{"id":93750,"date":"2017-01-26T00:16:54","date_gmt":"2017-01-26T05:16:54","guid":{"rendered":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/2017\/01\/26\/acknowledgments-33-3\/"},"modified":"2024-04-14T04:17:11","modified_gmt":"2024-04-14T09:17:11","slug":"acknowledgments-33-3","status":"publish","type":"post","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/acknowledgments-33-3\/","title":{"rendered":"Acknowledgments"},"content":{"rendered":"<p class=\"wp-block-paragraph\">This report was made possible by The Pew Charitable Trusts. It is a collaborative effort based on the input and analysis of the following individuals:<\/p>\n\n<h4 id=\"primary-researchers\" class=\"wp-block-heading\">Primary researchers<\/h4>\n\n<p class=\"wp-block-paragraph\">Kenneth Olmstead, <em>Research Associate\n<\/em>Aaron Smith, <em>Associate Director, Research<\/em><\/p>\n\n<h4 id=\"research-team\" class=\"wp-block-heading\">Research team<\/h4>\n\n<p class=\"wp-block-paragraph\">Lee Rainie, <em>Director, Internet, Science and Technology Research\n<\/em>Maeve Duggan, <em>Research Associate\n<\/em>Monica Anderson, <em>Research Associate\n<\/em>Andrew Perrin, <em>Research Assistant\u00a0\u00a0\u00a0\u00a0 <\/em><\/p>\n\n<h4 id=\"editorial-and-graphic-design\" class=\"wp-block-heading\">Editorial and graphic design<\/h4>\n\n<p class=\"wp-block-paragraph\">Margaret Porteus, <em>Information Graphics Designer\n<\/em>Shannon Greenwood,<em> Copy Editor\n<\/em><\/p>\n\n<h4 id=\"communications-and-web-publishing\" class=\"wp-block-heading\">Communications and web publishing<\/h4>\n\n<p class=\"wp-block-paragraph\">Dana Page, <em>Senior Communications Manager\n<\/em>Shannon Greenwood,<em> Associate Digital Producer\n<\/em>Travis Mitchell,<em> Digital Producer<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>This report was made possible by The Pew Charitable Trusts. It is a collaborative effort based on the input and analysis of the following individuals: Primary researchers Kenneth Olmstead, Research Associate Aaron Smith, Associate Director, Research Research team Lee Rainie, Director, Internet, Science and Technology Research Maeve Duggan, Research Associate Monica Anderson, Research Associate Andrew [&hellip;]<\/p>\n","protected":false},"author":367,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sub_headline":"","sub_title":"","_crdt_document":"","_prc_public_revisions":[],"_ppp_expiration_hours":0,"_ppp_enabled":false,"ai_generated_summary":"","relatedPosts":[],"reportMaterials":[],"multiSectionReport":[],"package_parts__enabled":false,"package_parts":[],"_prc_fork_parent":0,"_prc_fork_status":"","_prc_active_fork":0,"datacite_doi":"","datacite_doi_citation":"","_prc_seo_qr_attachment_id":0,"spoken_article_player_enabled":true,"bylines":[],"acknowledgements":[],"displayBylines":true,"footnotes":"","prc_watchers":[]},"categories":[96,322,297,80,298,308,279,305,110,364,307],"tags":[],"bylines":[],"collection":[],"datasets":[],"level_of_effort":[],"primary_audience":[],"information_type":[],"_post_visibility":[],"formats":[458],"_fund_pool":[],"languages":[],"regions-countries":[],"research-teams":[526],"workflow-status":[],"class_list":["post-93750","post","type-post","status-publish","format-standard","hentry","category-defense-national-security","category-email","category-emerging-technology","category-federal-government","category-future-of-the-internet","category-mobile","category-online-privacy-security","category-platforms-services","category-privacy-rights","category-public-knowledge","category-social-media","formats-report","research-teams-internet"],"label":false,"post_parent":93702,"word_count":89,"canonical_url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/acknowledgments-33-3\/","art_direction":{"A1":{"id":"116931","rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png?w=564&h=317&crop=1","width":564,"height":317,"chartArt":false},"A2":{"id":"116931","rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png?w=268&h=151&crop=1","width":268,"height":151,"chartArt":false},"A3":{"id":"116931","rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png?w=194&h=110&crop=1","width":194,"height":110,"chartArt":false},"A4":{"id":"116931","rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png?w=268&h=151&crop=1","width":268,"height":151,"chartArt":false},"XL":{"id":"116931","rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png?w=640&h=320&crop=1","width":640,"height":320,"chartArt":false},"social":{"id":"116931","rawUrl":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-content\/uploads\/sites\/20\/2017\/01\/PI_16.11.09_cybersecurity_Featured.png?w=640&h=320&crop=1","width":640,"height":320,"chartArt":false}},"_embeds":[],"watchers":[],"table_of_contents":[{"id":93702,"title":"Americans and Cybersecurity","slug":"americans-and-cybersecurity","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/americans-and-cybersecurity\/","is_active":false},{"id":93715,"title":"1. Americans\u2019 experiences with data security","slug":"1-americans-experiences-with-data-security","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/1-americans-experiences-with-data-security\/","is_active":false},{"id":93733,"title":"2. Password management and mobile security","slug":"2-password-management-and-mobile-security","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/2-password-management-and-mobile-security\/","is_active":false},{"id":93743,"title":"3. Attitudes about cybersecurity policy","slug":"3-attitudes-about-cybersecurity-policy","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/3-attitudes-about-cybersecurity-policy\/","is_active":false},{"id":93750,"title":"Acknowledgments","slug":"acknowledgments-33-3","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/acknowledgments-33-3\/","is_active":true},{"id":93724,"title":"Methodology","slug":"methodology-183-2","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/methodology-183-2\/","is_active":false}],"report_materials":[{"key":"5f606255-6032-4c82-bcd4-89f0d94052bf","type":"report","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/wp-content\/uploads\/sites\/9\/2017\/01\/Americans-and-Cyber-Security-final.pdf","label":"","icon":"","attachmentId":""},{"key":"fc05e0f4-f0d7-4b8f-a482-05528245d01d","type":"topline","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/wp-content\/uploads\/sites\/9\/2017\/01\/Americans-and-Cybersecurity-topline.pdf","label":"","icon":"","attachmentId":""},{"type":"dataset","id":1821,"label":"March 30-May 3, 2016 \u2013 Cybersecurity","url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/dataset\/march-may-2016-cybersecurity\/"}],"report_pagination":{"current_post":{"id":93750,"title":"Acknowledgments","slug":"acknowledgments-33-3","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/acknowledgments-33-3\/","is_active":true,"page_num":5},"next_post":{"id":93724,"title":"Methodology","slug":"methodology-183-2","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/methodology-183-2\/","is_active":false,"page_num":6},"previous_post":{"id":93743,"title":"3. Attitudes about cybersecurity policy","slug":"3-attitudes-about-cybersecurity-policy","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/3-attitudes-about-cybersecurity-policy\/","is_active":false,"page_num":4},"pagination_items":[{"id":93702,"title":"Americans and Cybersecurity","slug":"americans-and-cybersecurity","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/americans-and-cybersecurity\/","is_active":false,"page_num":1},{"id":93715,"title":"1. Americans\u2019 experiences with data security","slug":"1-americans-experiences-with-data-security","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/1-americans-experiences-with-data-security\/","is_active":false,"page_num":2},{"id":93733,"title":"2. Password management and mobile security","slug":"2-password-management-and-mobile-security","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/2-password-management-and-mobile-security\/","is_active":false,"page_num":3},{"id":93743,"title":"3. Attitudes about cybersecurity policy","slug":"3-attitudes-about-cybersecurity-policy","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/3-attitudes-about-cybersecurity-policy\/","is_active":false,"page_num":4},{"id":93750,"title":"Acknowledgments","slug":"acknowledgments-33-3","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/acknowledgments-33-3\/","is_active":true,"page_num":5},{"id":93724,"title":"Methodology","slug":"methodology-183-2","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2017\/01\/26\/methodology-183-2\/","is_active":false,"page_num":6}]},"parent_info":{"parent_title":"Americans and Cybersecurity","parent_id":93702},"materialsOrdered":[],"chaptersOrdered":[],"partsOrdered":[],"partsEnabled":false,"datacite_doi":"","prc_seo_data":{"title":"Acknowledgments","description":"This report was made possible by The Pew Charitable Trusts. It is a collaborative effort based on the input and analysis of the following individuals: Primary researchers Kenneth Olmstead, Research&hellip;","og_title":"Acknowledgments","og_description":"","schema_type":"Article","noindex":false,"canonical_url":"","primary_terms":[],"custom_schema":[],"og_image":"116931","indexnow_submitted_at":null,"gsc_index_status":null},"prepublish_checks":{"prc-image-alt-text":{"status":"complete","message":"No image blocks in content.","data":null},"prc-about-this-research":{"status":"incomplete","message":"Add an \"About this research\" details block.","data":null},"prc-paragraph-count":{"status":"complete","message":"Found 5 paragraphs.","data":{"count":5}},"prc-internal-link":{"status":"incomplete","message":"Add at least one internal link.","data":{"count":0}}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"relatedPostsOrdered":[],"bylinesOrdered":[],"acknowledgementsOrdered":[],"_links":{"self":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/93750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/users\/367"}],"replies":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/comments?post=93750"}],"version-history":[{"count":2,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/93750\/revisions"}],"predecessor-version":[{"id":136233,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/93750\/revisions\/136233"}],"wp:attachment":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/media?parent=93750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/categories?post=93750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/tags?post=93750"},{"taxonomy":"bylines","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/bylines?post=93750"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/collection?post=93750"},{"taxonomy":"datasets","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/datasets?post=93750"},{"taxonomy":"level_of_effort","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/level_of_effort?post=93750"},{"taxonomy":"primary_audience","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/primary_audience?post=93750"},{"taxonomy":"information_type","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/information_type?post=93750"},{"taxonomy":"_post_visibility","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_post_visibility?post=93750"},{"taxonomy":"formats","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/formats?post=93750"},{"taxonomy":"_fund_pool","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_fund_pool?post=93750"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/languages?post=93750"},{"taxonomy":"regions-countries","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/regions-countries?post=93750"},{"taxonomy":"research-teams","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/research-teams?post=93750"},{"taxonomy":"workflow-status","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/workflow-status?post=93750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}