|By Business Wire||
|January 31, 2013 12:01 AM EST||
More than half of adults (53 percent) believe privacy in the workplace has been eroded with the proliferation of social media, reveals AVG Technologies’ latest Digital Diaries study, Digital Work Life. The seventh installment in AVG’s Digital Diaries series includes responses from 4,000 adults in ten countries in relation to cyberbullying in the workplace.
The study found that the misuse of social media has infiltrated the workplace with often negative effects on employees’ privacy, forcing many to switch off or limit their use of social networking sites. One in ten respondents discovered secret discussions about them online were initiated by colleagues using social media, and 11 percent have had embarrassing photos or videos taken at a work event and uploaded onto social media sites. This is as high as 19 percent in Spain and 14 percent in the UK. A small number of all adults (6 percent) even found themselves subjected to unwanted romantic advances through online media, and in the US this number rose to one in ten of all adults.
As the use of social media increases for both personal and professional purposes, the privacy many workers value and expect is slowly diminishing through employee misuse and cyberbullying. To prevent personal information from being circulated at work, many adults are turning away from social media altogether. Of those who agreed social media has eroded their privacy at work, nearly a quarter (24 percent) now avoid posting on social networks that have caused them privacy concerns, while 23 percent limit their posts. More than half (53 percent) are more careful about what they post.
Tony Anscombe, AVG’s Senior Security Evangelist, said: “This study highlights the need for a combination of greater education around social media alongside stricter enforcement of the accompanying standards for social media etiquette at work. And we’re not just talking about employees here; employers can trip themselves up just as easily when managing the company’s own social media presence. Until everyone is clear about exactly what is and isn’t acceptable online behavior, trying to enforce policies will just fail, leaving the door open to cyberbullying and invasion of privacy. If organizations take the time to first educate before establishing and enforcing policies, privacy can be protected in the workplace without having to sacrifice any of the social activity we all enjoy.”
Jenny Ungless, an independent HR Consultant and life coach, commented on the findings: “While you can’t completely control what people say about you online, you can control the ‘ammunition’ they have against you. Being more careful about your posts on social networks or ensuring your privacy settings protect your personal information are just a few steps you can take. The research shows adults are now finding themselves in unchartered territory when it comes to social media in the workplace. Having to ward off colleagues’ romantic advances online, suffer the embarrassment of unwanted personal photos seen by colleagues or have personal details from social networks used against you, are all things that adults haven’t typically had to deal with. We often talk about bringing work home with us, yet little has been done to date to tackle our home-life now being taken into the office and the possible implications of this.”
Other key findings include:
- Forms of cyberbullying: Four out of five (82 percent) adults believe that sending unpleasant or defamatory remarks to or about a colleague using digital communications constitutes cyberbullying (93 percent in UK and New Zealand). Other forms of cyberbullying include posting negative comments on a social media site about a colleague’s appearance at a work event (79 percent) and criticizing a colleague behind their back through email, instant messaging, social media or SMS (69 percent).
- Incriminating or embarrassing activity online: Nearly one in ten (nine percent) adults has had a manager use information against them or a colleague which has been found on a social media site. This is highest in the US (13 percent) and Czech Republic (12 percent).
- Cyberbullying driving workplace confrontations: Cyberbullying can easily spill over into heated debates in the workplace with more than half (51 percent) of adults admitting they would confront colleagues in person if they felt they were the victim of cyberbullying. This is as high as 65 percent in Germany, 56 percent in France and 54 percent in the Czech Republic. One in 10 (11 percent) would retaliate to cyberbullying through digital communication.
- Cyberbullying policies: A quarter of adults (25 percent) are not protected from cyberbullying as workplaces do not cover this within existing policies. Only 37 percent of all adults know of a comprehensive policy, which covers cyberbullying, in the workplace. This is highest in Australia (57 percent) and the UK (51 percent) and lowest in France (20 percent) and Germany (23 percent).
- Social media responsibility: Half of all adults (50 percent) believe their company is responsible for the online behavior of employees during work hours if they are using their personal social media accounts. Sentiment is felt strongest in Canada (63 percent) and the US (61 percent) while only 27 percent of Germans agree with this. Outside of work hours, only 16 percent of all adults agree that companies are responsible for employees’ online behavior.
About AVG Digital Diaries
The first stage of AVG’s Digital Diaries campaign, Digital Birth, focused on children from birth to age two. The study, released in October 2010, found that on average, infants acquire a digital identity by the age of six months old. Nearly a quarter (23 percent) of children have had their pre-birth scans uploaded to the Internet by their parent – establishing a digital footprint even before birth. The second stage, Digital Skills, was released in January 2011 and showed that for two to five year olds, ‘tech’ skills are increasingly replacing ‘life’ skills. In fact, many toddlers could use a mouse and play a computer game, but could not ride a bike, swim or tie their shoelaces.
Digital Playground, released in June 2011, found nearly half of six to nine year olds talk to friends online and use social networks. This was followed with Digital Maturity in November 2011, which revealed how 11 year olds had developed adult skills in technology. Digital Coming of Age, the fifth installment of AVG’s Digital Diaries study was released in April 2012, which interviewed parents of 14-17 year olds, found that nearly half of parents keep tabs on teens via Facebook, latest AVG Technologies’ research reveals.
Digital Baggage - released in October 2012 delved further into the theme of social media usage. Research, which involved interviews with 18-25 year olds about their online habits, found that one quarter were Facebook friends with their boss - which could potentially damage their career prospects.
The seventh installment, Digital Work Life, examines cyberbullying and privacy in the workplace with 4,000 workers surveyed across ten countries: UK, US, Australia, New Zealand, Canada, France, Germany, Italy, Spain and Czech Republic. More than half of the respondents revealed that the misuse of social media has eroded privacy in the workplace.
Research for all stages of the Digital Diaries series was conducted by Research Now on behalf of AVG Technologies.
More information visit: www.avgdigitaldiaries.com
About AVG Technologies (NYSE: AVG)
AVG's mission is to simplify, optimize and secure the Internet experience, providing peace of mind to a connected world. AVG's powerful yet easy-to-use software and online services put users in control of their Internet experience. By choosing AVG's software and services, users become part of a trusted global community that benefits from inherent network effects, mutual protection and support. AVG has grown its user base to 143 million active users as of September 30, 2012 and offers a product portfolio that targets the consumer and small business markets and includes Internet security, PC performance optimization, online backup, mobile security, identity protection and family safety software.
Keep in touch with AVG
- For breaking news, follow AVG on Twitter at www.twitter.com/officialAVGnews
- For small business security trends analysis, follow the AVG small business blog at small-business.blog.avg.com
- Join our Facebook community at www.facebook.com/AVGfree
- Join our LinkedIn community www.linkedin.com/groups?gid=2719797
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
May. 1, 2016 12:00 AM EDT Reads: 1,050
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Apr. 30, 2016 10:45 PM EDT Reads: 666
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Apr. 30, 2016 10:00 PM EDT Reads: 1,089
If there is anything we have learned by now, is that every business paves their own unique path for releasing software- every pipeline, implementation and practices are a bit different, and DevOps comes in all shapes and sizes. Software delivery practices are often comprised of set of several complementing (or even competing) methodologies – such as leveraging Agile, DevOps and even a mix of ITIL, to create the combination that’s most suitable for your organization and that maximize your busines...
Apr. 30, 2016 08:15 PM EDT Reads: 1,797
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
Apr. 30, 2016 05:30 PM EDT Reads: 710
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Apr. 30, 2016 04:45 PM EDT Reads: 1,053
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
Apr. 30, 2016 04:15 PM EDT Reads: 568
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
Apr. 30, 2016 04:15 PM EDT Reads: 749
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, will discuss how research has demonstrated the value of Machine Learning in delivering next generation analytics to im...
Apr. 30, 2016 04:15 PM EDT Reads: 1,666
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
Apr. 30, 2016 04:00 PM EDT Reads: 561
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Apr. 30, 2016 03:30 PM EDT Reads: 1,438
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
Apr. 30, 2016 03:15 PM EDT Reads: 757
This is not a small hotel event. It is also not a big vendor party where politicians and entertainers are more important than real content. This is Cloud Expo, the world's longest-running conference and exhibition focused on Cloud Computing and all that it entails. If you want serious presentations and valuable insight about Cloud Computing for three straight days, then register now for Cloud Expo.
Apr. 30, 2016 02:30 PM EDT Reads: 1,710
IoT device adoption is growing at staggering rates, and with it comes opportunity for developers to meet consumer demand for an ever more connected world. Wireless communication is the key part of the encompassing components of any IoT device. Wireless connectivity enhances the device utility at the expense of ease of use and deployment challenges. Since connectivity is fundamental for IoT device development, engineers must understand how to overcome the hurdles inherent in incorporating multipl...
Apr. 30, 2016 02:15 PM EDT Reads: 1,453