Feeds

British shoppers are doing it on the interwebs

Web and mobiles now a large part of retail therapy

High performance access to file storage

The British are taking to online shopping faster than most other countries, according to a new study.

Over 75 per cent of UK shoppers preferred to buy stuff like CDs, DVDs, books and video games online, compared with 65 per cent globally, a study by KPMG found.

Six in 10 British respondents did some of their grocery shopping on the net and 74 per cent were more likely to book flights or holidays online.

As well as heading online to shop, consumers are also using their smartphones to aid their retail experience.

Just under half of Brits use their mobiles to find shops, while 32 per cent are on their phones researching products.

“The integration of various channels will become increasingly important as retailers begin to see many of their consumers move to online and application-based purchases,” said Tudor Aw, European head of technology.

“As the ubiquitous smartphones empowers the consumer retailers will need to understand the opportunities and risks that mobile devices present.”

Britons, along with the rest of the world, are also using the internet more to help with their shopping.

The majority of customers surveyed will now look on social networking sites, like Facebook or Twitter, or online review sites to help make decisions about what to buy and where to buy it.

However, the Brits are more reluctant when it comes to doing their banking online. Only 27 per cent of people in the country had used any form of mobile banking in the last six months, compared with 52 per cent globally.

The cloud is another area where UK users are less inclined to tread. Just over half of British respondents said that store some of their data online, compared with 65 per cent globally.

"Consumers' concerns over privacy and data security have increased over the last few years and companies across all sectors need to take this concern seriously," Aw said.

KPMG surveyed 9,600 consumers aged between 16 and 65, across 31 countries. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.