Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience

Similar documents
HOW TO CONFIGURE SOCIAL MEDIA PRIVACY SETTINGS

US 2013 Consumer Data Privacy Study Mobile Edition

The purchaser of the ebook is licensed to copy ebook for use with immediate family members only.

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

WHITE PAPER THE SOCIAL MEDIA FRAUD REVOLUTION A STUDY OF THE EXPANSION OF CYBERCRIME TO NEW PLATFORMS

Norton Online Reputation Report: Why Millennials should manage their online footprint

Comparison: OneDrive versus Google Drive, Dropbox and icloud

Social Media E-Safety Guide. For more help and advice visit:

The State of the American Traveler TM

Trustlook Insights Q BYOD Trends & Practices

2013 NATIONAL ONLINE SAFETY STUDY

SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS

Tech Tips and Services

2018 Report The State of Securing Cloud Workloads

THE FUTURE OF PERSONALIZATION IS VISUAL WHITE PAPER

Android Samsung Galaxy S6 Edge

Social Media Reputation Management

Family Technology Boundaries:

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps

The State of the Trust Gap in 2015

Personal Cybersecurity

Panda Security 2010 Page 1

Quick Start: Creating a Video and Publishing in YouTube

7 The system should allow administrator to close a user profile. 8 The system shall make the old events invisible to avoid crowded geo scope.

Gail Weiss 8/25/2017 1

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series

Tech Pro. This Month s Offer. TechNews. DYK Series and lots more. airtel. Vol 1

The Future of the Mobile Wallet: Barriers and opportunities for the 2012 next stage of the mobile payment revolution 2015.

Nielsen List of Top 10 ios Mobile Apps

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

Sunday January Atlantic Shores Baptist Church

DROPBOX.COM - PRIVACY POLICY

Call HelpHOPELive or if you need help setting up a Facebook account.

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

Barometer of fixed internet connections in Greece

1-2-3 Webinar: Demystifying the Cloud

Executive Summary on. Privacy Awareness Survey on Smartphones. and Smartphone Apps

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL

GOOGLE TIES MOBILE USABILITY ISSUES WITH YOUR WEBSITE RANKINGS GOOGLE NOW SHOWS SOCIAL PROFILES IN THE KNOWLEDGE PANEL

Photos, Photos. What to do with All Those Photos? Presented by Phil Goff Area 16 Computers and Technology August 17, 2017

NORTON WI-FI RISK REPORT: U.S. Results

5 Good Reasons. Your Software Platform Can t Ignore Text Messaging

Office 365 Buyers Guide: Best Practices for Securing Office 365

NAE NWAN CONNECT MOBILE APP USER GUIDE CUSTOMER

MOVING MISSION IT SERVICES TO THE CLOUD

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle

Jeff Langford, Principal Solutions Architect

Automatic information protection when device camera is operated by secondary user

Lawrence Ying Sr Tech Lead, Google Platforms Aug 9, 2018

UFED Cloud Analyzer. Traces and changes. February Version 6.0

Disaster Unpreparedness June 3, 2013

Tizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify

Head-to-head: Which will win for your business?

Introducing. Introducing...

Privacy, Law, and Smartphones

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

Sky Social Media Guidelines for Contributors

Storage Made Easy. Enterprise File Fabric for Unified Data Indexing, Auditing, e-compliance, and secure file sharing.

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia

Home Automation: Survivor Privacy Risks & Strategies

Outline What is a search engine?

CONTENT CALENDAR USER GUIDE SOCIAL MEDIA TABLE OF CONTENTS. Introduction pg. 3

SEARCHING FOR FRIENDS

Tech Brief Wasabi for Consumers & Small Businesses

You Weren t Hacked, You Were Spoofed

Si500 VIDEO SPEAKER MICROPHONE BROCHURE. Si500

Built to keep you moving

Welcome to INTRODUCTION TO WINDOWS 10. Instructor: Tori Moody Co-Owner of CPU Computers & About You Web Design

HOW TO CREATE AND MAINTAIN A GALLERY. Dundalk Photographic Society

Verification of Identity made simple. Simple. Secure. Native.

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective

How to upload the Broker Behind You Frame Using Facebook

The State of the User Experience

Maximising Your Presence on TripAdvisor

Connect to Family and Friends with Facebook

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

Shadow IT in the Enterprise

Preliminary Findings. Vacation Packages: A Consumer Tracking and Discovery Study. Exploring Online Travelers. November 2003

Barometer of fixed internet connections in Thailand

The power management skills gap

Web & Automotive. Paris, April Dave Raggett

SMB Cloud InsightsTM

Should the users be informed? Differences in risk perception between Android and iphone users

Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead

How to Select the Right Marketing Cloud Edition

owncloud Android App Manual

Trends in Mobile Forensics from Cellebrite

SECOND ANNUAL. Small & Medium Business Trends Report Research insights from nearly 500 business owners and leaders

The 7 Success Secrets for Building a Million Download Mobile App

Attackers Process. Compromise the Root of the Domain Network: Active Directory

State of the Internet Operating System

We make Apple Better. Quick Start Guide FEB ONE

INFORMATION MANAGEMENT

Eight Tips for Better Archives. Eight Ways Cloudian Object Storage Benefits Archiving with Veritas Enterprise Vault

Create an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add Link... 4 Add Photo... 5 Delete a Tweet...

2017 NACE Experience Conference July 16 19, 2017

COUNTY OF GOGEBIC REQUEST FOR PROPOSAL FOR WEBSITE and LOGO REDESIGN and CONTENT MANAGEMENT SERVICES

THE TRUTH ABOUT CLOUD SECURITY. It s More Secure Than You Think

Transcription:

Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience 1

Photo-sharing report Methodology Americans are concerned about online privacy and security and are taking steps to protect personal information from being exposed. Keepsafe conducted this survey to measure and highlight people s knowledge and sentiments around photo-sharing. Keepsafe s findings reflect the mismatch between social media & photo-sharing offerings and people s desire to maintain privacy. Tech giants like Google, Facebook and Snap routinely attract customers with convenient, free photo-sharing tools that offer storage. They also provide sophisticated capabilities like geo-tagging, artificial intelligence-driven facial recognition and auto-sharing. privacy aren t reflected in the revealing features technology firms are delivering. It s a stark reminder that when people upload photos to photo-sharing services, they are often offering up their own data only to be repackaged and repurposed. (Often without express consent or knowledge.) People can only take control of their privacy when they understand what s at stake and how to protect themselves. Keepsafe s mission is to make privacy and security simple. This report is compiled from June 2017 survey data collected by Keepsafe. Responses were gathered from 503 mobile users of social media in the U.S. using Google s Consumer Survey platform. The survey findings reveal that people s knowledge, desires and values about 2

Summary of findings 1. People are uncomfortable with advanced photo-sharing technologies that compromise their privacy: 3. Perceptions of privacy among photo storage and sharing apps is fragmented. Services that protect people s privacy will win consumer trust; those that don t, Capturing geo-tag and personal information when uploading photos Auto-sharing photos risk a backlash from users. Competitors in the space may tackle products privacy shortcomings as this becomes more evident. Using facial recognition Making AI-driven sharing suggestions Passing metadata from photos 2. People are modifying behavior due to fear that private photos will be compromised. From deleting sensitive pictures to changing photo apps, people s actions indicate a lack of trust across the photo-sharing ecosystem and desire for personal privacy and security. Arnold S. Hoshiko K. Gabriela H. 3

What about passing geo-tag and personal information when uploading digital photos? 75%? Only 1 in 3!! of people are aware that geo-tag people are comfortable with passing this meta data to online services. information is passed to online services when taking a photo with their digital camera or phone. In fact, 70% said they d strip their photos of meta data if given the choice. Another 21% said they weren t sure they d strip their photos of meta data. 4

How comfortable are people with advanced photo-sharing technologies? Facial recognition Only 20% said they were very or 80% are only marginally comfortable with intelligence-driven suggestions for sharing photos, while over 50% are uncomfortable with the idea of automatically sharing of photos. apps or services that use facial recognition to identify people in their photos. extremely comfortable with photo-sharing Comfort levels: AI-driven suggestions for photo sharing Very Somewhat Not 20% 36% 44% 48% said they d turn off facial recognition if given the choice. Another 31% said they Comfort levels: Auto-sharing photos with people weren t sure if they d turn it off. Very 13% Somewhat 31% Not 56% 5

How have people modified behaviors to protect private pictures in light of recent photo hackings? Photo-sharing services perceived as best for protecting privacy Google Photos * 56% 50% Delete sensitive photos due to privacy concerns 44% Back-up photos to an online cloud services 21% Archive or hide personal photos in photo apps 8% Use a photo vault like Keepsafe 6% Changed photo apps 7% Made no changes Dropbox Photo vaults (Keepsafe) Snapchat Instagram Facebook None 15% 8% 7% 5% 4% 3% Other 2% * Surveys conducted with Google Consumer Surveys 6

About Keepsafe Founded in 2012 and based in San Francisco, CA, Keepsafe is dedicated to protecting people s personal space. More than 60 million people rely on Keepsafe s secure vault to protect their private photos, videos and documents. Keepsafe makes privacy simple in the digital world. For people who want control over their privacy, peace of mind, and the freedom to be themselves, Keepsafe locks down personal items so they stay private. For more information, visit Keepsafe at getkeepsafe.com. 7