Consumer Perspectives on Internet Governance: Challenging Some Conventional Wisdom Beau Brendler, Director Consumer Reports WebWatch 101 Truman Avenue.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Top 10 Checklist to Protect Your Personal Privacy Online Teens 1.
Managing Online Identity References: Prepared for Trustworthy Computing Group, Microsoft by Cross-Tab Marketing Services.
Methodology Conducted from March 16 – 22, 2006
Registrar experiences with WHOIS Bruce Tonkin Melbourne IT Ltd.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Consumers & Online Privacy: Agenda Background and objectives General attitudes to the internet Attitudes to online data and privacy Attitudes to.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
On-Line Database Placement Application Tutorial. How to Change Your Information On York’s System.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
E-Commerce: Regulatory, Ethical, and Social Environments
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Certificate Authority Security Council (CASC) 2015 Consumer Trust Survey.
How It Applies In A Virtual World
Internet safety By Lydia Snowden.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Internet Marketing. What is Marketing? n The strategies and actions firms take to establish a relationship with a consumer and encourage purchases of.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Delight QuickBooks Online Banking Internal Support Training QuickBooks Windows 2009/2010 Online Banking.
Yoshives Belizaire 5/2/12 E-Commerce. Introduction My E-Commerce initiative I intend to make a service were you can listen and download all type of music.
Marketing Systems Group Southern California MRA Education Seminar Presentation September 17, 2005 Privacy and Current Issues.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Web-site Design Strategy.  For P4, learners are required to design a website for LocalBiz - Manningham, this is for a specified purpose and a defined.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
EMembership Survey Results Preliminary: 8/20/2003.
Getting Started!. Before you register A valid address Course ID from your instructor - something like Student access code – comes with your text,
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
3.4 Internet Strand 3 Sara Liquori. 3.4 Internet  A global computer network providing a variety of information and communication facilities, consisting.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Introduction to Bank Accounts. Questions? Why do some people choose not have a bank account? What are some advantages to having a bank account? What is.
Staying Secure Online How do we buy and sell safely on the Internet?
Behavioral Advertising Privacy, Consumer Attitudes and Best Practices Carolyn Hodge, VP of Communications, TRUSTe David W. Stark CIPP, VP & North America.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
TAKE CHARGE OF YOUR FINANCES Submitted by- Ankita Pabale WRO ONLINE BANKING.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
 In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet.
YOUR TEEN AND SOCIAL MEDIA INFORMATION FOR PARENTS ON SOCIAL MEDIA, INCLUDING SAFETY TIPS AND HOW TO HELP YOUR YOUNG TEEN NAVIGATE THE ONLINE WORLD. A.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
TYLER GROUP
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
Shopping online tips Presented by: Wala Al-Zahrani
Internet Identity, Safety, & Security
How do we buy and sell on the Internet safely?
Payment Instruments, Financial Privacy and Online Purchases
Legal and Ethical Issues in E-Commerce
Do’s & Don'ts: Online Shopping
Importance of Privacy Internet Safety
How to Protect your Identity Online PIYUSH HARSH
E-Commerce: Regulatory, Ethical, and Social Environments
Information Security Session October 24, 2005
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Innovation and the online payment realm A market study
CYBERSAFETY & Personal information
Internet Safety – Social Media
The Dark Side of the Internet
Presentation transcript:

Consumer Perspectives on Internet Governance: Challenging Some Conventional Wisdom Beau Brendler, Director Consumer Reports WebWatch 101 Truman Avenue Yonkers, New York

Current Perspectives on Internet Governance: Key Issues Free Speech Interoperability/open systems Multiculturalism/diversity Connectivity

New Survey Data WebWatch Survey, Conducted by CRNRC in May 2008 Data is from a sample of 2,008 total respondents selected to represent 3 geographic areas of New York state: New York City metro area (8 counties; 49 percent of all respondents), Long Island (2 counties; 14 percent), and other counties of the state (37 percent). All data PRELIMINARY

About New York State Demographically Interesting! Third largest U.S. state, with largest U.S. city (NYC) Total population about 19,306,183 Sixteenth largest economy in world (S. Korea 15 th ) Second largest Korean population in U.S. (90,896 in 2000, or about the size of Korean city of Namwon Large rural population Politically conservative in North, liberal in NYC

Consumers or Registrants? Have you ever registered a domain name (i.e., a website address such as on the Internet? (select one) 1 Yes 16 2 No 86

Privacy Concerns Did you choose an option to protect your personal identity when you registered the domain name, or did you give your full name and address? 1 Yes, I chose a privacy option for free 35 2 Yes, I paid a fee for a privacy option 12 3 No, I did not choose a privacy option 33 4 Unsure 20

Using WHOIS Have you ever used the WHOIS database to find out the name of a Web site’s registered owner? 1 Yes, found the information I was looking for 8 2 Yes, but I could not find the information 2 3 No, but I was aware I could do this 8 4 No, and I was not aware this was possible 68 5 Don’t know/not sure 13

Privacy Actions We want to ask you about privacy concerns online. In the past 12 months, have you done any of the following? Deleted cookies from your Web browser 53 Changed your preferences on a Web site where you shop to "opt out" of third-party data sharing 22 Withheld information from your profile on a social networking site in order to make it inaccessible 21 Changed your account information on a Web site to limit the amount of personal information the site keeps about you 15 Set your Web browser not to accept cookies 15 Created a special credit card number to be used only for online transactions 8 None of the above 32

Consumer Concerns (WebWatch data) Safety, security, stability Scams, spyware, spam 21 percent in U.S. don’t use security measures (Consumer Reports magazine 2006) 30 percent changed Internet behavior to use it less out of security and fraud concerns (WebWatch data 2005)