Click here to close now.

Welcome!

Web 2.0 Authors: Ian Khan, Klaus Enzenhofer, Carmen Gonzalez, Plutora Blog, Lori MacVittie

News Feed Item

AVG Technologies Study Reveals Social Media Stokes Workplace Privacy Fears

More than half of adults (53 percent) believe privacy in the workplace has been eroded with the proliferation of social media, reveals AVG Technologies’ latest Digital Diaries study, Digital Work Life. The seventh installment in AVG’s Digital Diaries series includes responses from 4,000 adults in ten countries in relation to cyberbullying in the workplace.

The study found that the misuse of social media has infiltrated the workplace with often negative effects on employees’ privacy, forcing many to switch off or limit their use of social networking sites. One in ten respondents discovered secret discussions about them online were initiated by colleagues using social media, and 11 percent have had embarrassing photos or videos taken at a work event and uploaded onto social media sites. This is as high as 19 percent in Spain and 14 percent in the UK. A small number of all adults (6 percent) even found themselves subjected to unwanted romantic advances through online media, and in the US this number rose to one in ten of all adults.

As the use of social media increases for both personal and professional purposes, the privacy many workers value and expect is slowly diminishing through employee misuse and cyberbullying. To prevent personal information from being circulated at work, many adults are turning away from social media altogether. Of those who agreed social media has eroded their privacy at work, nearly a quarter (24 percent) now avoid posting on social networks that have caused them privacy concerns, while 23 percent limit their posts. More than half (53 percent) are more careful about what they post.

Tony Anscombe, AVG’s Senior Security Evangelist, said: “This study highlights the need for a combination of greater education around social media alongside stricter enforcement of the accompanying standards for social media etiquette at work. And we’re not just talking about employees here; employers can trip themselves up just as easily when managing the company’s own social media presence. Until everyone is clear about exactly what is and isn’t acceptable online behavior, trying to enforce policies will just fail, leaving the door open to cyberbullying and invasion of privacy. If organizations take the time to first educate before establishing and enforcing policies, privacy can be protected in the workplace without having to sacrifice any of the social activity we all enjoy.”

Jenny Ungless, an independent HR Consultant and life coach, commented on the findings: “While you can’t completely control what people say about you online, you can control the ‘ammunition’ they have against you. Being more careful about your posts on social networks or ensuring your privacy settings protect your personal information are just a few steps you can take. The research shows adults are now finding themselves in unchartered territory when it comes to social media in the workplace. Having to ward off colleagues’ romantic advances online, suffer the embarrassment of unwanted personal photos seen by colleagues or have personal details from social networks used against you, are all things that adults haven’t typically had to deal with. We often talk about bringing work home with us, yet little has been done to date to tackle our home-life now being taken into the office and the possible implications of this.”

Other key findings include:

  • Forms of cyberbullying: Four out of five (82 percent) adults believe that sending unpleasant or defamatory remarks to or about a colleague using digital communications constitutes cyberbullying (93 percent in UK and New Zealand). Other forms of cyberbullying include posting negative comments on a social media site about a colleague’s appearance at a work event (79 percent) and criticizing a colleague behind their back through email, instant messaging, social media or SMS (69 percent).
  • Incriminating or embarrassing activity online: Nearly one in ten (nine percent) adults has had a manager use information against them or a colleague which has been found on a social media site. This is highest in the US (13 percent) and Czech Republic (12 percent).
  • Cyberbullying driving workplace confrontations: Cyberbullying can easily spill over into heated debates in the workplace with more than half (51 percent) of adults admitting they would confront colleagues in person if they felt they were the victim of cyberbullying. This is as high as 65 percent in Germany, 56 percent in France and 54 percent in the Czech Republic. One in 10 (11 percent) would retaliate to cyberbullying through digital communication.
  • Cyberbullying policies: A quarter of adults (25 percent) are not protected from cyberbullying as workplaces do not cover this within existing policies. Only 37 percent of all adults know of a comprehensive policy, which covers cyberbullying, in the workplace. This is highest in Australia (57 percent) and the UK (51 percent) and lowest in France (20 percent) and Germany (23 percent).
  • Social media responsibility: Half of all adults (50 percent) believe their company is responsible for the online behavior of employees during work hours if they are using their personal social media accounts. Sentiment is felt strongest in Canada (63 percent) and the US (61 percent) while only 27 percent of Germans agree with this. Outside of work hours, only 16 percent of all adults agree that companies are responsible for employees’ online behavior.

About AVG Digital Diaries

The first stage of AVG’s Digital Diaries campaign, Digital Birth, focused on children from birth to age two. The study, released in October 2010, found that on average, infants acquire a digital identity by the age of six months old. Nearly a quarter (23 percent) of children have had their pre-birth scans uploaded to the Internet by their parent – establishing a digital footprint even before birth. The second stage, Digital Skills, was released in January 2011 and showed that for two to five year olds, ‘tech’ skills are increasingly replacing ‘life’ skills. In fact, many toddlers could use a mouse and play a computer game, but could not ride a bike, swim or tie their shoelaces.

Digital Playground, released in June 2011, found nearly half of six to nine year olds talk to friends online and use social networks. This was followed with Digital Maturity in November 2011, which revealed how 11 year olds had developed adult skills in technology. Digital Coming of Age, the fifth installment of AVG’s Digital Diaries study was released in April 2012, which interviewed parents of 14-17 year olds, found that nearly half of parents keep tabs on teens via Facebook, latest AVG Technologies’ research reveals.

Digital Baggage - released in October 2012 delved further into the theme of social media usage. Research, which involved interviews with 18-25 year olds about their online habits, found that one quarter were Facebook friends with their boss - which could potentially damage their career prospects.

The seventh installment, Digital Work Life, examines cyberbullying and privacy in the workplace with 4,000 workers surveyed across ten countries: UK, US, Australia, New Zealand, Canada, France, Germany, Italy, Spain and Czech Republic. More than half of the respondents revealed that the misuse of social media has eroded privacy in the workplace.

Research for all stages of the Digital Diaries series was conducted by Research Now on behalf of AVG Technologies.

More information visit: www.avgdigitaldiaries.com

About AVG Technologies (NYSE: AVG)

AVG's mission is to simplify, optimize and secure the Internet experience, providing peace of mind to a connected world. AVG's powerful yet easy-to-use software and online services put users in control of their Internet experience. By choosing AVG's software and services, users become part of a trusted global community that benefits from inherent network effects, mutual protection and support. AVG has grown its user base to 143 million active users as of September 30, 2012 and offers a product portfolio that targets the consumer and small business markets and includes Internet security, PC performance optimization, online backup, mobile security, identity protection and family safety software.

www.avg.com

http://mediacenter.avg.com

Keep in touch with AVG

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, representing a model of how to analyze rea...
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed expressly to run Docker. He will also discuss Rancher, an orchestration and service discovery platf...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes for use cases across the industrial, enterprise, and consumer segments.
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
CommVault has announced that top industry technology visionaries have joined its leadership team. The addition of leaders from companies such as Oracle, SAP, Microsoft, Cisco, PwC and EMC signals the continuation of CommVault Next, the company's business transformation for sales, go-to-market strategies, pricing and packaging and technology innovation. The company also announced that it had realigned its structure to create business units to more directly match how customers evaluate, deploy, operate, and purchase technology.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along with a steady stream of well-publicized data breaches, only add to the uncertainty
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add scalable realtime functionality with minimal effort and cost.”
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness, and in-car entertainment and this excitement will bleed into other areas. On the commercial side, m...
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
Every innovation or invention was originally a daydream. You like to imagine a “what-if” scenario. And with all the attention being paid to the so-called Internet of Things (IoT) you don’t have to stretch the imagination too much to see how this may impact commercial and homeowners insurance. We’re beyond the point of accepting this as a leap of faith. The groundwork is laid. Now it’s just a matter of time. We can thank the inventors of smart thermostats for developing a practical business application that everyone can relate to. Gone are the salad days of smart home apps, the early chalkb...
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics archive, in his session at @ThingsExpo, Jim Kaskade, Vice President and General Manager, Big Data & Ana...
In the consumer IoT, everything is new, and the IT world of bits and bytes holds sway. But industrial and commercial realms encompass operational technology (OT) that has been around for 25 or 50 years. This grittier, pre-IP, more hands-on world has much to gain from Industrial IoT (IIoT) applications and principles. But adding sensors and wireless connectivity won’t work in environments that demand unwavering reliability and performance. In his session at @ThingsExpo, Ron Sege, CEO of Echelon, will discuss how as enterprise IT embraces other IoT-related technology trends, enterprises with i...
When it comes to the Internet of Things, hooking up will get you only so far. If you want customers to commit, you need to go beyond simply connecting products. You need to use the devices themselves to transform how you engage with every customer and how you manage the entire product lifecycle. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, will show how “product relationship management” can help you leverage your connected devices and the data they generate about customer usage and product performance to deliver extremely compelling and reliabl...