Bots in the Twittersphere
An estimated two-thirds of tweeted links to popular websites are posted by automated accounts – not human beings.
Crossing the Line: What Counts as Online Harassment?
Americans agree that certain behaviors – like direct personal threats – constitute online harassment. But they are more divided on others, such as sending unkind messages or publicly sharing a private conversation.
Shareable facts on Americans’ views and attitudes toward automation technologies
Key findings from a @pewresearch study of Americans’ views of and experiences with automation
Cybersecurity Knowledge Quiz
A majority of online adults can identify a strong password and know the risks of using public Wi-Fi. Yet, many struggle with more technical cybersecurity concepts.
Video: The Research Lifecycle – A Look Inside Pew Research Center
Lee Rainie and Dr. Cary Funk explain the type of research they do with Pew Research Center, as well as how the Center chooses what projects to tackle, in this video from SAGE.
The Scientific and Ethical Elements of Human Enhancement
Human enhancement may be just around the corner. How do Americans view these emerging technologies that may one day enhance our human capabilities?
Privacy and Information Sharing: Scenarios
Survey respondents from the report Privacy and Information Sharing were presented with six hypothetical scenarios, each of which involved sharing some level of personal data in exchange for using a product or service.
Who plays video games in America?
Though the majority of Americans think most video games players are men, equal numbers of men and women report playing video games. Yet, men are twice as likely to call themselves “gamers.”
Job Seeking is Going Mobile
More Americans are using their smartphones during their job search, whether to look up information about a job, create a resume or cover letter, or fill out a job application.
Google Play Store Apps Permissions
Pew Research Center performed an analysis of 1,041,336 apps in the Google Play Store as of September 2014 to determine the specific permissions requested by each app.