the malta independent - mita feature 19th february 2015

1
T he positives that come with enhancing citizen access to government and environmental data are limitless. Not only does open data, or information that is freely available for everyone to use, activate public transparency and en- able deeper citizen engagement, it po- tentially creates the means for a more community-driven society. The ques- tion is: how are organisations and in- dividuals using this data to have the greatest impact? Just as big data analytics are only valuable when they’re used to fix a specific problem, open data serves communities best when it’s analysed and then humanised through story- telling. The Open Data Institute (ODI) in London works with digital and social impact experts to promote open data innovation and incubate, mentor and coach startups developing open data solutions. As part of its initiative to cultivate the effective use of data, the institute offers a course for journalists on finding stories in open data. When you’re crystal clear about the problem you’re looking to solve, the stories that unfold through exploring datasets and creating summary sta- tistics are significantly more visible. Stories are the driving force of social change. Take for example the ODI startup Spend Network, which analyses data to uncover government spending trends. This company revealed that the UK inefficiently spent £22 billion (€29.7 bn), which was originally in- tended to go to businesses and fuel the economy. The repercussions of government actions or lack thereof are just one side of what open data can disclose. Open data can also be used to predict the fu- ture. Through a partnership with Telefónica Dynamic Insights, ODI de- veloped tools to estimate the poten- tial impact of planned fire station closures in London. Maps that show the possible effects of fire station clo- sures are generated using two datasets, based on fire service atten- dance time to incidents and mobile phone activity in different locations. It’s free and readily available. What are other advantages of open data? Liz Carolan, International Develop- ment Manager at the ODI, says a challenge for many organisations can be the time and resources needed to crunch large data sets. “By opening up their data, the po- tential can be unlocked,” says Car- olan. “Take Medicare in the US, for instance, which has a huge range of data at its disposal. By making its data open, Medicare enabled anyone to access and analyse it. In 2012, the New York Times undertook some analysis and identified a number of anomalies within the data including what could appear to be abnormally high Medicare claims. This analysis enabled not only the public to be made aware of the potential existence of such instances, but also for that data to be fed back into Medicare’s system so it can identify and explore such anomalies.” How can open data be used for businesses? According to a McKinsey report, seven sectors could generate $3 mil- lion (€2.6m) thanks for open data. However, making open data an ac- tual business itself is proving to be somewhat tricky. Yodit Stanton, founder and CEO of the ODI incu- bated startup Opensenors.io, which processes Internet of Things data, says that the biggest issue with open data is that the industry hasn’t figured out how to build a working business model. “It’s [open data’s] not like social net- works, where you can make money with advertising,” says Stanton. “While big data is good for advertis- ing companies, data from the Internet of Things would be good for insur- ance companies, but then you need to think through what the implications are.” The Opensensors.io platform al- lows users to create open data proj- ects for free through information col- lected from sensors. “People connect to us and publish sensor information, so anyone can create open data proj- ects,” shares Stanton. “We want to en- courage people to have access to things.” Over 500 people currently use Opensensors.io. One of the projects the company is deploying involves a series of parking sensors in 12 cities in the UK. Stanton says that for this kind the automated parking service to ma- ture, the data needs to be available. That way a city manger can access it; a smartphone can plug into it. The perspective of the ODI is that in order to make a business case for open data, organisations need to un- derstand the potential of the data they possess, examine the data flow arrangements they have with other groups, and determine which ones can be most affected through receiv- ing more or better quality data. No matter how free and open any data is, its value could be priceless for some. The Malta Independent | Thursday 19 February 2015 13 12 The Malta Independent | Thursday 19 February 2015 B eing engaging online has become really im- portant especially for small businesses. The web is the tool which links current and potential cus- tomers to small businesses. Ac- cording to a new study, the majority of small businesses that are using online engagement tools have reported an increase in new clients through their online channels Through open data, Govern- ment information can be made freely available for everyone with the aim that it is used to solve challenges in society and business. It is also an opportu- nity to predict the future and use it to bring about social change. The Open Data Institute in Lon- don is doing its best to promote open data even by coaching start- ups on how to make the best use of it. 2015 is set to be the year in which CIOs emphasise more on IT security. A new study shows that during the coming months, the majority of CIOs will be tak- ing one or more measures to en- hance their IT security – the most common of which is training em- ployees on IT security issues. Would it ever cross your mind of making an important pur- chase, such as getting a loan or buying a car, through your mo- bile? Not only is it possible, but many are turning to their favourite mobile gadgets to make such acquisitions. All ICT Features are available on www.mita.gov.mt/ictfeature The Malta Independent ICT Feature Roderick Spiteri Roderick Spiteri is Marketing and Communications Manager at MITA and editor of Malta Independent ICT feature Capturing the power of open data Melissa Jun Rowley is a seasoned journalist and social entrepreneur focused on the intersection of tech- nology and social impact. She is currently developing “Magic Mak- ers,” a docu-series spotlighting teens using STEAM (Science, Technology, Engineering, Art & Math) to advance humanity. Melissa is also the Editorial Direc- tor of The Toolbox, a social change platform which aggregates and pro- motes digital tools for activism. On the startup front, she is building a new social giving ecosystem called Givvio, bringing together brands, celebrities and everyday activists to work together in teams to amplify their social good campaigns. Melissa Jun Rowley N ew research tracking the engagement habits of small businesses re- vealed that online client engagement is the lifeblood of this business com- munity. The data shows that 67% of small businesses leveraging on- line engagement tools, such as on- line scheduling, payments and document sharing, reported an in- crease in obtaining new clientele directly through their website – versus only 34% from businesses that did not have these tools inte- grated into their website. The research surveyed nearly 200 North American entrepreneurs, marketers, small business owners and technology decision makers from a wide range of industries, with 75% of respondents repre- senting small businesses with five or fewer employees. According to the survey, nearly 40% of small businesses believe that the volume of new clients they get online ‘needs improvement’. This means that the need for more engagement opportunities is seen as critical. Online engagement tools enable small businesses to communicate and service clients more frequently, with respondents citing a 10% increase in daily in- teractions with customers and con- tact with them at least once per week via their website. These technologies save small businesses time and money on of- fice tasks as well. In fact, half of the tech laggards (respondents not using any form of client engage- ment technology) said they are less likely to automate backend office tasks such as reminders, email, ap- pointment booking, billing and payments. However, when asked which tasks they would automate if given the opportunity, the top three included scheduling confir- mations and reminders, follow up emails and appointment booking. Another area of opportunity for small businesses is mobile. Less than half (45%) of the respondents are leveraging their mobile devices to manage daily client interactions and related day-to-day backend tasks. Of those mobile users, they only utilise it to manage less than 10% of their daily activities. With its rapid adoption amongst today’s millennial-influenced au- dience and a ubiquity that is un- matched, mobile is a key channel that can provide small businesses a competitive edge without re- quiring them to be at a desk or to be in front of a computer screen to handle client engagement activi- ties. Additionally, with nearly 6 billion mobile devices worldwide it is a preferred channel that today’s consumer is beginning to prioritise when interacting with a business. This makes implement- ing mobile friendly websites a top task that all small businesses should be focusing on in 2015. “Today, small businesses need every advantage they can get to stay relevant and compete for business against their larger coun- terparts, and having good client communication and retention is a huge aspect of accomplishing this task,” said Itzik Levy, founder and CEO of vCita. “With a successful online client engagement strategy, small businesses can ensure they drive new and repeat business and easily streamline those interactions and eliminate hours of adminis- trative work.” The research was sponsored by vCita a company that works with and advises businesses around their online client engagement. C hief information officers (CIOs) are taking a multipronged ap- proach to protecting sensitive company information, a new sur- vey by Robert Half Technology shows. The majority of CIOs interviewed are currently taking or planning to take steps in the next 12 months to improve in- formation technology (IT) security at their firms. The most common strategies include strengthening employee training on secu- rity issues (53%), vetting firms that have ac- cess to company data more closely (31%) and contracting with third-party vendors and adding security tools (31%). The survey was developed and con- ducted by Robert Half Technology, a lead- ing provider of IT professionals on a project and full-time basis, and includes re- sponses from more than 270 CIOs from a random sample of Canadian companies with 100 or more employees. CIOs were asked, “Which, if any, of the following measures is your company cur- rently taking, or planning to take within the next 12 months to enhance IT security?” Their responses: Currently taking ANY of the following measures 69% Enhance employee training on IT security issues 53% Enhance vetting of firms with access to company data 31% Contract with third-party vendors or add tools to enhance security 31% Add IT security personnel 22% Implement multifactor authentication processes 21% Other measures 1% Not currently or planning to take any of the measures identified 31% * Multiple responses were allowed. “Companies that effectively prioritise their IT protection, understand that it’s an ongoing commitment that requires contin- ual enhancements,” said Deborah Bot- tineau, senior regional manager of Robert Half Technology. “Sound security strate- gies consist of staying in the forefront of best-practice standards, conducting fre- quent risk assessments, and implementing adequate employee training and aware- ness.” Bottineau added, “Having the right peo- ple in place to implement these security changes is essential.” A strong organisational communications plan and sound relationships with vendors will help improve security measures, but it all begins with the team responsible for managing those efforts. Robert Half Tech- nology offers the top three attributes of ef- fective security employees and what to ask them when hiring: Future Focused It’s important to ensure candidates will be an asset to your security efforts, bringing a broad range of experiences that will allow them to identify vulnerabilities in your net- work. Use this opportunity to discuss their use of proven methodologies, best prac- tices and risk intelligence in previous roles and try to assess how they would apply them in your company. Ask candidates: “How would you create a security-con- scious culture in our business?” Security Certifications A well-rounded security professional will not only take steps to protect the organisa- tion, but also to stay ahead in the industry. With so many widely recognised certifica- tions available - like CISSP (Certified Infor- mation Systems Security Professional), CISM (Certified Information Security Man- ager) and CompTIA certifications - it’s not uncommon for candidates to have these on their resumes. While certifications show an investment and commitment to growing their knowledge base, it’s important to as- sess applicants’ real-world experience, too. Ask candidates: “How have your security certifications prepared you for this role?” Soft Skills IT security professionals should have impeccable communication skills. Exter- nally, they should be build- ing solid relationships with firms and vendors that have access to company data or may be brought on to help with security efforts. Inter- nally, they should be able to raise awareness to potential threats and explain security measures in a way that will help guide employee behav- iours. The prevalence of bring your own device (BYOD) policies, for exam- ple, is just one of the many trends that make clear com- munication skills vital to en- suring companywide compliance. It’s essential for security team members to build partnerships across the organization to help increase vigilance throughout. Ask candidates: “What would be your communications ap- proach around security, po- tential threats and best practices to senior leadership and employees company- wide?” C onsumers are slowly becoming more comfortable with their mobile purchasing habits. Ac- cording to a new study by Bankrate.com, half of mobile internet users have used a mobile device to make a major financial purchase, such as getting a mortgage, buying a car or in- vesting in stocks. Consumers who most likely have made a large transaction on their mobile device were between the ages of 30 and 49 (58% have done so). Despite their tech-savvy reputation, only 46% of millennials (18- 29 year-olds) have purchased major items on a mobile device. That’s only slightly more than people age 50 and older. “There’s evidence that Americans are growing more comfortable with using mobile devices to make purchases either online or at the checkout,” says Mike Cetera, mobile finance analyst for Bankrate.com. “But we were curious whether people are using their phones to do more than buy a cup of coffee. This survey shows there are people willing to make major financial commitments over their phone or tablet.” Although mobile purchases are grow- ing, Americans are moving cautiously. The survey found that only 12% “al- ways” or “often” use a phone or tablet for larger purchases. Seniors appear to be the most reluctant to make large mobile transactions; over 6 in 10 have never made a big-ticket purchase this way. Data security was named as the biggest concern among those who don’t regu- larly use mobile devices for financial transactions. Older people were far more likely to cite security fears as their pri- mary reason not to use a mobile device to conduct major financial transactions. 53% of respondents 65 and older ex- pressed this concern, while just 34% of millennials said this was the main reason to avoid large mobile transactions. The survey was conducted by Princeton Survey Research Associates International. Online client engagement is key to small business success Half of mobile internet users have used a mobile device to make a major purchase Surge in IT security measures anticipated in 2015

Upload: malta-information-technology-agency-mita

Post on 08-Apr-2016

224 views

Category:

Documents


1 download

DESCRIPTION

Being engaging online has become really important especially for small businesses. The web is the tool which links current and potential customers to small businesses. According to a new study, the majority of small businesses that are using online engagement tools have reported an increase in new clients through their online channels

TRANSCRIPT

Page 1: The Malta Independent - MITA Feature 19th February 2015

The positives that comewith enhancing citizenaccess to governmentand environmental dataare limitless. Not only

does open data, or information that isfreely available for everyone to use,activate public transparency and en-able deeper citizen engagement, it po-tentially creates the means for a morecommunity-driven society. The ques-tion is: how are organisations and in-dividuals using this data to have thegreatest impact?

Just as big data analytics are onlyvaluable when they’re used to fix aspecific problem, open data servescommunities best when it’s analysedand then humanised through story-telling.

The Open Data Institute (ODI) inLondon works with digital and socialimpact experts to promote open datainnovation and incubate, mentor andcoach startups developing open datasolutions. As part of its initiative tocultivate the effective use of data, theinstitute offers a course for journalistson finding stories in open data. Whenyou’re crystal clear about the problemyou’re looking to solve, the stories

that unfold through exploringdatasets and creating summary sta-tistics are significantly more visible.Stories are the driving force of socialchange.

Take for example the ODI startupSpend Network, which analyses datato uncover government spendingtrends. This company revealed thatthe UK inefficiently spent £22 billion(€29.7 bn), which was originally in-tended to go to businesses and fuelthe economy.

The repercussions of governmentactions or lack thereof are just one sideof what open data can disclose. Opendata can also be used to predict the fu-ture. Through a partnership withTelefónica Dynamic Insights, ODI de-veloped tools to estimate the poten-tial impact of planned fire stationclosures in London. Maps that showthe possible effects of fire station clo-sures are generated using twodatasets, based on fire service atten-dance time to incidents and mobilephone activity in different locations.

It’s free and readily available.What are other advantages ofopen data? Liz Carolan, International Develop-ment Manager at the ODI, says achallenge for many organisations canbe the time and resources needed tocrunch large data sets.

“By opening up their data, the po-tential can be unlocked,” says Car-olan. “Take Medicare in the US, forinstance, which has a huge range of

data at its disposal. By making its dataopen, Medicare enabled anyone toaccess and analyse it. In 2012, theNew York Times undertook someanalysis and identified a number ofanomalies within the data includingwhat could appear to be abnormallyhigh Medicare claims. This analysisenabled not only the public to bemade aware of the potential existenceof such instances, but also for thatdata to be fed back into Medicare’ssystem so it can identify and exploresuch anomalies.”

How can open data be usedfor businesses?According to a McKinsey report,seven sectors could generate $3 mil-lion (€2.6m) thanks for open data.However, making open data an ac-tual business itself is proving to besomewhat tricky. Yodit Stanton,founder and CEO of the ODI incu-bated startup Opensenors.io, whichprocesses Internet of Things data,says that the biggest issue with opendata is that the industry hasn’t figuredout how to build a working businessmodel.

“It’s [open data’s] not like social net-works, where you can make moneywith advertising,” says Stanton.“While big data is good for advertis-ing companies, data from the Internetof Things would be good for insur-ance companies, but then you need tothink through what the implicationsare.”

The Opensensors.io platform al-

lows users to create open data proj-ects for free through information col-lected from sensors. “People connectto us and publish sensor information,so anyone can create open data proj-ects,”shares Stanton. “We want to en-courage people to have access tothings.”

Over 500 people currently useOpensensors.io. One of the projectsthe company is deploying involves aseries of parking sensors in 12 cities inthe UK. Stanton says that for this kindthe automated parking service to ma-

ture, the data needs to be available.That way a city manger can access it;a smartphone can plug into it.

The perspective of the ODI is that inorder to make a business case foropen data, organisations need to un-derstand the potential of the data theypossess, examine the data flowarrangements they have with othergroups, and determine which onescan be most affected through receiv-ing more or better quality data. Nomatter how free and open any data is,its value could be priceless for some.

The Malta Independent | Thursday 19 February 2015 1312 The Malta Independent | Thursday 19 February 2015

Being engaging onlinehas become really im-portant especially forsmall businesses. Theweb is the tool which

links current and potential cus-tomers to small businesses. Ac-cording to a new study, themajority of small businesses thatare using online engagementtools have reported an increase innew clients through their onlinechannels

Through open data, Govern-

ment information can be madefreely available for everyone withthe aim that it is used to solvechallenges in society andbusiness. It is also an opportu-nity to predict the future and useit to bring about social change.The Open Data Institute in Lon-don is doing its best to promoteopen data even by coaching start-ups on how to make the best useof it.

2015 is set to be the year inwhich CIOs emphasise more on

IT security. A new study showsthat during the coming months,the majority of CIOs will be tak-ing one or more measures to en-hance their IT security – the mostcommon of which is training em-ployees on IT security issues.

Would it ever cross your mindof making an important pur-chase, such as getting a loan orbuying a car, through your mo-bile? Not only is it possible, butmany are turning to theirfavourite mobile gadgets to make

such acquisitions.

All ICT Features are available onwww.mita.gov.mt/ictfeature

The Malta Independent ICT Feature

RoderickSpiteri

Roderick Spiteri is Marketing andCommunications Manager at

MITA and editor of MaltaIndependent ICT feature

Capturing the power of open data

Melissa Jun Rowley is a seasonedjournalist and social entrepreneurfocused on the intersection of tech-

nology and social impact. She iscurrently developing “Magic Mak-

ers,” a docu-series spotlightingteens using STEAM (Science,

Technology, Engineering, Art &Math) to advance humanity.

Melissa is also the Editorial Direc-tor of The Toolbox, a social change

platform which aggregates and pro-motes digital tools for activism. Onthe startup front, she is building anew social giving ecosystem calledGivvio, bringing together brands,

celebrities and everyday activists towork together in teams to amplify

their social good campaigns.

MelissaJun Rowley

New research trackingthe engagement habitsof small businesses re-vealed that onlineclient engagement is

the lifeblood of this business com-munity. The data shows that 67%of small businesses leveraging on-line engagement tools, such as on-line scheduling, payments anddocument sharing, reported an in-crease in obtaining new clienteledirectly through their website –versus only 34% from businessesthat did not have these tools inte-grated into their website.

The research surveyed nearly 200North American entrepreneurs,marketers, small business ownersand technology decision makersfrom a wide range of industries,with 75% of respondents repre-senting small businesses with fiveor fewer employees.

According to the survey, nearly40% of small businesses believethat the volume of new clients they

get online ‘needs improvement’.This means that the need for moreengagement opportunities is seenas critical. Online engagementtools enable small businesses tocommunicate and service clientsmore frequently, with respondentsciting a 10% increase in daily in-teractions with customers and con-

tact with them at least once perweek via their website.

These technologies save smallbusinesses time and money on of-fice tasks as well. In fact, half ofthe tech laggards (respondents notusing any form of client engage-ment technology) said they are lesslikely to automate backend office

tasks such as reminders, email, ap-pointment booking, billing andpayments. However, when askedwhich tasks they would automateif given the opportunity, the topthree included scheduling confir-mations and reminders, follow upemails and appointment booking.

Another area of opportunity forsmall businesses is mobile. Lessthan half (45%) of the respondentsare leveraging their mobile devicesto manage daily client interactionsand related day-to-day backendtasks. Of those mobile users, theyonly utilise it to manage less than10% of their daily activities. Withits rapid adoption amongsttoday’s millennial-influenced au-dience and a ubiquity that is un-matched, mobile is a key channelthat can provide small businessesa competitive edge without re-quiring them to be at a desk or tobe in front of a computer screen tohandle client engagement activi-ties. Additionally, with nearly 6

billion mobile devices worldwideit is a preferred channel thattoday’s consumer is beginning toprioritise when interacting with abusiness. This makes implement-ing mobile friendly websites a toptask that all small businessesshould be focusing on in 2015.

“Today, small businesses needevery advantage they can get tostay relevant and compete forbusiness against their larger coun-terparts, and having good clientcommunication and retention is ahuge aspect of accomplishing thistask,” said Itzik Levy, founder andCEO of vCita. “With a successfulonline client engagement strategy,small businesses can ensure theydrive new and repeat business andeasily streamline those interactionsand eliminate hours of adminis-trative work.”

The research was sponsored byvCita a company that works withand advises businesses aroundtheir online client engagement.

Chief information officers (CIOs)are taking a multipronged ap-proach to protecting sensitivecompany information, a new sur-vey by Robert Half Technology

shows. The majority of CIOs interviewedare currently taking or planning to takesteps in the next 12 months to improve in-formation technology (IT) security at theirfirms. The most common strategies includestrengthening employee training on secu-rity issues (53%), vetting firms that have ac-cess to company data more closely (31%)and contracting with third-party vendorsand adding security tools (31%).

The survey was developed and con-ducted by Robert Half Technology, a lead-ing provider of IT professionals on aproject and full-time basis, and includes re-sponses from more than 270 CIOs from arandom sample of Canadian companieswith 100 or more employees.

CIOs were asked, “Which, if any, of thefollowing measures is your company cur-rently taking, or planning to take withinthe next 12 months to enhance IT security?”Their responses:Currently taking ANY of the followingmeasures 69%Enhance employee training on IT securityissues 53%Enhance vetting of firms with access tocompany data

31%Contract with third-party vendors or addtools to enhance security 31%Add IT security personnel 22%Implement multifactor authenticationprocesses 21%Other measures 1%Not currently or planning to take any of themeasures identified 31%* Multiple responses were allowed.

“Companies that effectively prioritisetheir IT protection, understand that it’s anongoing commitment that requires contin-ual enhancements,” said Deborah Bot-tineau, senior regional manager of RobertHalf Technology. “Sound security strate-gies consist of staying in the forefront ofbest-practice standards, conducting fre-quent risk assessments, and implementingadequate employee training and aware-ness.”

Bottineau added, “Having the right peo-ple in place to implement these securitychanges is essential.”

A strong organisational communicationsplan and sound relationships with vendorswill help improve security measures, but itall begins with the team responsible formanaging those efforts. Robert Half Tech-nology offers the top three attributes of ef-fective security employees and what to askthem when hiring:

Future FocusedIt’s important to ensure candidates will bean asset to your security efforts, bringing abroad range of experiences that will allowthem to identify vulnerabilities in your net-work. Use this opportunity to discuss theiruse of proven methodologies, best prac-tices and risk intelligence in previous rolesand try to assess how they would apply

them in your company. Ask candidates:“How would you create a security-con-scious culture in our business?”

Security CertificationsA well-rounded security professional willnot only take steps to protect the organisa-tion, but also to stay ahead in the industry.With so many widely recognised certifica-tions available - like CISSP (Certified Infor-mation Systems Security Professional),CISM (Certified Information Security Man-ager) and CompTIA certifications - it’s notuncommon for candidates to have these ontheir resumes. While certifications show aninvestment and commitment to growingtheir knowledge base, it’s important to as-sess applicants’ real-world experience, too.Ask candidates: “How have your securitycertifications prepared you for this role?”

Soft SkillsIT security professionalsshould have impeccablecommunication skills. Exter-nally, they should be build-ing solid relationships withfirms and vendors that haveaccess to company data ormay be brought on to helpwith security efforts. Inter-nally, they should be able toraise awareness to potentialthreats and explain securitymeasures in a way that willhelp guide employee behav-iours. The prevalence ofbring your own device(BYOD) policies, for exam-ple, is just one of the manytrends that make clear com-munication skills vital to en-suring companywidecompliance. It’s essential forsecurity team members tobuild partnerships across theorganization to help increasevigilance throughout. Askcandidates: “What would beyour communications ap-proach around security, po-tential threats and bestpractices to senior leadershipand employees company-wide?”

Consumers are slowly becomingmore comfortable with theirmobile purchasing habits. Ac-cording to a new study byBankrate.com, half of mobile

internet users have used a mobile deviceto make a major financial purchase, suchas getting a mortgage, buying a car or in-vesting in stocks.

Consumers who most likely have madea large transaction on their mobile devicewere between the ages of 30 and 49 (58%have done so). Despite their tech-savvyreputation, only 46% of millennials (18-29 year-olds) have purchased major itemson a mobile device. That’s only slightlymore than people age 50 and older.

“There’s evidence that Americans aregrowing more comfortable with usingmobile devices to make purchases eitheronline or at the checkout,” says MikeCetera, mobile finance analyst forBankrate.com. “But we were curiouswhether people are using their phones todo more than buy a cup of coffee. Thissurvey shows there are people willing tomake major financial commitments overtheir phone or tablet.”

Although mobile purchases are grow-ing, Americans are moving cautiously.The survey found that only 12% “al-ways” or “often” use a phone or tablet forlarger purchases. Seniors appear to bethe most reluctant to make large mobiletransactions; over 6 in 10 have nevermade a big-ticket purchase this way.

Data security was named as the biggestconcern among those who don’t regu-larly use mobile devices for financialtransactions. Older people were far morelikely to cite security fears as their pri-mary reason not to use a mobile device toconduct major financial transactions.53% of respondents 65 and older ex-pressed this concern, while just 34% ofmillennials said this was the main reasonto avoid large mobile transactions.

The survey was conducted by PrincetonSurvey Research Associates International.

Online client engagement is key to small business success

Half of mobileinternet usershave used amobile device to make a majorpurchase

Surge in IT securitymeasures anticipated in 2015