Welcome!

News Feed Item

AVG Technologies Study Reveals Social Media Stokes Workplace Privacy Fears

More than half of adults (53 percent) believe privacy in the workplace has been eroded with the proliferation of social media, reveals AVG Technologies’ latest Digital Diaries study, Digital Work Life. The seventh installment in AVG’s Digital Diaries series includes responses from 4,000 adults in ten countries in relation to cyberbullying in the workplace.

The study found that the misuse of social media has infiltrated the workplace with often negative effects on employees’ privacy, forcing many to switch off or limit their use of social networking sites. One in ten respondents discovered secret discussions about them online were initiated by colleagues using social media, and 11 percent have had embarrassing photos or videos taken at a work event and uploaded onto social media sites. This is as high as 19 percent in Spain and 14 percent in the UK. A small number of all adults (6 percent) even found themselves subjected to unwanted romantic advances through online media, and in the US this number rose to one in ten of all adults.

As the use of social media increases for both personal and professional purposes, the privacy many workers value and expect is slowly diminishing through employee misuse and cyberbullying. To prevent personal information from being circulated at work, many adults are turning away from social media altogether. Of those who agreed social media has eroded their privacy at work, nearly a quarter (24 percent) now avoid posting on social networks that have caused them privacy concerns, while 23 percent limit their posts. More than half (53 percent) are more careful about what they post.

Tony Anscombe, AVG’s Senior Security Evangelist, said: “This study highlights the need for a combination of greater education around social media alongside stricter enforcement of the accompanying standards for social media etiquette at work. And we’re not just talking about employees here; employers can trip themselves up just as easily when managing the company’s own social media presence. Until everyone is clear about exactly what is and isn’t acceptable online behavior, trying to enforce policies will just fail, leaving the door open to cyberbullying and invasion of privacy. If organizations take the time to first educate before establishing and enforcing policies, privacy can be protected in the workplace without having to sacrifice any of the social activity we all enjoy.”

Jenny Ungless, an independent HR Consultant and life coach, commented on the findings: “While you can’t completely control what people say about you online, you can control the ‘ammunition’ they have against you. Being more careful about your posts on social networks or ensuring your privacy settings protect your personal information are just a few steps you can take. The research shows adults are now finding themselves in unchartered territory when it comes to social media in the workplace. Having to ward off colleagues’ romantic advances online, suffer the embarrassment of unwanted personal photos seen by colleagues or have personal details from social networks used against you, are all things that adults haven’t typically had to deal with. We often talk about bringing work home with us, yet little has been done to date to tackle our home-life now being taken into the office and the possible implications of this.”

Other key findings include:

  • Forms of cyberbullying: Four out of five (82 percent) adults believe that sending unpleasant or defamatory remarks to or about a colleague using digital communications constitutes cyberbullying (93 percent in UK and New Zealand). Other forms of cyberbullying include posting negative comments on a social media site about a colleague’s appearance at a work event (79 percent) and criticizing a colleague behind their back through email, instant messaging, social media or SMS (69 percent).
  • Incriminating or embarrassing activity online: Nearly one in ten (nine percent) adults has had a manager use information against them or a colleague which has been found on a social media site. This is highest in the US (13 percent) and Czech Republic (12 percent).
  • Cyberbullying driving workplace confrontations: Cyberbullying can easily spill over into heated debates in the workplace with more than half (51 percent) of adults admitting they would confront colleagues in person if they felt they were the victim of cyberbullying. This is as high as 65 percent in Germany, 56 percent in France and 54 percent in the Czech Republic. One in 10 (11 percent) would retaliate to cyberbullying through digital communication.
  • Cyberbullying policies: A quarter of adults (25 percent) are not protected from cyberbullying as workplaces do not cover this within existing policies. Only 37 percent of all adults know of a comprehensive policy, which covers cyberbullying, in the workplace. This is highest in Australia (57 percent) and the UK (51 percent) and lowest in France (20 percent) and Germany (23 percent).
  • Social media responsibility: Half of all adults (50 percent) believe their company is responsible for the online behavior of employees during work hours if they are using their personal social media accounts. Sentiment is felt strongest in Canada (63 percent) and the US (61 percent) while only 27 percent of Germans agree with this. Outside of work hours, only 16 percent of all adults agree that companies are responsible for employees’ online behavior.

About AVG Digital Diaries

The first stage of AVG’s Digital Diaries campaign, Digital Birth, focused on children from birth to age two. The study, released in October 2010, found that on average, infants acquire a digital identity by the age of six months old. Nearly a quarter (23 percent) of children have had their pre-birth scans uploaded to the Internet by their parent – establishing a digital footprint even before birth. The second stage, Digital Skills, was released in January 2011 and showed that for two to five year olds, ‘tech’ skills are increasingly replacing ‘life’ skills. In fact, many toddlers could use a mouse and play a computer game, but could not ride a bike, swim or tie their shoelaces.

Digital Playground, released in June 2011, found nearly half of six to nine year olds talk to friends online and use social networks. This was followed with Digital Maturity in November 2011, which revealed how 11 year olds had developed adult skills in technology. Digital Coming of Age, the fifth installment of AVG’s Digital Diaries study was released in April 2012, which interviewed parents of 14-17 year olds, found that nearly half of parents keep tabs on teens via Facebook, latest AVG Technologies’ research reveals.

Digital Baggage - released in October 2012 delved further into the theme of social media usage. Research, which involved interviews with 18-25 year olds about their online habits, found that one quarter were Facebook friends with their boss - which could potentially damage their career prospects.

The seventh installment, Digital Work Life, examines cyberbullying and privacy in the workplace with 4,000 workers surveyed across ten countries: UK, US, Australia, New Zealand, Canada, France, Germany, Italy, Spain and Czech Republic. More than half of the respondents revealed that the misuse of social media has eroded privacy in the workplace.

Research for all stages of the Digital Diaries series was conducted by Research Now on behalf of AVG Technologies.

More information visit: www.avgdigitaldiaries.com

About AVG Technologies (NYSE: AVG)

AVG's mission is to simplify, optimize and secure the Internet experience, providing peace of mind to a connected world. AVG's powerful yet easy-to-use software and online services put users in control of their Internet experience. By choosing AVG's software and services, users become part of a trusted global community that benefits from inherent network effects, mutual protection and support. AVG has grown its user base to 143 million active users as of September 30, 2012 and offers a product portfolio that targets the consumer and small business markets and includes Internet security, PC performance optimization, online backup, mobile security, identity protection and family safety software.

www.avg.com

http://mediacenter.avg.com

Keep in touch with AVG

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.