President         1%


             Director                     7%


             Manager                                                         29%


           Supervisor               4%


       Associate/Staff                                                 24%


           Technician                                      13%


       Administrative          2%


Contractor/Consultant                    6%


               Intern         1%


Other, please describe                               11%
Company size
                                          What is the size of your organization?
                           0%               20%            40%            60%         80%   100%



   Less than 500 people                       19%




    500 to 1,000 people         3%




   1,001 to 5,000 people         5%




  5,001 to 25,000 people                                                        61%




25,001 to 75,000 people              6%




More than 75,000 people              6%
Gender
                  What is your gender?


         Female
          21%




                                         Male
                                         79%
Age
                                       What is your age?
            0%                   10%     20%               30%   40%   50%

Under 18     0%

  18 - 25             3%

  26 - 30                              18%

  31 - 35                                    20%

  36 - 40                                      21%

  41 - 45                              18%

  46 - 50                        9%

  51 - 55                   6%

  56 - 60              4%

  61 - 65    0%

  66 - 70    0%

 Over 70         1%

Más contenido relacionado

La actualidad más candente

Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec
 
Jobvite Social Recruiting Survey
Jobvite Social Recruiting SurveyJobvite Social Recruiting Survey
Jobvite Social Recruiting SurveyGabe Teperow
 
2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobviteglennmanko
 
NE League of Municipalities Sept. 2012
NE League of Municipalities Sept. 2012NE League of Municipalities Sept. 2012
NE League of Municipalities Sept. 2012jcejka2
 
Alfresco Community Survey 2012 Results
Alfresco Community Survey 2012 ResultsAlfresco Community Survey 2012 Results
Alfresco Community Survey 2012 ResultsJeff Potts
 
Réseaux sociaux et Réputation - Enquête Deloitte
Réseaux sociaux et Réputation - Enquête DeloitteRéseaux sociaux et Réputation - Enquête Deloitte
Réseaux sociaux et Réputation - Enquête DeloitteAref Jdey
 
Social Media aroud the World in One Day at STIMA Trends Night
Social Media aroud the World in One Day at STIMA Trends NightSocial Media aroud the World in One Day at STIMA Trends Night
Social Media aroud the World in One Day at STIMA Trends NightInSites on Stage
 
Deloitte 2009 Ethics Workplace Survey
Deloitte 2009 Ethics Workplace SurveyDeloitte 2009 Ethics Workplace Survey
Deloitte 2009 Ethics Workplace SurveyElizabeth Lupfer
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec
 

La actualidad más candente (10)

Symantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global ResultsSymantec 2011 Threat Management Survey Global Results
Symantec 2011 Threat Management Survey Global Results
 
Jobvite Social Recruiting Survey
Jobvite Social Recruiting SurveyJobvite Social Recruiting Survey
Jobvite Social Recruiting Survey
 
2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite2011 Social Recruiting Survey From Jobvite
2011 Social Recruiting Survey From Jobvite
 
NE League of Municipalities Sept. 2012
NE League of Municipalities Sept. 2012NE League of Municipalities Sept. 2012
NE League of Municipalities Sept. 2012
 
Alfresco Community Survey 2012 Results
Alfresco Community Survey 2012 ResultsAlfresco Community Survey 2012 Results
Alfresco Community Survey 2012 Results
 
Réseaux sociaux et Réputation - Enquête Deloitte
Réseaux sociaux et Réputation - Enquête DeloitteRéseaux sociaux et Réputation - Enquête Deloitte
Réseaux sociaux et Réputation - Enquête Deloitte
 
Social Media aroud the World in One Day at STIMA Trends Night
Social Media aroud the World in One Day at STIMA Trends NightSocial Media aroud the World in One Day at STIMA Trends Night
Social Media aroud the World in One Day at STIMA Trends Night
 
Deloitte 2009 Ethics Workplace Survey
Deloitte 2009 Ethics Workplace SurveyDeloitte 2009 Ethics Workplace Survey
Deloitte 2009 Ethics Workplace Survey
 
XING for Universities
XING for UniversitiesXING for Universities
XING for Universities
 
Symantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery StudySymantec 2010 Disaster Recovery Study
Symantec 2010 Disaster Recovery Study
 

Destacado

Social Media Marketing Intro for Symantec Partners
Social Media Marketing Intro for Symantec PartnersSocial Media Marketing Intro for Symantec Partners
Social Media Marketing Intro for Symantec PartnersSymantec
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Case study: How Symantec built engagement through design
Case study: How Symantec built engagement through designCase study: How Symantec built engagement through design
Case study: How Symantec built engagement through designQuarry
 

Destacado (6)

Social Media Marketing Intro for Symantec Partners
Social Media Marketing Intro for Symantec PartnersSocial Media Marketing Intro for Symantec Partners
Social Media Marketing Intro for Symantec Partners
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Case study: How Symantec built engagement through design
Case study: How Symantec built engagement through designCase study: How Symantec built engagement through design
Case study: How Symantec built engagement through design
 

Similar a Social Networking while at Work - July 2010

201206 IASA Session 673 - Mining Social Data
201206 IASA Session 673 - Mining Social Data201206 IASA Session 673 - Mining Social Data
201206 IASA Session 673 - Mining Social DataSteven Callahan
 
NOVA Social Media Study
NOVA Social Media StudyNOVA Social Media Study
NOVA Social Media Studybwresearch
 
NOVA Social Media Study
NOVA Social Media StudyNOVA Social Media Study
NOVA Social Media Studybwresearch
 
NOVA Social Media Study
NOVA Social Media StudyNOVA Social Media Study
NOVA Social Media Studybwresearch
 
Consumer Awareness of Privacy Issues on the Internet [Report]
Consumer Awareness of Privacy Issues on the Internet [Report]Consumer Awareness of Privacy Issues on the Internet [Report]
Consumer Awareness of Privacy Issues on the Internet [Report]Social Samosa
 
Federal Employees Are Turning to Mobile Devices for Work
Federal Employees Are Turning to Mobile Devices for WorkFederal Employees Are Turning to Mobile Devices for Work
Federal Employees Are Turning to Mobile Devices for WorkBluetext
 
Moments survey results - Ventura Lab
Moments survey results - Ventura LabMoments survey results - Ventura Lab
Moments survey results - Ventura LabMike Sousa
 
Economia desarrollo
Economia desarrolloEconomia desarrollo
Economia desarrollovedrunam17
 
Social Media In Economic Development
Social Media In Economic DevelopmentSocial Media In Economic Development
Social Media In Economic DevelopmentJTuquero
 
Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]
Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]
Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]Litmus
 
Whitemyer Advertising- AEM Integrated Marketing Communications Presentation
Whitemyer Advertising- AEM Integrated Marketing Communications PresentationWhitemyer Advertising- AEM Integrated Marketing Communications Presentation
Whitemyer Advertising- AEM Integrated Marketing Communications PresentationWhitemyer Advertising, Inc.
 
CharityComms Digital Comms Snapshot 2011
CharityComms Digital Comms Snapshot 2011CharityComms Digital Comms Snapshot 2011
CharityComms Digital Comms Snapshot 2011CharityComms
 

Similar a Social Networking while at Work - July 2010 (20)

201206 IASA Session 673 - Mining Social Data
201206 IASA Session 673 - Mining Social Data201206 IASA Session 673 - Mining Social Data
201206 IASA Session 673 - Mining Social Data
 
Senior Executive Social Networking Survey ( November 2009)
Senior  Executive    Social  Networking  Survey ( November 2009)Senior  Executive    Social  Networking  Survey ( November 2009)
Senior Executive Social Networking Survey ( November 2009)
 
NOVA Social Media Study
NOVA Social Media StudyNOVA Social Media Study
NOVA Social Media Study
 
NOVA Social Media Study
NOVA Social Media StudyNOVA Social Media Study
NOVA Social Media Study
 
NOVA Social Media Study
NOVA Social Media StudyNOVA Social Media Study
NOVA Social Media Study
 
Consumer Awareness of Privacy Issues on the Internet [Report]
Consumer Awareness of Privacy Issues on the Internet [Report]Consumer Awareness of Privacy Issues on the Internet [Report]
Consumer Awareness of Privacy Issues on the Internet [Report]
 
Federal Employees Are Turning to Mobile Devices for Work
Federal Employees Are Turning to Mobile Devices for WorkFederal Employees Are Turning to Mobile Devices for Work
Federal Employees Are Turning to Mobile Devices for Work
 
Socialmediaintegration
SocialmediaintegrationSocialmediaintegration
Socialmediaintegration
 
Social Media Integration Survey
Social Media Integration SurveySocial Media Integration Survey
Social Media Integration Survey
 
Moments survey results - Ventura Lab
Moments survey results - Ventura LabMoments survey results - Ventura Lab
Moments survey results - Ventura Lab
 
What's Your Business Grade?
What's Your Business Grade?What's Your Business Grade?
What's Your Business Grade?
 
Social Behavior
Social BehaviorSocial Behavior
Social Behavior
 
Economia desarrollo
Economia desarrolloEconomia desarrollo
Economia desarrollo
 
Social Media In Economic Development
Social Media In Economic DevelopmentSocial Media In Economic Development
Social Media In Economic Development
 
Social Behavior
Social BehaviorSocial Behavior
Social Behavior
 
Hotel e businesssurveyreport2010-0
Hotel e businesssurveyreport2010-0Hotel e businesssurveyreport2010-0
Hotel e businesssurveyreport2010-0
 
Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]
Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]
Mobile-Friendly Email: Trends and Best Practices [Webinar with ActOn Software]
 
Upwardly mobile
Upwardly mobileUpwardly mobile
Upwardly mobile
 
Whitemyer Advertising- AEM Integrated Marketing Communications Presentation
Whitemyer Advertising- AEM Integrated Marketing Communications PresentationWhitemyer Advertising- AEM Integrated Marketing Communications Presentation
Whitemyer Advertising- AEM Integrated Marketing Communications Presentation
 
CharityComms Digital Comms Snapshot 2011
CharityComms Digital Comms Snapshot 2011CharityComms Digital Comms Snapshot 2011
CharityComms Digital Comms Snapshot 2011
 

Más de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Social Networking while at Work - July 2010

  • 1. Social Networking at Work Survey Results
  • 2. Methodology • Survey performed on Zoomerang – Fielded online – 346 responses – Taken by US-based employees
  • 3. Social networking at work Q1: On average, how many times per day do you access social networking sites such as Facebook or YouTube from work? 0% 10% 20% 30% 40% 50% 0 37% 1-2 34% 3-5 16% 6 - 10 8% 11 - 20 2% More than 20 2%
  • 4. Reasons for social networking at work Q2: What percentage of the time you spend accessing social networks while at work is for each of the following? (Must add to 100%) Means shown. Business reasons 53.334% Personal reasons 46.178%
  • 5. Devices used Q3: Considering the full amount of time you spend daily accessing social networks while at work, please indicate what percentage of that time is done via each of these devices. (Must add to 100%) Means shown. Desktop or laptop computer 75.24% Company mobile device 8.26% Personal mobile device 15.22% Other 1.38%
  • 6. Work policies Q4: What best describes your company's policy concerning accessing social networking sites at work? 0% 10% 20% 30% 40% 50% Access is blocked 5% Access blocked, access granted only in rare cases 2% Access blocked, access granted to those who have been through training 0% Access blocked, access granted upon request -- there are many users 1% No blocking, but they specify business use only 36% No blocking, no policy about use 42% No blocking, policy exists that encourages employee use 14%
  • 7. How important? Q5: If a company had a ban on accessing social networks from the workplace, how relevant would that ban be when deciding whether or not to work for the company? 0% 10% 20% 30% 40% 50% Significantly relevant to my decision 12% Somewhat relevant to my decision 20% Neutral 22% Somewhat irrelevant to my decision 12% Significantly irrelevant to my decision 34%
  • 8. Company presence Q6: Does a company's presence in social networks impact how you feel about the company's brand? For example, if they have a Facebook page or use Twitter. 0% 10% 20% 30% 40% 50% Significantly impacts my opinion of a company in a positive way 16% Somewhat impacts my opinion of a company in a positive way 36% Neutral 45% Somewhat impacts my opinion of a company in a negative way 1% Significantly impacts my opinion of a company in a negative way 1%
  • 9. Work breaks Q7: How many times a day do you take the following breaks? Mean Median Snack or coffee 2.016 2 Smoking 0.346 0 Restroom 2.842 2 Social Networking 1.714 1
  • 10. Facebook or no? Q8: Answer the following scenario: You have 5 minutes until your next meeting and need to use the restroom, but you haven't checked Facebook all day. You do one of the following: 0% 20% 40% 60% 80% 100% Go to the restroom 87% Cross your legs and check Facebook 2% Bring your mobile device to the restroom with you to kill two birds with one 11% stone
  • 11. Industry What industry do you work in? 0% 20% 40% 60% 80% 100% Technology and Software 82% 4% Services 3% 2% Agriculture 1% 1% Consumer Products 1% 1% Education 1% 1% Insurance 1% 1% Telecommunications 1% 0% Automotive 0% 0% Cable and Wireless 0% 0% Credit Cards 0% 0% Entertainment 0% 0% Hospitality and Leisure 0% 0% Non-Profit 0% 0% Research 0% 0% Transportation 0%
  • 12. Job function What is your job function/role? 0% 10% 20% 30% 40% 50% Senior Executive 2% Vice President 1% Director 7% Manager 29% Supervisor 4% Associate/Staff 24% Technician 13% Administrative 2% Contractor/Consultant 6% Intern 1% Other, please describe 11%
  • 13. Company size What is the size of your organization? 0% 20% 40% 60% 80% 100% Less than 500 people 19% 500 to 1,000 people 3% 1,001 to 5,000 people 5% 5,001 to 25,000 people 61% 25,001 to 75,000 people 6% More than 75,000 people 6%
  • 14. Gender What is your gender? Female 21% Male 79%
  • 15. Age What is your age? 0% 10% 20% 30% 40% 50% Under 18 0% 18 - 25 3% 26 - 30 18% 31 - 35 20% 36 - 40 21% 41 - 45 18% 46 - 50 9% 51 - 55 6% 56 - 60 4% 61 - 65 0% 66 - 70 0% Over 70 1%