Reality Check; Consumer Attitudes to Voice Biometrics

Size: px
Start display at page:

Download "Reality Check; Consumer Attitudes to Voice Biometrics"

Transcription

1 Reality Check; Consumer Attitudes to Voice Biometrics Under the guidance of Professor Michael McTear, Head of Research, Voice Authentication, University of Ulster 1

2 UK Survey of Telephone Banking Users Market Research by SpeechStorm 1. Executive Summary SpeechStorm conducted a research project in May 2008 to better understand consumer perceptions of voice biometric technology (also known as voice authentication) in relation to telephone banking. This research provides insight for organisations interested in learning more about consumer attitudes towards voice biometrics, in particular online banking providers and financial services organisations. The research is very timely given the recent public scandals relating to the loss of personal data, such as the loss of 25 million child benefit records by the Revenue and Customs office. As a result, public confidence has been shaken and concerns are rising over the security and privacy of the handling of personal information. SpeechStorm s consumer survey provides an indepth look into how Voice Biometric technology is perceived and understood, its benefits and inhibitors and how consumers are likely to embrace the technology in their day to day lives. Key findings from the research were as follows: Over a third of respondents (34%) agree they would consider moving to an alternative bank if it offered a more secure service such as voice biometrics and 38% would be inclined to join a bank that offered voice biometric security over one that did not. 37% would even be happy to pay a small fee to a bank that is very proactive in securing their personal information. 72% would be happy to receive a call from a speech automated service using voice biometrics as an additional way to prevent security account block 79% would be willing to use voice biometrics in future. 2

3 Table of Contents Background. 4 Methodology. 5 Results 8 Confidence in Telephone Banking Centre. 8 Consumer Attitudes Relating to Telephone Banking Security.. 11 Opinion of Voice Biometrics 16 Consumer Attitudes towards Outbound Anti-Fraud Calls & Future Use of Voice Biometrics.. Related articles and information Guidance Author Contact Details

4 Background Identity theft is one of the UK's fastest growing types of crime and since 1999 has grown by over 500% (source CIFAS). It is estimated that identity theft in the UK costs the British economy 1.7 billion annually (source The Home Office). Currently all telephone based transactions are dependant on knowledge verification from the caller i.e. account number, PIN, Postcode, etc. However once this information is available to a fraudster the financial institution cannot easily discern when a fraudulent transaction is taking place. Organisations across financial services and public sector are now looking at ways that voice biometric technology can help them to combat identity fraudsters. As with any new technology, rates of adoption are slow especially when they are customer facing. It is important that organisations gauge customer feedback relating to voice biometrics, how the technology is perceived and understood, its benefits and inhibitors and how likely they are to embrace the technology in their day to day lives. Identity Theft & Telephony Fraud - The Facts During 2004 one identity theft case occurred every four minutes in the UK - calculated using information from CIFAS 135,000 incidents were reported in source CIFAS On average identity theft normally goes undetected for over a year In cases where a 'total hijack' has occurred, perhaps involving different lenders, it cost the victim up to 400 man-hours and over 8000 before things are back to normal - source CIFAS Dramatic increase in cardholder not present, estimated at 270M in 2007 APAC Research Objectives The research will help retail banking organisations to better understand: 1. The concerns & level of confidence that customers of telephone banking have about their personal information and how it is stored 2. The trust people have in technology over live agents in terms of security 3. Awareness and attitudes towards voice biometrics 4. Opinions towards automated outbound calls using biometric identification 4

5 This research project has been undertaken by SpeechStorm in order to address these questions and provide guidance to those considering these issues. SpeechStorm s interest in this survey is fuelled by its leading role as a specialist provider of speech recognition and voice biometric solutions for contact centres. Methodology SpeechStorm commissioned The Independent Fieldwork Company of Enfield, London ( to carry out face-to-face interviews across a broad sample of respondents from the UK. A total of 100 interviews 1 were conducted during 22 nd and 23 rd May 2008 and lasted approximately 30 minutes each. Questions were mainly quantitative with some qualitative or open ended questions. During the interviews respondents watched a voice biometrics demonstration. Respondents The research took place in two major UK cities Figure 3.1: Region 1 The total sample size was 100 respondents and therefore interpretations of results should be mainly used as indicators. 5

6 Recruitment of respondents was based on their use of telephone banking, demographics, age and gender. Figure 3.2: Gender Figure 3.3: Age 6

7 Recruitment was spread across frequency of use. Figure 3.4: Frequency of Use of Telephone Banking 7

8 4 Results 4.1 Confidence in Telephone Banking Centre 42% of the telephone banking customers surveyed indicate that they are either not confident or not sure about their bank s ability to prevent anyone from accessing their accounts. Nearly half (42%) of all respondents, are not confident about their telephone banking centre s ability to identify fraudulent calls. Two questions were asked about the confidence telephone banking customers had in their telephone banking centre regarding information security. Fast Facts For respondents in this section: 42% indicate that they are not confident or not sure about their bank s ability to prevent anyone from accessing their accounts. 42% of respondents are not confident about their telephone banking centre s ability to identity fraudulent calls. 8

9 Q. How confident are you in your telephone banking centre s ability to prevent anyone accessing your personal information? Figure Almost half (42%) of telephone banking customers are either not confident (18%) or neutral (24%) about their bank s ability to prevent anyone from accessing their accounts. 9

10 Q. How confident are you that your telephone banking centre has the ability to identify fraudulent calls? Figure While a small proportion (13%) is not confident about their telephone banking centre s ability to identify fraudulent calls, another 29% are neutral/not sure. 10

11 4.2 Consumer Attitudes Relating to Telephone Banking Security Respondents were asked a series of questions regarding their opinions and attitudes towards telephone banking security. Q. How concerned are you about identity fraud and misuse of your private information? Figure Fast Facts For respondents in this section: 69% have concerns about identity fraud and misuse of their private information. (74%) confirm they have been more careful about their personal information in the last 12 months compared with the previous 12 months. 61% are concerned about the security of PIN, passwords and secret data when used to confirm ID over the phone with a real agent. Telephone banking customers have clear concerns (69%) about identity fraud and misuse of their private information. However this concern is particularly prevalent amongst year olds. (52% very concerned and 29% concerned) 11

12 Q. How important do you think security is when it comes to your banking transactions done on the phone? Figure % of respondents considered security to be either very important or important for banking transactions done on the phone. 12

13 Q. Do you think that you are being more careful with your personal information now than in the last 12 months? Figure Awareness of the increase of identity theft widely reported in the press may have helped influence respondents to be more vigilant about their security. Nearly three-quarters (74%) of them confirm they have been more careful about their personal information in the last 12 months compared with the previous 12 months. 13

14 Q. How concerned are you about the security of your PIN numbers, passwords or random secret data such as a favourite pet, when they are used to confirm your identity to an organisation over the phone with a real agent versus an automated system? Figure More than half (61%) of the responding telephone banking customers are concerned about the security of PIN, passwords and secret data when used to confirm ID over the phone with a real agent. Only 11% show no concern. 14

15 Q. In relation to telephone banking, do you think that your personal information is more secure using an automated system to handle your PIN & password or speaking to a live agent? Figure A higher percentage of telephone banking customers (41%) believe that their personal information is more secure using an automated system than speaking to a live agent (36%) when handling PIN and passwords. Over half (56%) of the middle age group years think it is more secure with an automated system. 15

16 4.3 Opinion of Voice Biometrics Respondents were shown a brief video demonstration illustrating how voice biometric technology uses a unique voice print to identify a caller in conjunction with a PIN/Password. The respondents were shown two clips. The first demonstrated a customer being identified using their PIN/Password and the second demonstrated an impostor using the same personal details to try and get past the system. To watch the demonstration please visit Fast Facts For respondents in this section: 86% would be happier either using a voice biometrics only or a blend of both voice biometrics and Password/PIN in identifying them for telephone banking transactions. 38% agreed that they would be inclined to join a bank that offered voice biometric security versus one that didn t. 37% agreed they would be happy to pay a small fee to a bank that is very proactive in securing their personal information. 53% agree that they would feel comfortable using voice biometrics if it meant that it would provide tighter security. 16

17 Q. Have you heard of voice biometrics or the concept of using your voice to identify you as a caller? Figure % of respondents had heard of voice biometrics. 17

18 Q. Which would you be happier to use as a means to identify you for telephone banking transactions in the future? Figure % of respondents would be happier to use either voice biometrics (28%) or a blend of both voice biometrics and Password/PIN (58%) in identifying them for telephone banking transactions in future with only 14% selecting PIN/Password only. Among those choosing voice biometrics only, 75% said it would be safer/more secure this way. For those choosing a blend of both, 42% said it would give more security. Respondents were asked to indicate their level of agreement with statements regarding telephone banking including the use of voice biometrics. A range of responses from Strongly Disagree to Strongly Agree were offered. 18

19 Q. I d feel comfortable using a voice biometrics system if it speeded up transactions. Figure Over half (55%) agreed that they would feel comfortable using a voice biometrics system if it speeded up transactions. Agreement is higher with the older age group with 75% of year olds agreeing. 19

20 Q. I would consider moving to an alternative bank if it offered me a more secure service such as voice biometrics Figure Over a third (34%) agreed they would consider moving to an alternative bank if it offered a more secure service such as voice biometrics. This number is significantly high amongst males (48% ) 20

21 Q. I d be inclined to join a bank that offered voice biometric security versus one that didn t. Figure Over a third (38%) agreed that they would be inclined to join a bank that offered voice biometric security versus one that didn t. This view was particularly high amongst year olds (55%) 21

22 Q. Voice biometrics provides an unobtrusive way of protecting my identity. Figure Nearly half (49%) of telephone banking customers agree that voice biometrics provides an unobtrusive way of protecting their identity. This figure was higher amongst year olds (55%) 22

23 Q. I d feel comfortable using voice biometrics if it meant that it would provide tighter security. Figure Over half (53%) agree that they would feel comfortable using voice biometrics if it meant that it would provide tighter security. This figure was particularly high (75%) amongst year olds. 23

24 Q. I d be happy to pay a small fee to a bank that is very proactive in securing my personal information. Figure Over a third (37%) of telephone banking customers agreed they would be happy to pay a small fee to a bank that is very proactive in securing their personal information. Another 17% are neutral/undecided and 46% would not want to pay a fee. Half of year olds would pay. 24

25 4.4 Consumer Attitudes towards Outbound Anti- Fraud Calls & Future Use of Voice Biometrics Q. Have you ever received a call from an anti-fraud department regarding irregular usage patterns i.e. credit card company, bank? Figure Fast Facts For respondents in this section: 60% of respondents received a call for antifraud purposes from a live agent (vs machine) 72% would be happy to receive a call from a speech automated service using voice authentication as an additional way of security 79% of telephone banking customers would be willing to use voice authentication with their banks in future A quarter of telephone banking customers have received a call from an antifraud department. Well over half (60%) of the instances where an anti-fraud department made a call it was from a live agent with very few (12%) from an automated system. 25

26 Interviewees were asked to read the following script that illustrated how an outbound anti-fraud call might sound. You can hear an example at Q. In order to prevent security account blocks would you be happy to receive a call from a speech automated service using voice biometrics (as a secondary verification) as an additional way of security? Figure Nearly three quarters (72%) of telephone banking customers would be happy to receive a call from a speech automated service using voice biometrics as an additional way of security. 26

27 Q. If banks in the future are considering using voice biometrics, how willing are you to use it? Figure A high percentage (79%) of telephone banking customers would be willing to use voice biometrics with their banks in future with only 11% not willing. 27

28 5. Related articles & information e-book: Combating Identity Fraud: How voice biometrics can protect consumer. Recorded Webcast: Speaker Verification & Caller Authentication 6. Guidance Author Michael McTear is Professor of Knowledge Engineering and Coordinator of the Artificial Intelligence Research Group at the University of Ulster. He graduated in German Language and Literature from Queens University Belfast in 1965, was awarded MA in Linguistics at University of Essex in 1975, and a PhD at the University of Ulster in He has been researching in the field of spoken dialogue systems for more than fifteen years, having previously worked in the areas of computational linguistics, user modeling, and knowledge based systems. He is the author of the widely used text book Spoken dialogue technology: toward the conversational user interface (Springer Verlag, 2004), and was a coinvestigator of the EPSRC-funded Queen s Communicator dialogue system. He was the recipient of the Distinguished Senior Research Fellowship of the University of Ulster in He is a member of the Scientific Advisory Group of SIGDial, the ACL/ISCA Special Interest Group for Discourse and Dialogue. 28

29 About Genesys Telecommunications Laboratories, Inc. Genesys, an Alcatel-Lucent company, is the only company that focuses 100 per cent on software to manage customer interactions over the phone, web and in e- mail. The Genesys software suite dynamically connects customers with the right resources self-service or assisted-service to fulfill customer requests, optimise customer care goals and efficiently use resources. Genesys software directs more than 100 million customer interactions every day for 4,000 companies and government agencies in 80 countries. These companies and agencies can leverage their entire organisation, from the contact centre to the back office, to improve the overall customer experience. As a result, Genesys helps stop customer frustration, drive efficiency, and accelerate business innovation. For more information, go to or visit the industry blog at About SpeechStorm SpeechStorm provides speech self-service and voice biometrics solutions that work alongside the contact centre, enabling callers to get what they need, faster and at their own convenience. Using the SpeechStorm inbound and outbound speech solutions suite, contact centres across the world are transforming their customer experience, reducing costs and improving service levels. Organisations including Irish telecoms giant, eircom, Dixons Stores Group, SITA, Northern Ireland Electricity, the National Blood Service and Allied Irish Banks rely on SpeechStorm solutions to underpin their contact centres and to improve the performance of their businesses. Backed by a professional services capability of more than 250 consultants, SpeechStorm is part of Kainos Software Limited. SpeechStorm has offices in the UK and Ireland. For more information please visit the corporate website on 29

30 Contacts For more information regarding the survey please contact SpeechStorm s PR agency: carina@sarumconsultancy.co.uk Jessica Davies Marketing Manager SpeechStorm Phone: +44 (0) j.davies@speechstorm.com Lucille Jackson Marketing Manager Genesys Telecommunications Laboratories-Europe Limited Phone: +44 (0) ljackson@genesyslab.com Professor Michael McTear School of Computing and Mathematics University of Ulster Phone: + 44 (0) mf.mctear@ulster.ac.uk 30

Personal and business current account prompt pilot findings

Personal and business current account prompt pilot findings Personal and business current account prompt pilot findings Report Prepared for The Financial Conduct Authority Registered in London No. 2231083 Accent Marketing & Research Limited Registered Address:

More information

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by

The US Contact Center Decision-Makers Guide Contact Center Performance. sponsored by The US Contact Center Decision-Makers Guide 2013 Contact Center Performance sponsored by INTRODUCTION AND METHODOLOGY The "US Contact Center Decision-Makers' Guide (2013-6 th edition)" is the major annual

More information

Unisys Security Insights: Australia A Consumer Viewpoint 2015

Unisys Security Insights: Australia A Consumer Viewpoint 2015 Unisys Security Insights: Australia A Consumer Viewpoint 2015 How Australian consumers feel about Personal data security, ranked by industry Table of Contents Executive Summary 2 Unisys Outlook 3 Results

More information

Second International Barometer of Security in SMBs

Second International Barometer of Security in SMBs 1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.

More information

CUSTOMER COMMUNICATION PREFERENCES SURVEY. Conducted by Harris Interactive Sponsored by Varolii Corp.

CUSTOMER COMMUNICATION PREFERENCES SURVEY. Conducted by Harris Interactive Sponsored by Varolii Corp. CUSTOMER COMMUNICATION PREFERENCES SURVEY Conducted by Harris Interactive Sponsored by Varolii Corp. CONTENTS Executive Summary... 2 The Survey Data: Communication Fatigue Breeds Contempt... 4 The Great

More information

Mail Findings. Australia Post Consumer Survey. Research into consumer preferences of transactional communications

Mail Findings. Australia Post Consumer Survey. Research into consumer preferences of transactional communications Australia Post Consumer Survey Mail Findings August 2013 Australia Post Consumer Survey Mail Findings Research into consumer preferences of transactional communications Methodology The Australia Post Consumer

More information

The SAPS Johannesburg Area Police Transformation Survey Results

The SAPS Johannesburg Area Police Transformation Survey Results The SAPS Johannesburg Area Police Transformation Survey Results by Gareth Newham Research report written for the Centre for the Study of Violence and Reconciliation, January 2005. Gareth Newham is a former

More information

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers

AUSTRALIA Building Digital Trust with Australian Healthcare Consumers AUSTRALIA Building Digital Trust with Australian Healthcare Consumers Accenture 2017 Consumer Survey on Healthcare Cybersecurity and Digital Trust 2 Consumers in Australia trust healthcare organisations

More information

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT Seungjae Shin, Mississippi State University, 1000 HWY 19N Meridian MS 39307, sshin@meridian.msstate.edu, (601)484-0160 Jerry Cunningham,

More information

Australia. Consumer Survey Mail Findings

Australia. Consumer Survey Mail Findings Australia Post Consumer Survey Mail Findings July 2012 Methodology The Australia Post Consumer Survey measures consumer attitudes and behaviours of interest to Australia Post, particularly mail (letters),

More information

Adobe Security Survey

Adobe Security Survey Adobe Security Survey October 2016 Edelman + Adobe INTRODUCTION Methodology Coinciding with National Cyber Security Awareness Month (NCSAM), Edelman Intelligence, on behalf of Adobe, conducted a nationally

More information

Victim Personal Statements 2017/18

Victim Personal Statements 2017/18 Victim Personal Statements / Analysis of the offer and take-up of Victim Personal Statements using the Crime Survey for England and Wales, April to March. October Foreword A Victim Personal Statement (VPS)

More information

GLOBAL MOBILE PAYMENT METHODS: FIRST HALF 2016

GLOBAL MOBILE PAYMENT METHODS: FIRST HALF 2016 PUBLICATION DATE: OCTOBER 2016 PAGE 2 GENERAL INFORMATION I PAGE 3 KEY FINDINGS I PAGE 4-8 TABLE OF CONTENTS I PAGE 9 REPORT-SPECIFIC SAMPLE CHARTS I PAGE 10 METHODOLOGY I PAGE 11 RELATED REPORTS I PAGE

More information

Consumer Preferences in Narrowband Communications Research Report

Consumer Preferences in Narrowband Communications Research Report Consumer Preferences in Narrowband Communications Research Report Research Document Publication date: 19 March 9 Main Heading Contents Section Page 1 Executive summary 1 2 Methodology 5 3 Market context

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

HOW CANADIANS BANK. Annual tracking study on Canadian attitudes and behaviours towards banking. Prepared for:

HOW CANADIANS BANK. Annual tracking study on Canadian attitudes and behaviours towards banking. Prepared for: HOW CANADIANS BANK Annual tracking study on Canadian attitudes and behaviours towards banking Prepared for: 2016 METHODOLOGY Data collection method Hybrid phone/online survey methodology. 817 interviews

More information

WHAT S DRIVING CITIZENS CYBER INSECURITY?

WHAT S DRIVING CITIZENS CYBER INSECURITY? An Accenture Public Service Pulse Survey revealed that cyber insecurity is pervasive among U.S. citizens: Eight in 10 citizens (79 percent) express concern about the privacy and security of their personal

More information

THE STATE OF ONLINE VIDEO 2017

THE STATE OF ONLINE VIDEO 2017 EXPERIENCE FIRST MARKET RESEARCH THE STATE OF ONLINE VIDEO 2017 The State of Online Video is Limelight Networks latest in a series of surveys that explores consumer perceptions and behaviors around digital

More information

6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore

6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore 6th Annual 15miles/Neustar Localeze Local Search Usage Study Conducted by comscore Consumers are adopting mobile devices of all types at a blistering pace. The demand for information on the go is higher

More information

Global Mobile Consumer Survey, US Edition Overview of results

Global Mobile Consumer Survey, US Edition Overview of results Global Mobile Consumer Survey, US Edition Overview of results Smartphones front and center Mobile phones are still on the rise, in number and importance Smartphone ownership reached 85% (a YoY increase

More information

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand

More information

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia Creating and Protecting Your Online Identity for Job Search Contents 1. Creating a Positive Online Presence... 2 2. Your Digital Tattoo... 3 3. Your Professional Identity... 5 4. Social Media Advice...

More information

2015 User Satisfaction Survey Final report on OHIM s User Satisfaction Survey (USS) conducted in autumn 2015

2015 User Satisfaction Survey Final report on OHIM s User Satisfaction Survey (USS) conducted in autumn 2015 2015 User Satisfaction Survey Final report on OHIM s User Satisfaction Survey (USS) conducted in autumn 2015 Alicante 18 December 2015 Contents 1. INTRODUCTION... 4 SUMMARY OF SURVEY RESULTS... 4 2. METHODOLOGY

More information

VOICE BIOMETRICS. estilo de subtítulo del patrón Solutions

VOICE BIOMETRICS. estilo de subtítulo del patrón Solutions VOICE BIOMETRICS Haga clic Vicorp para modificar Speech el Biometric estilo de subtítulo del patrón Solutions VICORP SPEECH TECHNOLOGY UK based since 1989 with international partners - Specialising in

More information

NANOS SURVEY NANOS SURVEY

NANOS SURVEY NANOS SURVEY Canadians are three times more likely to say Canada should ban than allow Huawei from participating in the 5G network in Canada National survey released August, 2018 Project 2018-1260A Summary Fifty-four

More information

2013 CONSUMER MOBILE INSIGHTS STUDY!

2013 CONSUMER MOBILE INSIGHTS STUDY! 2013 CONSUMER MOBILE INSIGHTS STUDY! Released by Jumio, Inc. & conducted by Harris Interactive 2013 CONSUMER MOBILE INSIGHTS STUDY: KEY FINDINGS & INSIGHTS! 83% of respondents worry about identity theft

More information

Mobile calls to 13 numbers Research report JULY 2014

Mobile calls to 13 numbers Research report JULY 2014 Mobile calls to 13 numbers Research report JULY 2014 Canberra Red Building Benjamin Offices Chan Street Belconnen ACT PO Box 78 Belconnen ACT 2616 T +61 2 6219 5555 F +61 2 6219 5353 Melbourne Level 32

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

DATA MATCHING IN THE IDENTITY ECOSYSTEM

DATA MATCHING IN THE IDENTITY ECOSYSTEM DATA MATCHING IN THE IDENTITY ECOSYSTEM Increasing Identity Transactions by Enabling Service Providers THE OPEN IDENTITY EXCHANGE REPORT WRITTEN BY EMMA LINDLEY INNOVATE IDENTITY 1 Executive Summary O

More information

Research Digest: Adding value at-destination for the end traveller

Research Digest: Adding value at-destination for the end traveller Research Digest: Adding value at-destination for the end traveller Understanding the business travellers in-trip needs and the mobile services they aspire for. Introduction TNS, on behalf of Amadeus, conducted

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on Bring Your

More information

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Flash Eurobarometer 468. Report. The end of roaming charges one year later

Flash Eurobarometer 468. Report. The end of roaming charges one year later The end of roaming charges one year later Survey requested by the European Commission, Directorate-General for Communications Networks, Content & Technology and co-ordinated by the Directorate-General

More information

2008 NASCIO Recognition Award Nomination

2008 NASCIO Recognition Award Nomination 2008 NASCIO Recognition Award Nomination Category: Information Communications Technology (ICT) Title of Nomination: CORIS Inmate Phone System State: Maine TABLE OF CONTENTS B. EXECUTIVE SUMMARY... 3 C.

More information

National Travel Associates

National Travel Associates National Travel Associates Fraud Prevention Module 2012 National Travel Associates Fraud In The Travel Industry With the popularity of online booking engines in the 90 s there was a huge insurgence of

More information

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114

IJESRT. (I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EVALUATING ISO STANDARDS APPLICATION OF SECURITY REQUIREMENTS OF E- BANKING IN SUDAN Inshirah M. O. Elmaghrabi*, Hoida A. Abdelgadir,

More information

PERCEPTION OF IRELAND AS A DIGITAL ASSET HOSTING LOCATION Surveys Conducted by Host in Ireland

PERCEPTION OF IRELAND AS A DIGITAL ASSET HOSTING LOCATION Surveys Conducted by Host in Ireland JULY- SEPT 2014 PERCEPTION OF IRELAND AS A DIGITAL ASSET HOSTING LOCATION Surveys Conducted by Host in Ireland www.hostinireland.com Table of Contents 3 Executive Summary 3-7 SURVEY: Strategic Opportunities

More information

Research Report: Voice over Internet Protocol (VoIP)

Research Report: Voice over Internet Protocol (VoIP) Research Report: Voice over Internet Protocol (VoIP) Statement Publication date: 26 July 2007 Contents Section Page 1 Executive Summary 1 2 Background and research objectives 3 3 Awareness of VoIP 5 4

More information

Retail. Network IP: Making a difference in UK retail surveillance

Retail. Network IP: Making a difference in UK retail surveillance Retail Network IP: Making a difference in UK retail surveillance The Results Retail sector continues to show strong trend toward migration to network IP The latest annual Centre for Retail Research (CRR)

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+ CompTIA Security Research Study 2007 Trends and Observations on Organizational Security Carol Balkcom, Product Manager, Security+ Goals of this session To share some trends and observations related to

More information

CHAPTER 3 RESEARCH METHODOLOGY OF THE STUDY

CHAPTER 3 RESEARCH METHODOLOGY OF THE STUDY CHAPTER 3 RESEARCH METHODOLOGY OF THE STUDY 3.1 Introduction: In this chapter, an endeavor is made to portray the various aspects of the research methodology adopted for this study purpose. The aim of

More information

Fraud Mobility: Exploitation Patterns and Insights

Fraud Mobility: Exploitation Patterns and Insights WHITEPAPER Fraud Mobility: Exploitation Patterns and Insights September 2015 2 Table of Contents Introduction 3 Study Methodology 4 Once a SSN has been Compromised, it Remains at Risk 4 Victims Remain

More information

GSMA Research into mobile users privacy attitudes. Key findings from Brazil. Conducted by in November 2012

GSMA Research into mobile users privacy attitudes. Key findings from Brazil. Conducted by in November 2012 GSMA Research into mobile users privacy attitudes Key findings from Brazil Conducted by in November 2012 0 Background and objectives Background The GSMA represents the interests of the worldwide mobile

More information

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM 1. Why did ESET Undertake this Report? 2. Report Methodology 3. Key Highlights 4. How Many users in

More information

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA 1 SECURING DIGITAL IDENTITY THE KEY TO ASIA S VAST POTENTIAL IN E-COMMERCE We are living through an exciting time for digital commerce in Asia.

More information

Local Search Insights

Local Search Insights Local Search Insights click The YP to edit Advantage master title style Summary of comscore Research November 2014 All surveys results data herein are from comscore YP Value Proposition study, September

More information

Norton s My First Device Report. October 2018

Norton s My First Device Report. October 2018 Norton s My First Device Report By October 2018 Methodology Norton s My First Device Report is an online survey of 6,986 parents aged 18+ years old, with children aged 5-16 across 10 markets, commissioned

More information

Victim Personal Statements 2016/17

Victim Personal Statements 2016/17 Victim Personal Statements / Analysis of the offer and take-up of Victim Personal Statements using the Crime Survey for England and Wales, April to March. November Foreword One of my commitments as Victims

More information

Mobile Banking and Payments Emerging Trends and Opportunities

Mobile Banking and Payments Emerging Trends and Opportunities Mobile Banking and Payments Emerging Trends and Opportunities VIDEO 2 Introductions Barry O Connell Banking and Payments Strategy Barry focuses on customer, product and channel strategy for banks and payments

More information

Maintenance Enforcement Program

Maintenance Enforcement Program Maintenance Enforcement Program 2013 Client Survey Results 1 The Alberta Maintenance Enforcement Program (MEP) is committed to providing excellent service to its clients. MEP s client base is made up of

More information

Are dual-frame surveys necessary in market research?

Are dual-frame surveys necessary in market research? GfK Verein Are dual-frame surveys necessary in market research? Research report on GfK's methodology test Copyright GfK Verein All rights reserved. No part of this publication may be reproduced, or transmitted

More information

T he Inbox Report 2017

T he Inbox Report 2017 Search Inbox Sent 1 Fluent LLC to me 2:10 Drafts Spam Trash T he Inbox Report 2017 CONSUMER PERCEPTIONS OF EMAIL loading... REVEAL MORE Click here to Reply Inbox Report 2017 Page 1

More information

Page 1 of 6 Bank card and cheque fraud

Page 1 of 6 Bank card and cheque fraud Page 1 of 6 happens when criminals steal your cards or chequebook and gain access to funds in your account. More about bank card and cheque fraud Criminals steal your bank cards or cheque book; or they

More information

UK Perspectives on Cyber Crime: victims, offences and offenders

UK Perspectives on Cyber Crime: victims, offences and offenders OFFICIAL UK Perspectives on Cyber Crime: victims, offences and offenders Samantha Dowling Head of Cyber Crime Research Team Office for Security and Counter-Terrorism Research and Analysis Unit (OSCT R&A),

More information

US 2013 Consumer Data Privacy Study Mobile Edition

US 2013 Consumer Data Privacy Study Mobile Edition RESEARCH REPORT US 2013 Consumer Data Privacy Study Mobile Edition 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0

More information

Panda Security 2010 Page 1

Panda Security 2010 Page 1 Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency

More information

Response to the BBC Trust review of YouView from the Royal National Institute of Blind People (RNIB)

Response to the BBC Trust review of YouView from the Royal National Institute of Blind People (RNIB) Response to the BBC Trust review of YouView from the Royal National Institute of Blind People (RNIB) Author: John Paton, Digital Media Development Officer Date: 22/11/13 1. Introduction As the largest

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Voice and Speech Recognition

Voice and Speech Recognition Voice and Speech Recognition Consumer, Call Center, Healthcare, Enterprise, Finance, Retail, Government, Law Enforcement, and Defense Applications: Market Analysis and Forecasts Speech and voice recognition,

More information

A Comparative Usability Test. Orbitz.com vs. Hipmunk.com

A Comparative Usability Test. Orbitz.com vs. Hipmunk.com A Comparative Usability Test Orbitz.com vs. Hipmunk.com 1 Table of Contents Introduction... 3 Participants... 5 Procedure... 6 Results... 8 Implications... 12 Nuisance variables... 14 Future studies...

More information

Guide to Speaker Verification & Voice Biometrics

Guide to Speaker Verification & Voice Biometrics Guide to Speaker Verification & Voice Biometrics ICR Speech Solutions & Services The Engine House Ashley Lane, Saltaire West Yorkshire BD17 7DB Tel: 01274 821111 e-mail: info@icr3s.co.uk www.icr3s.co.uk

More information

DISCOVERABILITY. How Canadians Find TV Content

DISCOVERABILITY. How Canadians Find TV Content DISCOVERABILITY How Canadians Find TV Content Table of Contents Introduction...3 Executive Summary...4 TV Viewing is Diverse... 6 Discoverability... 10 Paid, Owned and Earned...18 Appendix Methodology

More information

Securing Americans Identities: The Future of the Social Security Number

Securing Americans Identities: The Future of the Social Security Number Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James

More information

Important Information

Important Information Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland

More information

Conducted by Vanson Bourne Research

Conducted by Vanson Bourne Research Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA

More information

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Making the UK more resilient against Cybercrime Date: August 2017 Reference: 0449-CYB This Red Alert is issued by the United Kingdom

More information

National Business Crime Partnership Association

National Business Crime Partnership Association National Business Crime Partnership Association A New National Association for Business Crime Reduction Partnerships (BCRPs) It is crucial to have a national representative body to support BCRP s, one

More information

THE IMPACT ON UK BUSINESS

THE IMPACT ON UK BUSINESS HI-TECH CRIME: THE IMPACT ON UK BUSINESS A National Crime Squad multi-agency initiative Contents Introduction 1 Objectives 2 Methodology 3 Key findings 6 The Threat of Hi-Tech Crime 7 Amount of Crime Taking

More information

Don t Get Left Behind

Don t Get Left Behind August 2015 Executive Summary Cloud adoption is growing, but relatively few organizations have advanced cloud strategies Achieving greater levels of cloud adoption allows organizations to materially improve

More information

The Rise of the Connected Viewer

The Rise of the Connected Viewer JULY 17, 2012 The Rise of the Connected Viewer 52% of adult cell owners use their phones while engaging with televised content; younger audiences are particularly active in these connected viewing experiences

More information

The commission communication "towards a general policy on the fight against cyber crime"

The commission communication towards a general policy on the fight against cyber crime MEMO/07/199 Brussels, 22 May 2007 The commission communication "towards a general policy on the fight against cyber crime" The use of the term cyber crime in this communication There is no agreed definition

More information

MOBILE BANKING YET TO TAKE OFF IN THE UK DUE TO LACK OF TRUST IN SECURITY ACCORDING TO NEW CONSUMER SURVEY FROM FIRSTSOURCE SOLUTIONS

MOBILE BANKING YET TO TAKE OFF IN THE UK DUE TO LACK OF TRUST IN SECURITY ACCORDING TO NEW CONSUMER SURVEY FROM FIRSTSOURCE SOLUTIONS MOBILE BANKING YET TO TAKE OFF IN THE UK DUE TO LACK OF TRUST IN SECURITY ACCORDING TO NEW CONSUMER SURVEY FROM FIRSTSOURCE SOLUTIONS 80 per cent of users have not embraced mobile banking* 58 per cent

More information

Business Intelligence

Business Intelligence Thomas Ridley-Siegert is research manager at the DMA (UK). He is responsible for developing and managing the various strands of research the DMA produces. The DMA has a network of more than 1, UK company

More information

Voice, Face and Behavioural Biometrics

Voice, Face and Behavioural Biometrics Voice, Face and Behavioural Biometrics Authentication & Fraud Prevention in the age of Virtual Assistants Brett Beranek, Director Product Strategy, Biometrics, Security & Fraud 2016 Nuance Communications,

More information

The Monetisation of Portability and Verification in an A2P SMS World

The Monetisation of Portability and Verification in an A2P SMS World The Monetisation of Portability and Verification in an A2P SMS World A whitepaper by Sponsored by Whitepaper The Monetisation of Portability and Verification Abstract Contents Abstract 2 3 5 6 10 10 11

More information

Better connections: Australian attitudes to mail and . November 2013

Better connections: Australian attitudes to mail and  . November 2013 Better connections: Australian attitudes to mail and email November 0 Contents p Methodology Audience segments Apart from analysing results according to age, gender, location and employment status, the

More information

A guide to booking your IELTS Test

A guide to booking your IELTS Test A guide to booking your IELTS Test In this guide we ll take you step by step through booking your IELTS test using the British Council s new and improved registration portal. Step 1: Select the IELTS module

More information

How. Biometrics. Expand the Reach of Mobile Banking ENTER

How. Biometrics. Expand the Reach of Mobile Banking ENTER How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication

More information

Flash Eurobarometer 443. e-privacy

Flash Eurobarometer 443. e-privacy Survey conducted by TNS Political & Social at the request of the European Commission, Directorate-General for Communications Networks, Content & Technology (DG CONNECT) Survey co-ordinated by the European

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,

More information

Business Success Through Embedded Communication Technology

Business Success Through Embedded Communication Technology Business Success Through Embedded Communication Technology How WebRTC Delivers Value To Organizations Today GET STARTED Released May 2016 1 2 Introduction More and more activities in our day-to-day lives

More information

Digital Transformation in Banking: What getting it right means for consumers in Asia. Research by

Digital Transformation in Banking: What getting it right means for consumers in Asia. Research by Digital Transformation in Banking: What getting it right means for consumers in Asia Research by Agenda Banking channel usage trend across Asia Payment tool trends in Asia Fraud issues in Asia Customer

More information

Executive Summary on. Privacy Awareness Survey on Smartphones. and Smartphone Apps

Executive Summary on. Privacy Awareness Survey on Smartphones. and Smartphone Apps Executive Summary on Privacy Awareness Survey on Smartphones and Smartphone Apps Submitted to Office of the Privacy Commissioner for Personal Data By Centre for the Advancement of Social Sciences Research

More information

COMPLIANCE 25TH MAY Are you prepared for the NEW GDPR rules?

COMPLIANCE 25TH MAY Are you prepared for the NEW GDPR rules? B2B COMPLIANCE ENFORCEMENT EUROPEAN LAW DATA PRIVACY CONSENT 25TH MAY 2018 Are you prepared for the NEW GDPR rules? ARTICLE 16 PARAGRAPH 1 OF THE DIRECTIVE STATES, THE USE OF ELECTRONIC COMMUNICATIONS

More information

ASSESSMENT LAYERED SECURITY

ASSESSMENT LAYERED SECURITY FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and

More information

What kind of information do you collect, when and how?

What kind of information do you collect, when and how? Associated Telecom Solutions Privacy Policy Action- Tec Services Ltd T/A Associated Telecom Solutions collects business data in order to provide our services to our business customers. During the relationship

More information

emarketer US Social Network Usage StatPack

emarketer US Social Network Usage StatPack May 2016 emarketer US Social Network Usage StatPack Presented by Learning from Social Advertising Data Trends Video Views ONCE A USER WATCHES 25% OF A VIDEO, DO THEY Stop Watching Watch 50% Watch 75% Finish

More information

COMMUNICATION WITHIN THE CONTACT CENTRE IS PREDICTED TO RISE: ARE YOU READY FOR IT?

COMMUNICATION WITHIN THE CONTACT CENTRE IS PREDICTED TO RISE: ARE YOU READY FOR IT? EMAIL COMMUNICATION WITHIN THE CONTACT CENTRE IS PREDICTED TO RISE: ARE YOU READY FOR IT? Recent years have seen a significant uptake in email communications, rising from 3.9% of inbound interactions in

More information

The consumer mobile experience. Measuring the consumer experience of using Android mobile services

The consumer mobile experience. Measuring the consumer experience of using Android mobile services Measuring the consumer experience of using Android mobile services RESEARCH REPORT Publication Date: 9 May 2018 About this document Ofcom has researched consumers experience of using mobile phones by collecting

More information

Online Disclosure & Barring Service (DBS) Application System

Online Disclosure & Barring Service (DBS) Application System Online Disclosure & Barring Service (DBS) Application System Applicant s Guidance on Completing an Online Disclosure & Barring Application Introduction Babcock International Support Services Ltd acts as

More information

CYBERSECURITY AND THE MIDDLE MARKET

CYBERSECURITY AND THE MIDDLE MARKET CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE

More information

Online CRB Disclosure Application System

Online CRB Disclosure Application System Online CRB Disclosure Application System Applicant s Guidance on Completing an Online Criminal Records Bureau Disclosure (CRB) Introduction Babcock International Support Services Ltd acts as an umbrella

More information

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast SD-WAN Enabling the Enterprise to Overcome Barriers to Digital Transformation An IDC InfoBrief Sponsored by Comcast SD-WAN Is Emerging as an Important Driver of Business Results The increasing need for

More information

Evolution of IT in the Finance Industry. Europe

Evolution of IT in the Finance Industry. Europe 2011 Evolution of IT in the Finance Industry Europe CONTENTS Evolution of IT in the Finance Industry... 4 Methodology... 6 Focus... 8 Finding 1: Finance Industry Has Mature View on IT Trends...10 Finding

More information

INSIGHTS 2018 Attitude towards advertising and use of ad blocking

INSIGHTS 2018 Attitude towards advertising and use of ad blocking INSIGHTS 2018 Attitude towards advertising and use of ad blocking US UK Germany Denmark Sweden Norway Finland 03 Editorial CONTENTS 04 Attitude towards advertising 13 Ad blocking 39 About the study 2 AudienceProject

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information