Agile Computing Authors: Pat Romanski, Kevin Benedict, Carmen Gonzalez, Elizabeth White, John Mertic

News Feed Item

AVG Technologies Study Reveals Social Media Stokes Workplace Privacy Fears

More than half of adults (53 percent) believe privacy in the workplace has been eroded with the proliferation of social media, reveals AVG Technologies’ latest Digital Diaries study, Digital Work Life. The seventh installment in AVG’s Digital Diaries series includes responses from 4,000 adults in ten countries in relation to cyberbullying in the workplace.

The study found that the misuse of social media has infiltrated the workplace with often negative effects on employees’ privacy, forcing many to switch off or limit their use of social networking sites. One in ten respondents discovered secret discussions about them online were initiated by colleagues using social media, and 11 percent have had embarrassing photos or videos taken at a work event and uploaded onto social media sites. This is as high as 19 percent in Spain and 14 percent in the UK. A small number of all adults (6 percent) even found themselves subjected to unwanted romantic advances through online media, and in the US this number rose to one in ten of all adults.

As the use of social media increases for both personal and professional purposes, the privacy many workers value and expect is slowly diminishing through employee misuse and cyberbullying. To prevent personal information from being circulated at work, many adults are turning away from social media altogether. Of those who agreed social media has eroded their privacy at work, nearly a quarter (24 percent) now avoid posting on social networks that have caused them privacy concerns, while 23 percent limit their posts. More than half (53 percent) are more careful about what they post.

Tony Anscombe, AVG’s Senior Security Evangelist, said: “This study highlights the need for a combination of greater education around social media alongside stricter enforcement of the accompanying standards for social media etiquette at work. And we’re not just talking about employees here; employers can trip themselves up just as easily when managing the company’s own social media presence. Until everyone is clear about exactly what is and isn’t acceptable online behavior, trying to enforce policies will just fail, leaving the door open to cyberbullying and invasion of privacy. If organizations take the time to first educate before establishing and enforcing policies, privacy can be protected in the workplace without having to sacrifice any of the social activity we all enjoy.”

Jenny Ungless, an independent HR Consultant and life coach, commented on the findings: “While you can’t completely control what people say about you online, you can control the ‘ammunition’ they have against you. Being more careful about your posts on social networks or ensuring your privacy settings protect your personal information are just a few steps you can take. The research shows adults are now finding themselves in unchartered territory when it comes to social media in the workplace. Having to ward off colleagues’ romantic advances online, suffer the embarrassment of unwanted personal photos seen by colleagues or have personal details from social networks used against you, are all things that adults haven’t typically had to deal with. We often talk about bringing work home with us, yet little has been done to date to tackle our home-life now being taken into the office and the possible implications of this.”

Other key findings include:

  • Forms of cyberbullying: Four out of five (82 percent) adults believe that sending unpleasant or defamatory remarks to or about a colleague using digital communications constitutes cyberbullying (93 percent in UK and New Zealand). Other forms of cyberbullying include posting negative comments on a social media site about a colleague’s appearance at a work event (79 percent) and criticizing a colleague behind their back through email, instant messaging, social media or SMS (69 percent).
  • Incriminating or embarrassing activity online: Nearly one in ten (nine percent) adults has had a manager use information against them or a colleague which has been found on a social media site. This is highest in the US (13 percent) and Czech Republic (12 percent).
  • Cyberbullying driving workplace confrontations: Cyberbullying can easily spill over into heated debates in the workplace with more than half (51 percent) of adults admitting they would confront colleagues in person if they felt they were the victim of cyberbullying. This is as high as 65 percent in Germany, 56 percent in France and 54 percent in the Czech Republic. One in 10 (11 percent) would retaliate to cyberbullying through digital communication.
  • Cyberbullying policies: A quarter of adults (25 percent) are not protected from cyberbullying as workplaces do not cover this within existing policies. Only 37 percent of all adults know of a comprehensive policy, which covers cyberbullying, in the workplace. This is highest in Australia (57 percent) and the UK (51 percent) and lowest in France (20 percent) and Germany (23 percent).
  • Social media responsibility: Half of all adults (50 percent) believe their company is responsible for the online behavior of employees during work hours if they are using their personal social media accounts. Sentiment is felt strongest in Canada (63 percent) and the US (61 percent) while only 27 percent of Germans agree with this. Outside of work hours, only 16 percent of all adults agree that companies are responsible for employees’ online behavior.

About AVG Digital Diaries

The first stage of AVG’s Digital Diaries campaign, Digital Birth, focused on children from birth to age two. The study, released in October 2010, found that on average, infants acquire a digital identity by the age of six months old. Nearly a quarter (23 percent) of children have had their pre-birth scans uploaded to the Internet by their parent – establishing a digital footprint even before birth. The second stage, Digital Skills, was released in January 2011 and showed that for two to five year olds, ‘tech’ skills are increasingly replacing ‘life’ skills. In fact, many toddlers could use a mouse and play a computer game, but could not ride a bike, swim or tie their shoelaces.

Digital Playground, released in June 2011, found nearly half of six to nine year olds talk to friends online and use social networks. This was followed with Digital Maturity in November 2011, which revealed how 11 year olds had developed adult skills in technology. Digital Coming of Age, the fifth installment of AVG’s Digital Diaries study was released in April 2012, which interviewed parents of 14-17 year olds, found that nearly half of parents keep tabs on teens via Facebook, latest AVG Technologies’ research reveals.

Digital Baggage - released in October 2012 delved further into the theme of social media usage. Research, which involved interviews with 18-25 year olds about their online habits, found that one quarter were Facebook friends with their boss - which could potentially damage their career prospects.

The seventh installment, Digital Work Life, examines cyberbullying and privacy in the workplace with 4,000 workers surveyed across ten countries: UK, US, Australia, New Zealand, Canada, France, Germany, Italy, Spain and Czech Republic. More than half of the respondents revealed that the misuse of social media has eroded privacy in the workplace.

Research for all stages of the Digital Diaries series was conducted by Research Now on behalf of AVG Technologies.

More information visit: www.avgdigitaldiaries.com

About AVG Technologies (NYSE: AVG)

AVG's mission is to simplify, optimize and secure the Internet experience, providing peace of mind to a connected world. AVG's powerful yet easy-to-use software and online services put users in control of their Internet experience. By choosing AVG's software and services, users become part of a trusted global community that benefits from inherent network effects, mutual protection and support. AVG has grown its user base to 143 million active users as of September 30, 2012 and offers a product portfolio that targets the consumer and small business markets and includes Internet security, PC performance optimization, online backup, mobile security, identity protection and family safety software.



Keep in touch with AVG

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
The Quantified Economy represents the total global addressable market (TAM) for IoT that, according to a recent IDC report, will grow to an unprecedented $1.3 trillion by 2019. With this the third wave of the Internet-global proliferation of connected devices, appliances and sensors is poised to take off in 2016. In his session at @ThingsExpo, David McLauchlan, CEO and co-founder of Buddy Platform, discussed how the ability to access and analyze the massive volume of streaming data from millio...
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, will draw together recent research and lessons learned from emerging and established ...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here