[alt.society.cu-digest] CuD Survey

KRAUSER%SNYSYRV1.BITNET@CORNELLC.cit.cornell.edu (09/26/90)

                   Computer Underground Digest Survey

     This following is the survey described in CuD 2.04.  We are attempt-
ing to estimate the demographics of the network readers as a means of
improving the quality and range of the articles.  The results will be
confidential and summarized in a future CuD issue.

The easiest way to complete an e-mail survey is to use a full screen
editor, fill in the blanks, and hit "reply" when done.  Or, you can
just type each answer on a separate line, preferably with the question
number included, and when finished, hit "reply"

The survey should take less than three minutes to complete, and can be
sent via reply or returned to either:
             TK0JUT2@NIU.BITNET or KRAUSER@SNYSYRV1.BITNET
                Thank you for your time and cooperation.
     ------------------------------------------------------------

 1. Your age: ____
 2. Sex: ___
 3. Highest Degree held:___________________
 4. Your ethnic background: _____________
 5. Your occupation: __________________________
 6. Have you read/subscribe to the following: ______________
     a. Computers and Security
     b. Computer Fraud and Security Bulletin
     c. Computer Law and Security Report
     d. Computer Security Digest
     e  LOD/H Technical Journal
     f. Phrack Magazine
     g. 2600 Magazine
 7. How would you rate your view of the computer underground has been
    formed (1-4, with 1 being major influence and 4 lease influence):
     _ a. media reports (ie. television, newspaper, general periodicals)
     _ b. technical reports (ie. security related periodicals, papers)
     _ c. computer underground articles (ie. Phrack, LOD/H, text files)
     _ d. actual contact with individuals of the computer underground
 8. What definition do you associate with the word "hacker"
    (1-8, with 1-best definition, 8-worst definition):
     _ a. Someone who makes furniture with an axe
     _ b. A person who enjoys learning the details of programming
          systems and how to stretch their capabilities.
     _ c. One who programs enthusiastically, or who enjoys programming
          rather than just theorizing about programming.
     _ d. A person capable of appreciating hack value.
     _ e. A person who is good at programming quickly.
     _ f. An expert at a particular program, or one who frequently does
          work using it or on it.
     _ g. A malicious or inquisitive meddler who tries to discover
          information by poking around.
     _ h. A dangerous individual that obtains information or uses
          computer resources illegally or for illegal purposes.
 9. Which best describes your view of computer hackers
    _ a. Opposed
    _ b. Ambivalent
    _ c. Sympathetic
    _ d. Strongly Opposed
10. Do you own a computer (Yes or No): ___
11. Do you own a modem (Yes or No)   : ___
12. Do you call computer bulletin board systems
    _ a. Usually daily
    _ b. Occasionally
    _ c. Rarely
    _ d. Never
13. Have you ever read any types of science fiction stories that
    are classified as Cyberpunk? (Yes or No): ___
14. Would you be willing to participate in another survey concerning
    the Computer Underground (Yes or No): ___