Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

New Study Says Consumers Will Share Personal Data for the Right Rewards

January 14, 2016

A new Pew Research Center study finds that there are a variety of circumstances under which many Americans would share personal information or permit surveillance in return for getting something of perceived value. For instance, a majority of Americans think it would be acceptable (by a 54% to 24% margin) for employers to install monitoring cameras following a series of workplace thefts. Nearly half (47%) say the basic bargain offered by retail loyalty cards – namely, that stores track their purchases in exchange for occasional discounts – is acceptable to them, even as a third (32%) call it unacceptable.

Still, the study noted that many Americans are cautious about disclosing their information and frequently unhappy about what happens to that information once companies have collected it. For example, when presented with a scenario in which they might save money on their energy bill by installing a “smart thermostat” that would monitor their movements around the home, most adults consider this an unacceptable tradeoff (by a 55% to 27% margin).

The study examined six different scenarios: Office surveillance cameras, sharing health information, retail loyalty cards, auto insurance, free social media and smart thermostats.

In online focus groups and in open-ended responses to a nationally representative online survey, the survey found that many people expressed concerns about the safety and security of their personal data in light of numerous high-profile data breaches. They also regularly expressed anger about the barrage of unsolicited emails, phone calls, customized ads or other contacts that inevitably arises when they elect to share some information about themselves.

The survey noted that the findings suggest that the phrase that best captures Americans’ views on the choice between privacy vs. disclosure of personal information is, “It depends.” People’s views on the key tradeoff of the modern, digital economy – that consumers offer information about themselves in exchange for something of value – are shaped by both the conditions of the deal and the circumstances of their lives. In extended comments online and through focus groups, people indicated that their interest and overall comfort level depends on the company or organization with which they are bargaining and how trustworthy or safe they perceive the firm to be. It depends on what happens to their data after they are collected, especially if the data are made available to third parties. And it also depends on how long the data are retained.

Furthermore, the survey noted that most of the public said their consideration of each individual scenario is conditional: Their answer depends on the circumstances of the offer, their trust in those collecting and storing the data, and their sense of what the aftermath of data-sharing might look like.

Some issues people ponder as they consider privacy tradeoffs include the likelihood of getting spam, the risk of data breaches and the special intimacy tied to location data and overdone customer profiling. The survey found:

•Scammers and hackers are a constant threat.

•Location data seems especially precious in the age of the smartphone.

•Profiling sometimes seems creepy.

•People are not happy when data are collected for one purpose but are used for other, often more invasive purposes.

Yet, the survey noted that even as consumers worry about the negative downstream consequences of sharing their personal information, the findings also illustrate that consumers understand and appreciate the benefits of sharing – at least under certain circumstances. The key themes include:

•Free is a good price.

•Sharing helps lubricate commercial and social interactions.

•Certain realms are not inherently private and different rules about surveillance and sharing apply.

The full study is at http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/

 


 

KEYWORDS: data breach data privacy information retail security security cameras surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • PII a big concern for consumers as online shopping increasing

    Cybersecurity remains a constant concern for consumers, says study

    See More
  • consumers not comfortable with facial recognition in stores

    Are consumers comfortable with facial recognition? It depends says new study.

    See More
  • spilled pill bottle

    New study says opioid crisis is not over: Overdoses will spike in rural and urban areas

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing