Have you ever seen an interactive advertisement while browsing around on the Web and, even though it was from a brand that you recognized promoting a product, service or event that you found interesting, you simply refused to click on the image because of a nagging sense of trepidation? What really lies beyond that alluring digital veil? Is the offer worth the risk? What of my digital privacy might I be giving up by responding to that message?
Me too… and according to our latest study, those fears are not lost on industry.
We talked to senior marketing executives – decision makers and check signers – with 90 organizations from a broad spectrum of industries that are actively engaged in online marketing. In total these firms account for more than $3 billion in annual revenue, and they believe wholeheartedly in the efficacy of the medium. According to our research, 63 percent of those we surveyed said behavioral advertising generated their greatest return on investment.
Yet 98 percent told us that, because of consumers’ privacy fears, their companies are curtailing investments in online behavioral targeting. These companies are willing to sacrifice the revenue they believe they can generate through an online campaign rather than risk the potential hit to brand reputation for being as aggressive as they would like to be. Overall that curtailment has kept more than $600 million out of the behavioral targeting industry.
Looking beyond the financial impact, the results of this study strongly suggest that, contrary to what some might say, self-regulation works. I don’t mean to suggest that consumer and privacy advocates are acting like Chicken Little when they lobby regulators with dire messages and thinly veiled accusations of treachery directed at the behavioral targeting industry. To the contrary; in order for self regulation to work effectively there needs to be a rigorous and active dialog that includes industry and consumer advocates as well as the engagement of an objective regulatory body.
The goal of that dialog should not be to force the unconditional surrender of the so-called opposition, but the development of true solutions to the very real potential for misuse or unintended abuse of personal information. Consumers have long benefitted from advertising in its many forms. Radio, television, print, and a great deal of online content is made freely available because of the revenue generated by the sale of advertising space.
As we conclude in our report, “the Internet advertising community should work closely with the privacy community and regulators to find ways that substantially reduce the public’s fears about actual and perceived privacy risks when responding to behaviorally targeted ads. To this end, better disclosure models, consumer education, effective consent mechanisms and enabling technologies will help advance the cause of safe and effective Internet advertising.”
Has your company spent less online because of these fears? Do you think behavioral advertising self-regulation is working in favor of the consumer? Do you want to see more or less regulation of this industry? Let us know what you think.
The eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a higher quality of service to their customers. Constituent services have been available online for years, certainly, but only recently has the effort to modernize government been policy.
A warm thank you to everyone who made this past weekend's RIM Renaissance a success. The discussions were lively and productive, and I think we all came away just a little bit smarter as a result of the candor. We do appreciate the enthusiasm that seems to pervade these events, and the willingness to put aside your valuable time to join with us on these annual occasions, as well as the ongoing conversations that take place throughout the year.
Does it surprise you to learn that, according to our recent study, Trends in Insider Compliance with Data Security Policies: Employees Evade and Ignore Security, employee compliance with corporate data security policies is on the wane?
Why do you think this is? I’m seeing a confluence of conditions that appear to be contributing to this challenge to data integrity: the development of new, mobile technologies that empower employees to do more while away from the office; a failure of organizations to keep pace with the ways technology is changing the dynamics of data security; and current economic conditions that are putting increased pressure on individuals to be more productive with fewer resources.
We just completed a survey of federal IT security professionals to examine the data protection posture of government agencies. Through the survey, sponsored by CA, we wanted to see whether or not there is consistency in the perception of rank-and-file employees and executive management as it pertains to the safeguarding of sensitive information, regulatory compliance, and the day-to-day management and execution of a security program.
A few years ago, when wireless networking was still relatively new, there were numerous reports of enterprising employees who, frustrated with the pace of new technology integration in their workplace, took it upon themselves to deploy rogue access points – often hidden behind furniture or above drop-down ceiling panels – in order to provide convenient mobility around the office.
Sponsored by McAfee, the Best Practices in Data Protection survey is our latest effort to find out what separates the best organizations from the rest. We believe this study is important because it provides insights on how organizations can be more successful when investing in and building a data protection program. The study's findings reveal five success factors in a data protection program:
A formal data protection strategy for the organization and metrics to determine if the strategy is effective.
Key metrics from a management console and observation and regular testing of data protection solutions.
Data protection technology features that focus on privileged users, restriction of access and outbound communications are considered critical
Centralized management of the data protection program with such features as actionable information, policy administration, reporting, automatic securing of endpoints and monitoring.
Automated policies for detection and prevention of end-user misuse of information assets.
Last week with CA Technologies we issued the results of a study of cloud service providers and their views on cloud security. There has been a lot of interest in this study. Readers have reviewed the results and responded with some very good questions and comments. In a nutshell, people – including us – were surprised by the results, which showed that cloud providers didn’t put security as the No. 1 concern in providing their services.
Last week I presented the results of our latest study entitled, "The State of IT Security: A Study of Utilities and Energy Companies." Sponsored by Q1 Labs, this research revealed that utilities and energy companies in our study are more concerned about preventing downtime that stopping a cyber attack. In addition, a majority of respondents said that compliance with standards such as NERC CIP is not a top priority. Most surprisingly, only 16 percent of respondents believe that their organization's existing controls are designed to protect against exploits and attacks through the smart grid. For more information about this study, please contact email@example.com.
Most privacy advocates and people in the data protection community believe that data breach costs will start coming down eventually because consumers will become somewhat immune to data breach news. The idea is that data breach notifications will become so commonplace that customers just won’t care anymore.
Have you ever noticed how some organizations wield compliance like a club when marketing their products or services? They remind you of the latest in information security regulations, such as the HITECH Act or Mass 201 CMR 17, and then menacingly predict doom for those who transgress. If you fail to comply, their messages warn like a cross schoolmarm, the boogey man will flash his regulator badge and lower the boom (unless, of course, you buy the appropriate product or service).
I hear the collective sound of our friends, colleagues, and other interested parties scratching their heads at the release of the most recent piece of Ponemon Institute research, National Survey on Data Center Outages. You read that right, data center outages.
Just a brief note to bring our recent webinar to your attention. I presented Information Governance in the Cloud along with the good people at Symantec. The presentation is based in part on results from our earlier report, Flying Blind in the Cloud.
If you want to view the webinar, presented on the Windows Live Meeting platform, please click here.
If you have any questions or comments about this issue, our report, or the webinar, we'd love to hear from you.
Holistic is a popular word these days. Often applied to food and medicine, the word conjures images of natural, healthy living, but the word holistic refers to the function of an entity as a whole, including the interdependence of all its parts. Given this broader meaning, holistic can (and should) be applied when thinking strategically about the way a business organization operates. Successful, well-functioning organizations most adapt to change, be flexible in their relationships, and innovative in their approach to business. They must not only have the capacity to react to change, but to anticipate change and act innovatively.
I am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations. Of 77 participating covered entities and business associates, 27% percent have not started or are barely aware of what they need to do, 32% are waiting for more details, 14% have a plan but are waiting for more details, and 21% are just starting to act. This data was collected from June through October 2009. If you are affected by the HITECH Act, this benchmark study may be helpful to you.
(click to download study)This second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practices about how well they are achieving access governance within their organizations.
(click to download study) It should come as no surprise that trust is increasingly important in customers’ loyalty to their bank. While overall trust in the industry is down, banks that experienced a significant data breach also experienced a significant decline in their trust scores. This study also reveals there is a correlation between customers’ trust and how long they remain with the same bank. Customers expect their bank to have protective measures in place to guard their data. If that expectation is not met, they will change banks.
Sponsored by Thales eSecurity (download the study) The purpose of this study was to identify what auditors think abut crypto technologies as it applies to data protection and compliance activities in public and private organizations. Seventy-one percent of respondents believe that an organization’s information assets cannot be fully protected without the use of crypto solutions.
(Click to download study) Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions.