Study: U.S. residents at risk for online exploitation
Almost half couldn't identify 'phishing' e-mail scams
IDG News Service - U.S. Internet users are dangerously ignorant about the type of data that Web site owners collect from them and how that data is used, according to a new study by the University of Pennsylvania's Annenberg Public Policy Center.
The lack of awareness makes U.S. Internet users vulnerable to online exploitation, such as misuse of personal information, fraud and overcharging, the study said.
Titled "Open to Exploitation: American Shoppers Online and Offline," the study was released today (download PDF). It involved 1,500 adult U.S. Internet users who were asked true-or-false questions about topics such as Web site privacy policies and retailers' pricing schemes. Respondents on average failed the test, answering on average fewer than 7 out of 17 questions correctly.
Interviews for the study, conducted between early February and mid-March, yielded some findings that the authors consider alarming. Those findings include:
- Almost half of the respondents, 49%, couldn't identify "phishing" scam e-mail messages, which information thieves dress up to look as though they come from a legitimate company, such as a bank or store, to lure users to enter sensitive information. Requested information might include Social Security numbers, passwords and bank account numbers.
- Sixty-two percent of respondents didn't know that an online store can simultaneously charge different prices for the same item based on information it has on different shoppers, a practice that can make users into victims of what study authors call "price discrimination."
To address the problems identified by the study, the Annenberg Public Policy Center proposed three measures:
- Consumer education and media literacy should be taught in elementary, middle and high schools in the U.S.
- By government decree, online retailers should disclose what data they have collected about customers, as well as when and how they will use that data.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!