SlideShare a Scribd company logo
1 of 45
Attitudes to Cybersafety and 
Online Privacy in the Middle East 
September 2014
Topicality
Are user concerns universal? 
US data 2014 
UK consumers 
2013
World Economic Forum Report 
• 5,400 adult Internet users 
• 13 countries 
“Findings from this study show that 
a global Internet culture has 
emerged as users across countries 
often share similar viewpoints 
and habits related to these vital 
matters pertaining to the Internet.”
What we did - and how we did it
Areas of study 
1. Usage of ICT and the Internet in the region 
2. Attitudes towards the Internet 
3. Concerns about safety in cyberspace 
4. Trust in different online actors 
5. Behaviors online
Methodology 
• Online survey of existing Internet users. 
• ictQATAR worked with the Oxford Internet Institute in 
collaboration with Cornell University. 
• Fieldwork by comScore and Toluna.
Countries covered 
Algeria 
Egypt 
Morocco 
Tunisia 
Iraq Jordan 
UAE 
Yemen 
Iran 
Oman 
Saudi Arabia 
Qatar 
Kuwait 
Bahrain 
MENA sample = 2,793 
* Results from 14 countries
Research sample 
• Global sample = 8,442 
* Results from 44 countries 
• Total Sample = 11,225 
* Covers 58 countries
5 KEY DIFFERENCES 
MENA VS GLOBAL
MENA VS Global 
1. MENA users are less likely to shop or bank online. 
2. Higher perception in MENA that “the Internet is making 
things better for people like me.” (49% vs. 39%) 
3. Higher desire for Government role re harmful content. 
4. Less worried about safety of personal online content. 
5. Strongly against data repurposing.
3 KEY DIFFERENCES 
GCC VS NORTH AFRICA
GCC VS North Africa 
1. GCC: more likely to access the Internet on the move. 
2. GCC: greater access to technologies like tablets (70% 
vs. 33%) and gaming machines (62% vs. 36%). 
3. North Africa: stronger sense that personal data 
put online is kept safe (22% vs. 15%).
1. TECHNOLOGY AND THE INTERNET
MENA households full of technology
VoIP is highly prevalent 
The region has some of the highest take-up of video and voice 
calls over the Internet.
2. ATTITUDES TOWARDS THE INTERNET
Generally, attitudes were… 
• Positive: Belief that the Internet brings benefits to people. 
• Safeness: Divided views on how safe the Internet is. 
• Government: Higher demand for Government to regulate, 
censor and protect Internet users from harmful content.
Higher belief in MENA that the 
Internet is “making things better”
Harmful content: Protecting Children
“Discriminatory” or “Racist” content
3. LEVELS OF CONCERN
Areas of concern 
High concerns about: 
• Being Hacked 
• Misled by false information 
• Reputation damage 
Lower concerns about: 
• Being monitored online 
• Data collection
Concerns around data repurposing
4. TRUST IN ONLINE PLAYERS
Trust in Different Online Players 
Higher trust in… 
Entities who are “offline first” 
• Mobile and telephone providers 
• Government authorities 
• Banks and financial institutions 
• Health and medical providers 
Lower trust in… 
Entities that are “online first” 
• Social networking websites 
• Online search engines 
• Online websites and newspapers 
• Online marketers and advertisers
Trust Index
5. BEHAVIOR
Inconsistency in claimed 
behaviors and actions 
SAY 
they are safety-conscious 
ACT 
safety-conscious 
Behaviors and Attitudes are not always aligned. 
Examples of potentially reckless behavior in MENA: 
• More likely: to open attachments from people they don’t know. 
• Less likely: to scan their computers/devices for viruses. 
• More likely: to “Friend” people they don’t know .
Research takeaways
Recap: 5 top-level MENA findings 
1. Broad equivalency - access to technology compared to global averages. 
2. MENA Internet users more likely to agree that “the Internet is making 
things better for people like me” compared to the world average. 
3. They are also more supportive of the idea that Government 
authorities should block harmful content than users elsewhere. 
4. Amongst different online players; banks and financial institutions in 
the region enjoy the highest levels of trust. 
5. MENA Internet users are among the most likely to open attachments, 
documents and emails from senders they do not know.
What happens next?
These issues are not going to go away…
New tech = new challenges
7 out of 10 fear security 
implications of Internet of Things 
2014 study of 1,800 consumers between the ages of 20 and 50 
who claim to be tech savvy in 11 countries, including the United States, 
Australia, China, Germany, India, and the United Kingdom.
Wearable Tech
Drones
Privacy entrepreneurship: 
Sell personal data for $8 a month 
Some start-ups allow you to sell your data 
and they then sell it on to companies.
New solutions to aid privacy 
Blackphone: Encrypted 
telephony and messaging, 
protected contact info, data 
storage encryption option. 
Confide: 
Chat app 
allows self-destructive 
messages and 
screenshot 
protection.
Taking matters into your own hands
Some ways we highlight issues 
Safespace.qa 
Training 
Workshops
Ongoing Rassed research projects 
Stay tuned… 
– How Children in Qatar use ICT 
– Understanding emerging social media platforms 
– Exploring online shopping usage in Qatar
Thank you for listening 
QUESTIONS? 
Get your copies! 
Email: rassed@ict.gov.qa

More Related Content

What's hot

Accenture mobile-web-watch-internet-usage-survey-2012
Accenture mobile-web-watch-internet-usage-survey-2012Accenture mobile-web-watch-internet-usage-survey-2012
Accenture mobile-web-watch-internet-usage-survey-2012
ruttens.com
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Akshay Sinha
 

What's hot (17)

Features and impact of technology
Features and impact of technologyFeatures and impact of technology
Features and impact of technology
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
776 s0005
776 s0005776 s0005
776 s0005
 
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumActiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
 
Accenture mobile-web-watch-internet-usage-survey-2012
Accenture mobile-web-watch-internet-usage-survey-2012Accenture mobile-web-watch-internet-usage-survey-2012
Accenture mobile-web-watch-internet-usage-survey-2012
 
Middle East Digital Digest Sept/Oct 2012
Middle East Digital Digest Sept/Oct 2012Middle East Digital Digest Sept/Oct 2012
Middle East Digital Digest Sept/Oct 2012
 
Positive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile DevicesPositive Use of Internet and Mobile Devices
Positive Use of Internet and Mobile Devices
 
Mobile Media Privacy
Mobile Media PrivacyMobile Media Privacy
Mobile Media Privacy
 
Singapore's regulation of cybercrime
Singapore's regulation of cybercrimeSingapore's regulation of cybercrime
Singapore's regulation of cybercrime
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
PAN CIPA Requirements
PAN CIPA RequirementsPAN CIPA Requirements
PAN CIPA Requirements
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Youth of Turkey online
Youth of Turkey onlineYouth of Turkey online
Youth of Turkey online
 
Youth of Turkey Online
Youth of Turkey OnlineYouth of Turkey Online
Youth of Turkey Online
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
 

Similar to Attitudes to Cybersafety and Online Privacy in the Middle East

Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
Mohamed Omar
 
Parent meeting
Parent meetingParent meeting
Parent meeting
lightb
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 

Similar to Attitudes to Cybersafety and Online Privacy in the Middle East (20)

Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Attitudes to online Privacy and Security
Attitudes to online Privacy and SecurityAttitudes to online Privacy and Security
Attitudes to online Privacy and Security
 
Apps and Young Users.pptx
Apps and Young Users.pptxApps and Young Users.pptx
Apps and Young Users.pptx
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdf
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Reliability_Undesirability
Reliability_UndesirabilityReliability_Undesirability
Reliability_Undesirability
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
CYP E-Safety
CYP E-SafetyCYP E-Safety
CYP E-Safety
 
Where next for mobile in the Middle East?
Where next for mobile in the Middle East?Where next for mobile in the Middle East?
Where next for mobile in the Middle East?
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Panel 5
Panel 5Panel 5
Panel 5
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 

More from MOTC Qatar

إنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثإنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالث
MOTC Qatar
 
الملخص الرقمي الربع الاخير 2014
الملخص الرقمي  الربع الاخير   2014 الملخص الرقمي  الربع الاخير   2014
الملخص الرقمي الربع الاخير 2014
MOTC Qatar
 
Digital Digest Q4 2014
Digital Digest Q4 2014Digital Digest Q4 2014
Digital Digest Q4 2014
MOTC Qatar
 

More from MOTC Qatar (20)

منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015منتدى قطر للتجارة الإلكترونية 2015
منتدى قطر للتجارة الإلكترونية 2015
 
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية Qatar Digital Government 2014-2015 حكومة قطر الرقمية
Qatar Digital Government 2014-2015 حكومة قطر الرقمية
 
إنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالثإنفوجرافيك الملخص الرقمي، الربع الثالث
إنفوجرافيك الملخص الرقمي، الربع الثالث
 
Digital Digest Q3 Infographic
Digital Digest Q3 InfographicDigital Digest Q3 Infographic
Digital Digest Q3 Infographic
 
الملخص الرقمي الربع الاخير 2014
الملخص الرقمي  الربع الاخير   2014 الملخص الرقمي  الربع الاخير   2014
الملخص الرقمي الربع الاخير 2014
 
Digital Digest Q4 2014
Digital Digest Q4 2014Digital Digest Q4 2014
Digital Digest Q4 2014
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014
 
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية البيانات الضخمة: 10 استخدامات حالية و مستقبلية
البيانات الضخمة: 10 استخدامات حالية و مستقبلية
 
How Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social media
 
عشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعادعشراستخدامات للطباعة ثلاثية الأبعاد
عشراستخدامات للطباعة ثلاثية الأبعاد
 
10 ways people are using 3D printing
10 ways people are using 3D printing10 ways people are using 3D printing
10 ways people are using 3D printing
 
Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)Digital Digest Q3 2014 (English)
Digital Digest Q3 2014 (English)
 
الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014الملخص الرقمي - الربع الثالث 2014
الملخص الرقمي - الربع الثالث 2014
 
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا... التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
التقرير الكامل: مواقف مستخدمي الإنترنت في منطقة الشرق الأوسط حيال السلامة وا...
 
عشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديدعشر تقنيات للعام الدراسي الجديد
عشر تقنيات للعام الدراسي الجديد
 
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
إنفوجرافيك: الملخص الرقمي الربع 2 لعام 2014
 
عشر ابتكارات في مجال التجارة الالكترونية
 عشر ابتكارات في مجال التجارة الالكترونية عشر ابتكارات في مجال التجارة الالكترونية
عشر ابتكارات في مجال التجارة الالكترونية
 
Tech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerceTech Top 10s: Innovations in e commerce
Tech Top 10s: Innovations in e commerce
 
Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"Tech Top 10... Innovations for "Social Good"
Tech Top 10... Innovations for "Social Good"
 
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
عشر ابتكارات تكنولوجية في مجال الأعمال الخيرية
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 

Attitudes to Cybersafety and Online Privacy in the Middle East

  • 1. Attitudes to Cybersafety and Online Privacy in the Middle East September 2014
  • 3. Are user concerns universal? US data 2014 UK consumers 2013
  • 4. World Economic Forum Report • 5,400 adult Internet users • 13 countries “Findings from this study show that a global Internet culture has emerged as users across countries often share similar viewpoints and habits related to these vital matters pertaining to the Internet.”
  • 5. What we did - and how we did it
  • 6. Areas of study 1. Usage of ICT and the Internet in the region 2. Attitudes towards the Internet 3. Concerns about safety in cyberspace 4. Trust in different online actors 5. Behaviors online
  • 7. Methodology • Online survey of existing Internet users. • ictQATAR worked with the Oxford Internet Institute in collaboration with Cornell University. • Fieldwork by comScore and Toluna.
  • 8. Countries covered Algeria Egypt Morocco Tunisia Iraq Jordan UAE Yemen Iran Oman Saudi Arabia Qatar Kuwait Bahrain MENA sample = 2,793 * Results from 14 countries
  • 9. Research sample • Global sample = 8,442 * Results from 44 countries • Total Sample = 11,225 * Covers 58 countries
  • 10. 5 KEY DIFFERENCES MENA VS GLOBAL
  • 11. MENA VS Global 1. MENA users are less likely to shop or bank online. 2. Higher perception in MENA that “the Internet is making things better for people like me.” (49% vs. 39%) 3. Higher desire for Government role re harmful content. 4. Less worried about safety of personal online content. 5. Strongly against data repurposing.
  • 12. 3 KEY DIFFERENCES GCC VS NORTH AFRICA
  • 13. GCC VS North Africa 1. GCC: more likely to access the Internet on the move. 2. GCC: greater access to technologies like tablets (70% vs. 33%) and gaming machines (62% vs. 36%). 3. North Africa: stronger sense that personal data put online is kept safe (22% vs. 15%).
  • 14. 1. TECHNOLOGY AND THE INTERNET
  • 15. MENA households full of technology
  • 16. VoIP is highly prevalent The region has some of the highest take-up of video and voice calls over the Internet.
  • 17. 2. ATTITUDES TOWARDS THE INTERNET
  • 18. Generally, attitudes were… • Positive: Belief that the Internet brings benefits to people. • Safeness: Divided views on how safe the Internet is. • Government: Higher demand for Government to regulate, censor and protect Internet users from harmful content.
  • 19. Higher belief in MENA that the Internet is “making things better”
  • 22. 3. LEVELS OF CONCERN
  • 23. Areas of concern High concerns about: • Being Hacked • Misled by false information • Reputation damage Lower concerns about: • Being monitored online • Data collection
  • 24. Concerns around data repurposing
  • 25. 4. TRUST IN ONLINE PLAYERS
  • 26. Trust in Different Online Players Higher trust in… Entities who are “offline first” • Mobile and telephone providers • Government authorities • Banks and financial institutions • Health and medical providers Lower trust in… Entities that are “online first” • Social networking websites • Online search engines • Online websites and newspapers • Online marketers and advertisers
  • 29. Inconsistency in claimed behaviors and actions SAY they are safety-conscious ACT safety-conscious Behaviors and Attitudes are not always aligned. Examples of potentially reckless behavior in MENA: • More likely: to open attachments from people they don’t know. • Less likely: to scan their computers/devices for viruses. • More likely: to “Friend” people they don’t know .
  • 31. Recap: 5 top-level MENA findings 1. Broad equivalency - access to technology compared to global averages. 2. MENA Internet users more likely to agree that “the Internet is making things better for people like me” compared to the world average. 3. They are also more supportive of the idea that Government authorities should block harmful content than users elsewhere. 4. Amongst different online players; banks and financial institutions in the region enjoy the highest levels of trust. 5. MENA Internet users are among the most likely to open attachments, documents and emails from senders they do not know.
  • 33. These issues are not going to go away…
  • 34. New tech = new challenges
  • 35. 7 out of 10 fear security implications of Internet of Things 2014 study of 1,800 consumers between the ages of 20 and 50 who claim to be tech savvy in 11 countries, including the United States, Australia, China, Germany, India, and the United Kingdom.
  • 38.
  • 39.
  • 40. Privacy entrepreneurship: Sell personal data for $8 a month Some start-ups allow you to sell your data and they then sell it on to companies.
  • 41. New solutions to aid privacy Blackphone: Encrypted telephony and messaging, protected contact info, data storage encryption option. Confide: Chat app allows self-destructive messages and screenshot protection.
  • 42. Taking matters into your own hands
  • 43. Some ways we highlight issues Safespace.qa Training Workshops
  • 44. Ongoing Rassed research projects Stay tuned… – How Children in Qatar use ICT – Understanding emerging social media platforms – Exploring online shopping usage in Qatar
  • 45. Thank you for listening QUESTIONS? Get your copies! Email: rassed@ict.gov.qa

Editor's Notes

  1. http://cdn.slashgear.com/wp-content/uploads/2014/07/fb-820x4201.jpg http://i.dailymail.co.uk/i/pix/2014/07/03/article-2678561-1F58F0DC00000578-816_634x394.jpg http://image-cdn.zap2it.com/photogallery/images/zap-jennifer-lawrence-pictures-034 http://www.foxnews.com/world/2014/09/14/digital-jihad-isis-al-qaeda-seek-cyber-caliphate-to-launch-attacks-on-us/ http://gulfnews.com/business/general/millions-of-android-smartphones-at-risk-of-hacking-in-middle-east-1.1374833 http://bits.blogs.nytimes.com/2014/09/04/apple-says-it-will-add-new-security-measures-after-celebrity-hack/?_php=true&_type=blogs&_r=0
  2. http://www.statista.com/chart/2663/when-americans-worry-about-online-privacy/ https://econsultancy.com/blog/63600-stats-internet-privacy-and-responsibility-among-consumers#i.1r28s7u6rxcw2v
  3. http://www.redorbit.com/media/uploads/2014/03/internet-thinkstock-179504580-617x416.jpg
  4. http://www.truste.com/blog/wp-content/uploads/the-internet-of-things.jpg
  5. http://www.fortinet.com/press_releases/2014/internet-of-things.html http://www.techrepublic.com/article/7-out-of-10-fear-security-implications-of-internet-of-things/
  6. http://blog.laptopmag.com/wpress/wp-content/uploads/2013/03/5-Point-Cafe-google-glass-m.jpg http://www.techloon.com/wp-content/uploads/2014/02/glass-hole-2-622x349.jpg http://stopthecyborgs.files.wordpress.com/2013/05/google-glass-ban.png
  7. http://www.airpano.ru/files/bolotnaya_2.jpg
  8. http://www.stuckincustoms.com/2014/06/19/dji-quadcopter-china-detention
  9. http://www.stuckincustoms.com/2014/06/19/dji-quadcopter-china-detention
  10. http://www.technologyreview.com/news/529686/how-much-is-your-privacy-worth/?curator=MediaREDEF
  11. Sources: http://techcrunch.com/2014/02/26/close-look-at-blackphone/?curator=MediaREDEF And https://getconfide.com/
  12. http://www.cnet.com/news/beware-google-amazon-delivery-drones-unintended-consequences/