KRAUSER@snysyrv1.bitnet (09/26/90)
Computer Underground Digest Survey This following is the survey described in CuD 2.04. We are attempt- ing to estimate the demographics of the network readers as a means of improving the quality and range of the articles. The results will be confidential and summarized in a future CuD issue. The easiest way to complete an e-mail survey is to use a full screen editor, fill in the blanks, and hit "reply" when done. Or, you can just type each answer on a separate line, preferably with the question number included, and when finished, hit "reply" The survey should take less than three minutes to complete, and can be sent via reply or returned to either: TK0JUT2@NIU.BITNET or KRAUSER@SNYSYRV1.BITNET Thank you for your time and cooperation. [Moderator's Note: Please DO NOT return these to me!! Thanks. PAT] ------------------------------------------------------------ 1. Your age: ____ 2. Sex: ___ 3. Highest Degree held:___________________ 4. Your ethnic background: _____________ 5. Your occupation: __________________________ 6. Have you read/subscribe to the following: ______________ a. Computers and Security b. Computer Fraud and Security Bulletin c. Computer Law and Security Report d. Computer Security Digest e LOD/H Technical Journal f. Phrack Magazine g. 2600 Magazine 7. How would you rate your view of the computer underground has been formed (1-4, with 1 being major influence and 4 lease influence): _ a. media reports (ie. television, newspaper, general periodicals) _ b. technical reports (ie. security related periodicals, papers) _ c. computer underground articles (ie. Phrack, LOD/H, text files) _ d. actual contact with individuals of the computer underground 8. What definition do you associate with the word "hacker" (1-8, with 1-best definition, 8-worst definition): _ a. Someone who makes furniture with an axe _ b. A person who enjoys learning the details of programming systems and how to stretch their capabilities. _ c. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. _ d. A person capable of appreciating hack value. _ e. A person who is good at programming quickly. _ f. An expert at a particular program, or one who frequently does work using it or on it. _ g. A malicious or inquisitive meddler who tries to discover information by poking around. _ h. A dangerous individual that obtains information or uses computer resources illegally or for illegal purposes. 9. Which best describes your view of computer hackers _ a. Opposed _ b. Ambivalent _ c. Sympathetic _ d. Strongly Opposed 10. Do you own a computer (Yes or No): ___ 11. Do you own a modem (Yes or No) : ___ 12. Do you call computer bulletin board systems _ a. Usually daily _ b. Occasionally _ c. Rarely _ d. Never 13. Have you ever read any types of science fiction stories that are classified as Cyberpunk? (Yes or No): ___ 14. Would you be willing to participate in another survey concerning the Computer Underground (Yes or No): ___ [Moderator's Note: This is being run here to assist CuD. It is their questionaire -- not mine. Return answers ONLY to the addresses shown within the questionaire. Thanks. PAT]
Chip Rosenthal <chip@chinacat.unicom.com> (09/29/90)
In article <12697@accuvax.nwu.edu> KRAUSER@snysyrv1.bitnet writes: >The survey should take less than three minutes to complete, and can be >sent via reply or returned to either: > TK0JUT2@NIU.BITNET or KRAUSER@SNYSYRV1.BITNET > Thank you for your time and cooperation. > >[Moderator's Note: Please DO NOT return these to me!! Thanks. PAT] For those who have trouble navigating BITROT addresses, the address: cud@chinacat.unicom.com forwards to TK0JUT2@NIU.BITNET, the submissions address for CuD. Feel free to return surveys through the chinacat address if that's any easier. Chip Rosenthal <chip@chinacat.Unicom.COM> Unicom Systems Development, 512-482-8260