Welcome!

News Feed Item

AVG Technologies Study Reveals Social Media Stokes Workplace Privacy Fears

More than half of adults (53 percent) believe privacy in the workplace has been eroded with the proliferation of social media, reveals AVG Technologies’ latest Digital Diaries study, Digital Work Life. The seventh installment in AVG’s Digital Diaries series includes responses from 4,000 adults in ten countries in relation to cyberbullying in the workplace.

The study found that the misuse of social media has infiltrated the workplace with often negative effects on employees’ privacy, forcing many to switch off or limit their use of social networking sites. One in ten respondents discovered secret discussions about them online were initiated by colleagues using social media, and 11 percent have had embarrassing photos or videos taken at a work event and uploaded onto social media sites. This is as high as 19 percent in Spain and 14 percent in the UK. A small number of all adults (6 percent) even found themselves subjected to unwanted romantic advances through online media, and in the US this number rose to one in ten of all adults.

As the use of social media increases for both personal and professional purposes, the privacy many workers value and expect is slowly diminishing through employee misuse and cyberbullying. To prevent personal information from being circulated at work, many adults are turning away from social media altogether. Of those who agreed social media has eroded their privacy at work, nearly a quarter (24 percent) now avoid posting on social networks that have caused them privacy concerns, while 23 percent limit their posts. More than half (53 percent) are more careful about what they post.

Tony Anscombe, AVG’s Senior Security Evangelist, said: “This study highlights the need for a combination of greater education around social media alongside stricter enforcement of the accompanying standards for social media etiquette at work. And we’re not just talking about employees here; employers can trip themselves up just as easily when managing the company’s own social media presence. Until everyone is clear about exactly what is and isn’t acceptable online behavior, trying to enforce policies will just fail, leaving the door open to cyberbullying and invasion of privacy. If organizations take the time to first educate before establishing and enforcing policies, privacy can be protected in the workplace without having to sacrifice any of the social activity we all enjoy.”

Jenny Ungless, an independent HR Consultant and life coach, commented on the findings: “While you can’t completely control what people say about you online, you can control the ‘ammunition’ they have against you. Being more careful about your posts on social networks or ensuring your privacy settings protect your personal information are just a few steps you can take. The research shows adults are now finding themselves in unchartered territory when it comes to social media in the workplace. Having to ward off colleagues’ romantic advances online, suffer the embarrassment of unwanted personal photos seen by colleagues or have personal details from social networks used against you, are all things that adults haven’t typically had to deal with. We often talk about bringing work home with us, yet little has been done to date to tackle our home-life now being taken into the office and the possible implications of this.”

Other key findings include:

  • Forms of cyberbullying: Four out of five (82 percent) adults believe that sending unpleasant or defamatory remarks to or about a colleague using digital communications constitutes cyberbullying (93 percent in UK and New Zealand). Other forms of cyberbullying include posting negative comments on a social media site about a colleague’s appearance at a work event (79 percent) and criticizing a colleague behind their back through email, instant messaging, social media or SMS (69 percent).
  • Incriminating or embarrassing activity online: Nearly one in ten (nine percent) adults has had a manager use information against them or a colleague which has been found on a social media site. This is highest in the US (13 percent) and Czech Republic (12 percent).
  • Cyberbullying driving workplace confrontations: Cyberbullying can easily spill over into heated debates in the workplace with more than half (51 percent) of adults admitting they would confront colleagues in person if they felt they were the victim of cyberbullying. This is as high as 65 percent in Germany, 56 percent in France and 54 percent in the Czech Republic. One in 10 (11 percent) would retaliate to cyberbullying through digital communication.
  • Cyberbullying policies: A quarter of adults (25 percent) are not protected from cyberbullying as workplaces do not cover this within existing policies. Only 37 percent of all adults know of a comprehensive policy, which covers cyberbullying, in the workplace. This is highest in Australia (57 percent) and the UK (51 percent) and lowest in France (20 percent) and Germany (23 percent).
  • Social media responsibility: Half of all adults (50 percent) believe their company is responsible for the online behavior of employees during work hours if they are using their personal social media accounts. Sentiment is felt strongest in Canada (63 percent) and the US (61 percent) while only 27 percent of Germans agree with this. Outside of work hours, only 16 percent of all adults agree that companies are responsible for employees’ online behavior.

About AVG Digital Diaries

The first stage of AVG’s Digital Diaries campaign, Digital Birth, focused on children from birth to age two. The study, released in October 2010, found that on average, infants acquire a digital identity by the age of six months old. Nearly a quarter (23 percent) of children have had their pre-birth scans uploaded to the Internet by their parent – establishing a digital footprint even before birth. The second stage, Digital Skills, was released in January 2011 and showed that for two to five year olds, ‘tech’ skills are increasingly replacing ‘life’ skills. In fact, many toddlers could use a mouse and play a computer game, but could not ride a bike, swim or tie their shoelaces.

Digital Playground, released in June 2011, found nearly half of six to nine year olds talk to friends online and use social networks. This was followed with Digital Maturity in November 2011, which revealed how 11 year olds had developed adult skills in technology. Digital Coming of Age, the fifth installment of AVG’s Digital Diaries study was released in April 2012, which interviewed parents of 14-17 year olds, found that nearly half of parents keep tabs on teens via Facebook, latest AVG Technologies’ research reveals.

Digital Baggage - released in October 2012 delved further into the theme of social media usage. Research, which involved interviews with 18-25 year olds about their online habits, found that one quarter were Facebook friends with their boss - which could potentially damage their career prospects.

The seventh installment, Digital Work Life, examines cyberbullying and privacy in the workplace with 4,000 workers surveyed across ten countries: UK, US, Australia, New Zealand, Canada, France, Germany, Italy, Spain and Czech Republic. More than half of the respondents revealed that the misuse of social media has eroded privacy in the workplace.

Research for all stages of the Digital Diaries series was conducted by Research Now on behalf of AVG Technologies.

More information visit: www.avgdigitaldiaries.com

About AVG Technologies (NYSE: AVG)

AVG's mission is to simplify, optimize and secure the Internet experience, providing peace of mind to a connected world. AVG's powerful yet easy-to-use software and online services put users in control of their Internet experience. By choosing AVG's software and services, users become part of a trusted global community that benefits from inherent network effects, mutual protection and support. AVG has grown its user base to 143 million active users as of September 30, 2012 and offers a product portfolio that targets the consumer and small business markets and includes Internet security, PC performance optimization, online backup, mobile security, identity protection and family safety software.

www.avg.com

http://mediacenter.avg.com

Keep in touch with AVG

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, attendees learned about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how ...
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...