recommended reading

Survey: Campaign contributors stick to traditional tools

Despite a range of new social media and technology, most contributors to this year's presidential campaigns continue to make donations in more traditional ways, according to a new survey released by the Pew Internet and American Life Project.

Pew surveyed 2,010 people, 13 percent of whom said they had donated to presidential campaigns.

Of those who contributed, 67 percent donated in person, over the telephone, or through the mail. A further 50 percent said they contributed online or via e-mail.
Meanwhile, 10 percent said they had made donations on their cellphones, either by text message or using a mobile app.

"That works out to just 1 percent of all American adults who have made a presidential contribution directly from their cell phone this election season," the report's authors note. "By way of comparison, prior Pew Internet research has found that roughly one in 10 American adults have made a charitable donation of any kind using the text messaging feature on their cell phone."

The poll was conducted at the end of September, just about a month after the campaigns of both GOP candidate Mitt Romney and President Obama began accepting donations by text message. Under the system, which has been used by charities for several years but just got the green light from federal election officials earlier this year, donations are charged to users' phone bills.

Democrats are more likely than Republicans to use online methods to contribute, the survey found. Fifty-seven percent of Democrats said they had donated online, versus 34 percent of Republicans. Fifteen percent of Democratic respondents said they had donated via cellphone, compared to 6 percent of Republicans.

The survey was the result of two landline and cellphone polls conducted during the last two weeks of September. The margin of error for the entire survey is +/- 2.6 percentage points, while the margin of error for the presidential campaign contributors is +/-6.3 percentage points.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.