Study: U.S. residents at risk for online exploitation
Almost half couldn't identify 'phishing' e-mail scams
IDG News Service - U.S. Internet users are dangerously ignorant about the type of data that Web site owners collect from them and how that data is used, according to a new study by the University of Pennsylvania's Annenberg Public Policy Center.
The lack of awareness makes U.S. Internet users vulnerable to online exploitation, such as misuse of personal information, fraud and overcharging, the study said.
Titled "Open to Exploitation: American Shoppers Online and Offline," the study was released today (download PDF). It involved 1,500 adult U.S. Internet users who were asked true-or-false questions about topics such as Web site privacy policies and retailers' pricing schemes. Respondents on average failed the test, answering on average fewer than 7 out of 17 questions correctly.
Interviews for the study, conducted between early February and mid-March, yielded some findings that the authors consider alarming. Those findings include:
- Almost half of the respondents, 49%, couldn't identify "phishing" scam e-mail messages, which information thieves dress up to look as though they come from a legitimate company, such as a bank or store, to lure users to enter sensitive information. Requested information might include Social Security numbers, passwords and bank account numbers.
- Sixty-two percent of respondents didn't know that an online store can simultaneously charge different prices for the same item based on information it has on different shoppers, a practice that can make users into victims of what study authors call "price discrimination."
To address the problems identified by the study, the Annenberg Public Policy Center proposed three measures:
- Consumer education and media literacy should be taught in elementary, middle and high schools in the U.S.
- By government decree, online retailers should disclose what data they have collected about customers, as well as when and how they will use that data.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts