[comp.org.eff.talk] computer security questionnaire

rnp@cs.edinburgh.ac.uk (Rob Procter) (04/19/91)

  Here's a questionnaire concerned with computer security and its
  related issues. Please complete it by replying with the *question
  number* and the *number* of the option listed with it, that most
  closely corresponds to your view.
  
  I am in the second year of a PhD investigating the issue of computer
  security in its social context. All responses will be treated with
  total confidentiality and none of their content will be used verbatim
  in the research without the prior consent of the respondent.
  
  I EMPHASISE THAT THIS RESEARCH IS FOR PURELY ACADEMIC PURPOSES.
  VERIFICATION OF MY ACADEMIC STATUS AND NATURE OF THE RESEARCH CAN
  BE SUPPLIED UPON REQUEST, AS WILL THE FINDINGS WHEN EVENTUALLY
  COLLATED AND ANALYSED.
  
  
  Q1) What is your nationality?
  
  Q2) What is your gender?
      [1] Male 
      [2] Female 
  
  Q3) What is your age?
      [3] 15-20 
      [4] 21-30 
      [5] 31-40 
      [6] Over 40 
  
  Q4) What is your job title?
  
  Q5) Which of the following best describes your organisation?
      [7] academic 
      [8] commercial manufacturing 
      [9] commercial R&D 
      [10] consultancy 
      [11] commercial services (e.g. banking) 
      [12] public serivices 
      [13] other (please state) 
  
  Q6) Which of the following are features of your computing environment?
      [14] central multi-access mini/mainframe(s) 
      [15] single-worker workstations 
      [16] local area network(s) 
      [17] wide area network(s) 
  
  Q7) How would you describe the computing security arrangements and
      practices within your organisation? 
      [18] too strict 
      [19] adequate 
      [20] lax 
  
  Q8) Do you have any formal qualifications in computing? e.g.
      [21] B.Sc. 
      [22] M.Sc. 
      [23] Ph.D. 
      [24] other (please state) 
  
  Q9) What's the length of your professional experience?
      [25] 1-5 years 
      [26] 6-10 years 
      [27] 11-15 years 
      [28] more than 15 years 
  
  Q10) Name any professional or computer-orientated interest group to
       which you belong.
  
  Q11) How long have you maintained a serious interest in computing?
       [29] 1-5 years 
       [30] 6-10 years 
       [31] More than 10 years 
  
  Q12) Would you describe this interest as:
       [32] mainly professional 
       [33] professional and recreational (please describe the latter) 
  
  Q13) Have you ever had experience of...
       [34] a malicious hack 
       [35] a harmless browse 
       [36] a viral-type incident 
       [37] none of these 
  
  Q14) If so, how many times?
       [38] 0-5 
       [39] 6-10 
       [40] more than 10 
  
  Q15) Was it...
       [41] a virus 
       [42] a worm 
       [43] a trojan horse 
       [44] none of these (please specify) 
  
  Q16) How serious were the problems it caused?
       [45] very 
       [46] not very 
       [47] not at all serious 
  
  Q17) Would you say that the computing industry's concern about viruses
       has been...
       [48] about right 
       [49] insufficient 
       [50] excessive 
       [51] hysterical 
  
  Q18) Would you describe non-destructive unauthorised access to data as
       a crime?
       [52] yes 
       [53] no 
       [54] don't know 
  
  Q19) Are you happy with current legislation concerning computer
       security?
       [55] yes, it's about right 
       [56] no, it's too draconian 
       [57] not strong enough 
       [58] don't know 
  
  Q20) Do you think the computing industry would gain from a more
       professional structure? 
       [59] yes 
       [60] no 
       [61] don't know 
  
  Q21) In your view, who poses the greatest threat to systems/data
       security?
       [62] "insider" disaffected employees 
       [63] "external" cracker/browsers 
       [64] about the same risk 
  
  Q22) Do you think there are any potentially useful spin-offs to virus-
       producing techniques? 
       [65] yes (please specify) 
       [66] no 
       [67] don't know 
  
  Q23) Are there any beneficial (side) effects to system-breaking?
       [68] yes (please specify)
       [69] no 
       [70] don't know 
  
  Q24) Do you have any knowledge or interest in "Cyberpunk" culture/
       fiction?
       [71] yes 
       [72] no 
  
  Q25) Do you think that browsing/cracking/virus incidents, will, in
       the future...
       [73] increase 
       [74] decrease 
       [75] stay the same 
  
  
  THANK YOU FOR YOUR TIME AND EFFORT, PLEASE CONTACT ME BY E-MAIL IF
  YOU WOULD LIKE TO DISCUSS THESE ISSUES IN MORE DEPTH OR IF YOU ARE
  INTERESTED IN THE RESULTS OF MY RESEARCH.
  
  
  Paul A. Taylor,
  Depts of Economics and Politics,
  University of Edinburgh.

smith@NCoast.ORG (Phil Smith) (04/22/91)

I tried to send one in, but it keeps bouncing.
If the original poster (or anyone else) can
provide a bounce-proof path I would appreciate it.