home *** CD-ROM | disk | FTP | other *** search
/ Hackers Underworld 2: Forbidden Knowledge / Hackers Underworld 2: Forbidden Knowledge.iso / UNDERGRD / VOL_3 / CUD329H.TXT < prev    next >
Text File  |  1994-11-01  |  3KB  |  89 lines

  1.  
  2. Date:    28 May 91  12:19:12 bst
  3. From:    P.A.Taylor <EJPA09@uk.ac.edinburgh.emas-a>
  4. Subject: Research Analysis
  5.  
  6.  Here is a selective and very rough analysis of the questionnaire you  \
  7.  answered.
  8.  It is from the first 50 responses out of a total of just under 200.
  9.  A full analysis will be distributed when the target of 3-400 responses is
  10.  achieved.
  11.  
  12.  Q1. Gender: 1 female respondent out of 50 (2 out of 200).
  13.  
  14.  Q7. Security of respondent's computer environment:
  15.      Too strict - 0%
  16.      Adequate   -62%
  17.      Lax        -26%
  18.  
  19.  Q9. Length of professional experience: 38% - over 10 years.
  20.  
  21.  Q11. Serious interest in computing: 68% - over 10 years.
  22.  
  23.  Q12. Nature of interest: mainly professional 28%
  24.                           Professional and Recreational 72%
  25.  
  26.  Q13. Experience of: Malicious hack/harmless browse/viral incident.
  27.                      All of these 26%
  28.                      None         16%
  29.  
  30.  Q14. Number of times: 0-5 - 60%
  31.                        6-10- 6%
  32.                        10 -> 20%
  33.  
  34.  Q15. What was it? : virus - 38%
  35.                      worm  - 16%
  36.                      Trojan- 18%
  37.  
  38.  Q16. How serious? : very -  6%
  39.                      not very - 42%
  40.                      not at all serious - 38%
  41.                      combination of these -14%
  42.  
  43.  Q18. Non-destructive access to data - crime?
  44.                       yes - 42%
  45.                       no  - 20%
  46.                       don't know 38%
  47.  
  48.  Q19. Happy with current legislation?
  49.                       yes, about right - 12%
  50.                       no, it's too draconian - 38%
  51.                       Not strong enough - 18%
  52.                       Don't know - 32%
  53.  
  54.  Q20. More professional structure to computing industry needed?
  55.                       yes  -30%
  56.                       no   -40%
  57.                       don't know -30%
  58.  
  59.  Q21. Greatest threat to security?
  60.                       insiders  -70%
  61.                       outsiders -8%
  62.                       about the same - 18%
  63.                       don't know  -4%
  64.  
  65.  Q22. Viruses - potentially useful?
  66.                       yes  -40%
  67.                       no   -42%
  68.                       don't know 18%
  69.  
  70.  Q23. Benefits to System Breaking?
  71.                       yes  -60%
  72.                       no   -28%
  73.                       don't know -12%
  74.  
  75.  Q24. Knowledge of Cyberpunk?
  76.                       yes  -64%
  77.                       no   -36%
  78.  
  79.  Q25. Future trends of viruses?
  80.                       increase  -64%
  81.                       decrease  -10%
  82.                       stay the same -26%
  83.  
  84. A complete analysis will be coming soon.
  85.  
  86. ------------------------------
  87. =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
  88. +                               END THIS FILE                                +
  89. +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=