Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Seeking Anonymous But Finding It Impossible

In Study, Internet Users Increasingly Distrustful of Online

Fraud, ID Theft, Even Physical Dangers

September 10, 2013

A new survey by the Pew Research Center Internet Project finds that most Internet users would like to be anonymous online, but many think it is not possible to be completely anonymous online.

Some of the key findings

86 percent of Internet users have taken steps online to remove or mask their digital footprints ranging from clearing cookies to encrypting their email. 55 percent of Internet users have taken steps to avoid observation by specific people, organizations, or the government.

The representative survey of 792 Internet users also finds that notable numbers of Internet users say they have experienced problems because others stole their personal information or otherwise took advantage of their visibility online.

21 percent of Internet users have had an email or social networking account compromised or taken over by someone else without permission. 12 percent have been stalked or harassed online. 11 percent have had important personal information stolen such as their Social Security Number, credit card, or bank account information. 6 percent have been the victim of an online scam and lost money. 6 percent have had their reputation damaged because of something that happened online. 4 percent have been led into physical danger because of something that happened online.

Most Internet users know that key pieces of personal information about them are available online such as photos and videos of them, their email addresses, birth dates, phone numbers, home addresses, and the groups to which they belong. And growing numbers of Internet users, 50 percent, say they are worried about the amount of personal information about them that is online, a figure that has jumped from 33 percent who expressed such worry in 2009.

Asked whether current laws provide reasonable protections of online privacy, 68 percent of Internet users believe the laws are not good enough in protecting their privacy online.

Users clearly want the option of being anonymous online and increasingly worry that this is not possible, says Lee Rainie, director of the Pew Research Center Internet Project and an author of a report on the survey findings. Their concerns apply to an entire ecosystem of surveillance. In fact, they are more intent on trying to mask their personal information from hackers, advertisers, friends and family members than they are trying to avoid observation by the government.

Many users employ an array of strategies to mask their identities and try to avoid detection. Some 64 percent clear cookies and their browser history and 41 percent have disabled cookies. They also delete material they have posted in the past, create usernames that are hard to tie to them, use public computers to browse, and give inaccurate information about themselves. Some 14 percent say they at times encrypt email and 14 percent say they use services like virtual networks that allow them to browse without being tied to a specific IP address.

Our biggest surprise was discovering that many Internet users have tried to conceal their identity or their communications from others, notes Sara Kiesler, an author of the report and the Hillman Professor of Computer Science and Human-Computer Interaction at Carnegie Mellon. It is not just a small coterie of hackers. Almost everyone has taken some action to avoid surveillance. And despite their knowing that anonymity is virtually impossible, most Internet users think they should be able to avoid surveillance online. They think they should have a right to anonymity for certain things, like hiding posts from certain people or groups.

Most users said would like control over their personal information, saying in many cases it is very important to them that only they or the people they authorize should be given access to such things as the content of their emails, the people to whom they are sending emails, the place where they are when they are online, and the content of the files they download.

These findings reinforce the notion that privacy is not an all or nothing proposition for Internet users, says Mary Madden, senior researcher at Pew Research. People choose different strategies for different activities, for different content, to mask themselves from different people, at different times in their lives. What they clearly want is the power to decide who knows what about them.

KEYWORDS: fraud trends identity theft internet internet security

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing