1 Interel McAfee research survey The 2012 Olympic Games and cybersecurity MPs, Business People and Journalists June - July 2011.

Slides:



Advertisements
Similar presentations
THE SURVEY METHOD IN RESEARCH BY: CHRISTINE HABERSHAM, BRITTANY LOHMEIER, & BILLIE RAMES-SCHULTZ UNIVERSITY OF NEW MEXICO.
Advertisements

Lucero Sosa Edgar Flores Period 1. California Standards  8.0 Student organized and describe distribution of data by using of different methods, including.
Saving, borrowing and paying in Finland Spring 2011.
Research methods – Deductive / quantitative
4.11 PowerPoint Emily Smith.
Choosing Sample Size and Using Your Calculator Presentation 9.3.
(ISC) Global Information Security Workforce Study (GISWS) Results U.S. Federal Government.
Causal-Comparative Research
Survey Research & Understanding Statistics
© 2013 Pearson Education, Inc. Active Learning Lecture Slides For use with Classroom Response Systems Introductory Statistics: Exploring the World through.
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
Copyright © 2014, 2013, 2010 and 2007 Pearson Education, Inc. Chapter Hypothesis Tests Regarding a Parameter 10.
Part A: Cyber risk. Chart A.31 Concern about cyber risk has grown Sources: Bank of England Systemic Risk Surveys and Bank calculations. Systemic Risk.
SAVING, BORROWING AND PAYING IN FINLAND Spring 2012.
Pengukuran Opini Publik. Survey Research Survey research is a technique that well designed for assessing the prevalence and distribution of attitudes,
NHS EASTERN CHESHIRE CCG
Using Statistics Entrepreneurship. Math Review Percents A percent is a part of a whole Percents can be calculated from decimals by multiplying them by.
A P STATISTICS LESSON 9 – 1 ( DAY 1 ) SAMPLING DISTRIBUTIONS.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS BARNET CCG Latest survey results July 2015 publication.
Can't Type. press F11 or F5. Can’t Hear
Executive Summary July SURVEY OVERVIEW Methodology Penn Schoen Berland conducted 1,650 telephone interviews between March 27, 2015 and May 4, 2015.
By: Christopher Prewitt & Deirdre Huston.  When doing any project it is important to know as much information about the project and the views of everyone.
IPv6 Survey: Taking the Federal Pulse on IPv6 Summary Results Market Connections, Inc. June 2006.
1 SAVING, BORROWING AND PAYING IN FINLAND Spring 2013.
Language Policy Survey. Number of Languages to Require.
What do Centurions think about our school spirit? Diana Tapia Period
UNIT 8:Statistical Measures Measures of Central Tendency: numbers that represent the middle of the data Mean ( x ): Arithmetic average Median: Middle of.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS COVENTRY AND RUGBY CCG Latest survey results January 2015 publication.
Sociological Research Methods Sociology: Chapter 2, Section 1.
Responsible Electricity Transmission for Albertans (RETA) November 2, 2009 Responsible Electricity Transmission for Albertans (RETA)
IEEE Computer Society Report of an Online Survey of Current and Non-Renewing Members May 2012 – version 3.0 EDITED June 20, JMS Prepared by: Robin.
: Chapters 28, 29, 30 Marketing Research and Product Planning: Jeopardy Review Game.
Estimating the Value of a Parameter Using Confidence Intervals
Normal Probability Distribution Using Normal Distribution for Probability.
Phoenix Convention Center Phoenix, Arizona When Prevention and Preparation May Not be Enough: Resilience and Recovery for the Electricity Sub-Sector Operational.
Results by Oversampled Geographies June SURVEY OVERVIEW.
Don’t cry because it is all over, smile because it happened.
Normal Distr Practice Major League baseball attendance in 2011 averaged 30,000 with a standard deviation of 6,000. i. What percentage of teams had between.
MEADOW Questionnaire Validation G. Sirilli & A. Arundel.
Indianapolis Results Report July Survey Overview.
SURVEY RESEARCH AND TYPES OF INFORMATION GATHERED.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS NOTTINGHAM NORTH AND EAST CCG Latest survey results July 2015.
Market research for a start-up. LEARNING OUTCOMES By the end of this lesson I will be able to: –Define and explain market research –Distinguish between.
Psychological Research Methods Psychology: Chapter 2, Section 2.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS COASTAL WEST SUSSEX CCG Latest survey results January 2015 publication.
MM207 Statistics Welcome to the Unit 2 Seminar name.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
The UK Olympic Experience from a Fire and Rescue perspective Steve Hamm MSc BEng(Hons) CEng FIFireE MIoD IFE International President 2015/16 Head of.
Fayette County USA Expansion Opinion Survey Prepared for Cornett-IMS/Fayette Alliance The Matrix Group, Inc August 2006.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS CAMDEN CCG Latest survey results January 2015 publication.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS BIRMINGHAM CROSSCITY CCG Latest survey results July 2015 publication.
Mariana Lopez Carlos Aguilar Alex Rodriguez Period Commute time for senior student’s high school experience.
Customer Satisfaction Index July 2008 RESULTS. Introduction This report presents the results for the Customer Satisfaction Index survey undertaken in.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS WILTSHIRE CCG Latest survey results January 2016 publication.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS DORSET CCG Latest survey results January 2016 publication.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS HARROW CCG Latest survey results January 2016 publication.
Examining difference: chi-squared (x 2 ). When to use Chi-Squared? Chi-squared is used to examine differences between what you actually find in your study.
Cyber: risk without borders Airmic 2016 Harrogate International Centre Tuesday 7 th June 2016.
Version 1 | Internal Use Only© Ipsos MORI 1 Version 1| Internal Use Only NHS SOUTH EAST STAFFS AND SEISDON PENINSULAR CCG Latest survey results.
FBLA Competitive Event Selection Questionaire
© Capital Crossroads | 2015.
FBLA Competitive Event Selection Questionaire
CYB 100 Teaching Effectively-- snaptutorial.com
CYB 100 Become Exceptional/ newtonhelp.com. CYB 100 All Assignments For more course tutorials visit uophelp.com is now newtonhelp.com
Cyber-security and IEC International Standards
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Chapter 9 Test for Independent Means Between-Subjects Design
Presentation transcript:

1 Interel McAfee research survey The 2012 Olympic Games and cybersecurity MPs, Business People and Journalists June - July 2011

2 Background  YouGovStone completed online interviews with: Senior Business people National journalists Members of Parliament  The surveys were completed between June 17 th and July 12 th 2011  All results are based on a sample and are therefore subject to statistical errors normally associated with sample-based information.  Any percentages calculated on bases fewer than 50 respondents must not be reported as they do not represent a wide enough cross-section of the target population to be considered statistically reliable. These figures will be italicised. If reporting MPs by party please refer to the actual number of MPs from that party who answered the question as reported and compare it to the actual number interviewed, rather than using percentages.  Results for MPs are weighted by party to give a sample that is representative of the House of Commons.

3 What do you rate as the biggest threat, if any, to the success of the London 2012 Olympic Games? Base: 100 UK Business people, 100 UK Journalists, 100 MPs

4 Which of the following do you believe accurately describes what a cyber-attack is? You can select as many options as you wish. Base: 100 UK Business people, 100 UK Journalists, 100 MPs

5 How likely do you think it is that there will be a large cyber-attack on the Olympic Games? Base: 100 UK Business people, 100 UK Journalists, 100 MPs

6 How concerned are you, if at all, that the success of the Games might be compromised by a large cyber-attack? Base: 100 UK Business people, 100 UK Journalists, 100 MPs

7 On a scale of 1 to 5, where 1 is not at all serious and 5 is very serious, how serious do you think the threat of cyber-attack is in each of the following Olympics IT functions? Mean scores Base: 100 UK Business people, 100 UK Journalists, 100 MPs

8 On a scale of 1 to 5, where 1 is not at all serious and 5 is very serious, how serious do you think the threat of cyber-attack is in each of the following Olympics IT functions? Personal details of competitors and teams Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

9 On a scale of 1 to 5, where 1 is not at all serious and 5 is very serious, how serious do you think the threat of cyber-attack is in each of the following Olympics IT functions? Ticket sales Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

10 On a scale of 1 to 5, where 1 is not at all serious and 5 is very serious, how serious do you think the threat of cyber-attack is in each of the following Olympics IT functions? Failure of timing systems for events Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

11 On a scale of 1 to 5, where 1 is not at all serious and 5 is very serious, how serious do you think the threat of cyber-attack is in each of the following Olympics IT functions? Media and broadcast operations Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

12 On a scale of 1 to 5, where 1 is not at all serious and 5 is very serious, how serious do you think the threat of cyber-attack is in each of the following Olympics IT functions? Co-ordination between Olympic venue IT systems Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

13 On a scale of 1 to 5, where 1 is not at all serious and 5 is very serious, how serious do you think the threat of cyber-attack is in each of the following Olympics IT functions? Overall systems failure Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

14 On a scale of 1 to 5, where 1 is not at all serious and 5 is very serious, how serious do you think the threat of cyber-attack is in each of the following Olympics IT functions? Transport infrastructure Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

15 In your view where do you think members of the public are most at risk if a cyber-attack were to take place relating to the Olympics? Base: 100 UK Business people, 100 UK Journalists, 100 MPs

16 On a scale of 1 to 5, where 1 is not at all concerned and 5 is very concerned, please state how concerned you are about each of the following being vulnerable to a cyber-attack. Mean scores Base: 100 UK Business people, 100 UK Journalists, 100 MPs

17 On a scale of 1 to 5, where 1 is not at all concerned and 5 is very concerned, please state how concerned you are about each of the following being vulnerable to a cyber-attack. UK nuclear installations Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

18 On a scale of 1 to 5, where 1 is not at all concerned and 5 is very concerned, please state how concerned you are about each of the following being vulnerable to a cyber-attack. High street banks Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

19 On a scale of 1 to 5, where 1 is not at all concerned and 5 is very concerned, please state how concerned you are about each of the following being vulnerable to a cyber-attack. The National Grid Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

20 On a scale of 1 to 5, where 1 is not at all concerned and 5 is very concerned, please state how concerned you are about each of the following being vulnerable to a cyber-attack. The Olympic Games Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

21 On a scale of 1 to 5, where 1 is not at all concerned and 5 is very concerned, please state how concerned you are about each of the following being vulnerable to a cyber-attack. Your personal computer Base: 100 UK Business people, 100 UK Journalists, 100 MPs Mean score

22 I feel I don’t understand cyber security and the cyber threat enough Base: 100 UK Business people, 100 UK Journalists, 100 MPs

23 I feel that I do understand cyber security and the cyber threat enough Base: 100 UK Business people, 100 UK Journalists, 100 MPs

24 I think the risk of cyber-attack will grow in the future Base: 100 UK Business people, 100 UK Journalists, 100 MPs

25 I would like to know more about cyber security and the cyber threat Base: 100 UK Business people, 100 UK Journalists, 100 MPs