Despite the tech paradox, privacy is far from dead

Access this insight with a Premium plan. Contact our sales team to get started.
Report details
Despite the tech paradox, privacy is far from dead
From connected wearables to in-store facial recognition, a plethora of user data from different sources is fed into AI systems in exchange for convenience and more personalised services. The more data a device gathers, the better the insights. It appears that consumers are willing to accept this trade-off (based on our findings on smart device adoption rates), even against a backdrop of mounting privacy concerns: this is the tech paradox. Despite this apparent contradiction, privacy remains a crucial concern, as confirmed by our Consumer Insights Survey 2019. On top of this, there has been no slowdown on the regulatory front; a wave of new data rules – with a strong focus on AI in particular – is imminent.
Report details
Despite the tech paradox, privacy is far from dead
Related research
Sovereignty at MWC Barcelona 2026: the content consensus
For much of 2025 and early 2026, the development of sovereign AI and sovereign digital service strategies – including the role telecoms could play in supporting them – was regularly in the news. For operators, the strategies represent an opportunity to support national agendas, reassert their relevance in the digital economy and drive new revenues based on their position as highly regulated and trusted service providers. This analysis looks at the sovereign messaging conveyed in sessions at MWC from operators, vendors, regulators and cloud providers.
Telco security governance and strategies: Asia Pacific
Cybersecurity is a shared responsibility, requiring operators to adopt a holistic approach that integrates technology, personnel and processes. To evaluate the cybersecurity governance and strategies of operators, GSMA Intelligence undertook a global survey involving 100 operators worldwide. This report provides an overview of the cybersecurity governance and strategies of operators in Asia Pacific.
IoT in a post-quantum world: coming sooner than you think
The benefits of quantum computing come from the order-of-magnitude increase in computational power compared to conventional computers. This enables a range of use cases from predictive analytics to pharmaceutical simulations. However, there are also risks, primarily related to security vulnerabilities. Overall, we estimate around 8% of IoT devices currently in active use are quantum safe. Conversely, over 90% (i.e. nearly all) of IoT devices are exposed. The exposure risk for telcos comes at multiple levels, including networks, billing systems, consumer devices and IoT. The focus in this report is on the IoT dimension because it represents the largest universe of devices, is highly disparate and is particularly open to security risks due to the ageing nature of many assets deployed today.
Authors
How to access this report
Annual subscription: Subscribe to our research modules for comprehensive access to more than 200 reports per year.
Enquire about subscriptionContact our research team
Get in touch with us to find out more about our research topics and analysis.
Contact our research teamMedia
To cite our research, please see our citation policy in our Terms of Use, or contact our Media team for more information.
Learn moreRelated research
Sovereignty at MWC Barcelona 2026: the content consensus
For much of 2025 and early 2026, the development of sovereign AI and sovereign digital service strategies – including the role telecoms could play in supporting them – was regularly in the news. For operators, the strategies represent an opportunity to support national agendas, reassert their relevance in the digital economy and drive new revenues based on their position as highly regulated and trusted service providers. This analysis looks at the sovereign messaging conveyed in sessions at MWC from operators, vendors, regulators and cloud providers.
Telco security governance and strategies: Asia Pacific
Cybersecurity is a shared responsibility, requiring operators to adopt a holistic approach that integrates technology, personnel and processes. To evaluate the cybersecurity governance and strategies of operators, GSMA Intelligence undertook a global survey involving 100 operators worldwide. This report provides an overview of the cybersecurity governance and strategies of operators in Asia Pacific.
IoT in a post-quantum world: coming sooner than you think
The benefits of quantum computing come from the order-of-magnitude increase in computational power compared to conventional computers. This enables a range of use cases from predictive analytics to pharmaceutical simulations. However, there are also risks, primarily related to security vulnerabilities. Overall, we estimate around 8% of IoT devices currently in active use are quantum safe. Conversely, over 90% (i.e. nearly all) of IoT devices are exposed. The exposure risk for telcos comes at multiple levels, including networks, billing systems, consumer devices and IoT. The focus in this report is on the IoT dimension because it represents the largest universe of devices, is highly disparate and is particularly open to security risks due to the ageing nature of many assets deployed today.
- 200 reports a year
- 50 million data points
- Over 350 metrics
