An Examination Of Changes In Computer Viruses

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

With the development of computer network technology, the extensive application of computer network has had a major impact on the development of economic, cultural, educational, and scientific. A lot of important information and resources related to the network. However, these techniques provide us more convenient, at the time the network security issues highlight the objective benefits. Either the Internet or internal network will be faced a large amount of security issues. In other words, almost no one network is immune to security troubles. Security is a fundamental of network development. Therefore, how to minimize the malicious program, to avoid information leakage, damage caused by the economic loss is placed in front of us, we need to address the great strategic significance subject.

Table of Contents

Acknowledgements…………………………………………………………………...2

Authorship Declaration………………………………………………………………..3

Abstract ...…………………………………………………………………….……….4

Table of Contents……………………………………………………………………..5 Introduction...…………………………………………………………………………7

Research Objectives………………………………………………………………….10

Dissertation Structure ……………………………………………………………...…10

Literature Review…………………………………………………………………….12

Methodology…………………………………………………………………………15

Research Design……………………………………………………………………...15

Questionnaires………………………………………………………………………..15

Questionnaire Design………………………………………………………………...16

Sampling……………………………………………………………………………...16

Data Collection, Coding, and Analysis………………………………………………16

Semi-structured interviews…………………………………………………………...17

Interview Design……………………………………………………………………..17

Interview Sampling…………………………………………………………………..17

Data Collection, Coding, and Analysis………………………………………………17

Statistic……………………………………………………………………………….18

Translation Issues…………………………………………………………………….18

Findings………………………………………………………………………………19

Ethical and Legal Issues………………………………………………...……………26

Conclusions…………………………………………………………………………..26

Limitations…………………………………………………………………………...27

Future Work………………………………………………………………………….28

Appendix A – Data Requirements Tables……………………………………………29

Appendix B – Questionnaire in English……………………………………………...32

Appendix C – Questionnaire in Chinese……………………………………………..35

Appendix D – Interview Questions …………………………………………………..37

Bibliography………………………………………………………………………….40

Introduction

In the modern world, people become increasingly dependent on computers. More accurate to say that should become increasingly dependent on the computer networks. Computer networks in today's society are applied to our home, office, school, almost all places.

Back to 1946, when the first computer was created in the University of Pennsylvania, there was a concept of computer virus (Kingsoft, 2007). In 1949, Von Neumann the father of computer, already defined the concept of computer viruses. It is a program can actually automata copy their own, the programmers of Bell Labs [1] was inspired by Von Neumann, they tried to invent a game which called "Core War [2] "(Kingsoft, 2007). Two people playing the game, they also need to prepare many programs, these programs can copy themselves and can be stored in the core memory, then send a signal(Kingsoft, 2007). Both procedures will be command under the control of trying to destroy each other. Within the predetermined period of time, whose program is breeding much more that will become the winner (Kingsoft, 2007)!

This kind of computer programs same as the computer virus in biomedical infection and destruction of properties. It is kinds of unique infectious agents; it is able to use the host cell nutrients from the master copy of the life of their own DNA [3] or RNA [4] , protein and other tiny life form substances (Kingsoft, 2007). Then called this process self-replication and the failure mechanism of a computer virus (Kingsoft, 2007).

Currently the definition of computer virus is: the viruses are same as other traditional computer programs written by different programming languages (Huang, 2007). However, compare with a normal computer program the virus can copy itself and spread from one computer to others (Kingsoft, 2007). The viruses also destroy the files and system, even automatically format the disks, and make your computer thorough paralysis (Kingsoft, 2007).

Computer virus in our daily life is a broad word, most people will typically Trojan [5] , Spyware [6] , Malware [7] , and even illegal ads are collectively referred as computer viruses.

In my dissertation I will research the changes in computer viruses.

Figure 1 source: Kingsoft Anti-virus Software Company [8] 

According to this bar chart, from 2003 to 2007 the number of viruses growing slightly. However, between 2008 and 2009 the number of viruses was growing rapidly (Kingsoft, 2011).

In 2003, the Internet was popular in China; more and more computer viruses rely on the network to spread (Kingsoft, 2007).

Figure 2 source: Qihoo 360 Technology Co. Ltd [9] 

This pie chart shows the infection rate of different types of computer viruses. Compare with other types of malicious programs, the share of Trojan is the biggest one. [10] 11Figure 3 source: Kingsoft Anti-virus Software Company

In this chart, we can know internet download is the main channel of transmission of the virus. This research will conduct a survey on the changes of computer virus in last 9 years in China.

Research Objectives

There were three objectives in this dissertation:

1. To analyses the changes in computer viruses in China 2003-2011.

2. Examine the importance of computer viruses in this period.

3. Assessment of the effect of computer virus on PC users

Dissertation Structure

There were five parts in this dissertation.

Chapter â… : To give the introduction of the computer viruses and to introduced the topic of the dissertation.

Chapter â…¡: Literature Review plays a significant role in this dissertation. The Literature Review provided the materials what I studied in the past. It was gave me more history of the computer viruses. The Literature Review also to support the dissertation topic and provide the viewpoint in the findings.

Chapter â…¢: Introduce the different research objectives and different methodology in the dissertation. This chapter to illustrate the different way how researcher to identify the research objectives and gave the details of methodology how the researcher to finished the research objectives.

Chapterâ…£: The most important chapter in the dissertation. This part to statistic the questionnaire and interview data then rely on the data to analysis the changes of the computer viruses.

Chapter â…¤: This was the conclusion of the dissertation. This chapter to review of the paper reiterated the different chapter of this dissertation.

At the end of the dissertation, also included some ethical and legal issues, limitation and other materials used in this dissertation

Literature Review

In this chapter will introduce the several previous studies focused on the changes of computer viruses in china.

There are a lot of studies about the changes of computer viruses have be done. Some valuable resources will be listed.

Huang (Huang, 2007) conducted a research of the Internet security analysis and measures in China. With the development of Internet in china, a large number of people in different way to access the Internet, many users lack of basic network security awareness and protection measure, the computer always infected by viruses and hackers(Huang, 2007).

CNCERT/CC [12] (CNCERT/CC,) the research from CNCERT/CC found that, in china almost Internet infection was come from the local resources.

Fu (Fu, 2011) conducted a survey of the way how computer viruses infected the computer and how we prevention. The viruses could rely on different transmission to copy them from one computer to others; the most common is depending on the removable storage to infection (Fu, 2011).

Sherif, J, S & Gilliam, D, P. (Sherif, J, S. &Gilliam, D, P., 2003) did a research to assess the different kinds of Anti-viruses on different platform. The threat of computer viruses become more and more severe, different operating system platform should have the appropriate Anti-virus software; the products need to update to play a role in the prevention of latest viruses (Sherif, J, S. &Gilliam, D, P., 2003).

Huang, H. et, al (Huang, H. et, al, 2008) used the synergetic self-organization theory to assess the effects of synergetic system controlling tactics to financial information security in China. With the development of Internet and shopping online the computer viruses became focus on the user’s online account and credit card, financial information security has become the core security issue in China (Huang, H. et, al, 2008).

Zhang, Y. et, al (Zhang, Y. et, al, 2011) conducted a research of how to found a more effective way to detect the computer viruses. We update the Anti-virus software every day, at the same time, the virus also being upgraded in order to evade the Anti-virus software; we need to found an effective way to remove the viruses and threats (Zhang, Y. et, al, 2011). They also used the choice of aggregation granularity to find the new way to detect the computer viruses. (Zhang, Y. et, al, 2011).

Fu (Fu, 2011) used the literature review and static to analysis why computer infected by viruses. Operating system also a program; there are a large amount of bugs in it. The Anti-virus software needs to update (Fu, 2011).

Jiangmin (Jiangmin, 2011) used the statistic to assess the amount of new computer virus. In 2010, there were approximately 400 of new banking Trojan, an increase of 6 percent compared with 2009 (Jiangmin, 2011).

Alex, M, A. (Alex, M, A., 2010) used the experiment to found the impact of computer viruses. The virus even detect the user's search keywords, if include the "Anti-virus" or "security" the virus will automatically end the task of Internet Brower. (Alex, M, A., 2010).

Compare

The research of Huang show the development of Internet in China, also gave me the history of the computer security in China. Huang (Huang, 2007) found that most net users were lack of security awareness, there was no computer security software in most computers. Jiangmin (Jiangmin, 2011) found that with the widely used of Internet more and more computer viruses rely on the Internet to complete the infection computer.

Huang, H. et, al (Huang, H. et, al, 2008) found that in recent 5 years, with the development of shopping online the computer viruses and Trojan not limited to infected the operating system and destruction of files. The author of the virus shifted the focus on the bank account, a growing number of computer viruses and Trojan with the purpose of economic interests (Huang, H. et, al, 2008).

Contrast

In this dissertation all of the literature has different purpose and findings. (Huang, 2007) focus on the computer network security issues in China, to analysis the reason of why the computer security was a serious issue in china.

Fu (Fu, 2011) conducted a survey of the way how computer viruses infected the computer and how we remove the viruses or threat. He illustrates the form of computer virus and also gives audience the detail of different viruses (Fu, 2011).

Alex, M, A. (Alex, M, A., 2010) found the viruses became more and more smart, the viruses and Trojan try the best to against the Anti-virus software and firewall.

Areas for further research

Even though there are different studies to research the computer viruses. However, few research to analysis the changes of computer viruses and computer security threats in China and how the new viruses and threats changed our life. This research conducted these areas and gave more detail. It will be a significant research to analysis the changes in computer viruses, the research will give public more valuable information about the computer viruses and computer security.

Link with my research objective

In this dissertation my research objectives are not only conduct the research of changes in computer viruses in china, but also given the course of development of different types of computer viruses. In my last research objectives also introduce the effective way to remove the threats, how we protect our computers.

Methodology

There are three objectives in this dissertation:

1. To analyses the changes in computer viruses in China between 2003 and 2011.

2. Examine the importance of computer viruses in this period.

3. Assessment of the effect of computer virus on PC users

Research Design

This dissertation was to research the changes of computer viruses in China. There were several methods to be used to collect the data.

For the first objective, I use the statistic. I needed to collect the data from the Internet; especially, collected the data published by Anti-virus software company and computer Security Company. For example, Kingsoft Security Company, it is one of the most famous computer security companies in China. Every year they intercepted thousands of new viruses in china, every year they also published the China's network security report. Therefore, the data of the company have high authenticity and credibility. I also use some pieces academic paper of computer viruses. Most of these papers come from other pioneer’s research. For the second research objective, the main method was questionnaire, but also included statistics. According to the comparison, I could found the difference between the new virus and old viruses. For the last research objective I used the questionnaire and interview to get the data. I collected the questionnaire and statistic the data from these questionnaires and interviews.

Questionnaire

In this dissertation I sent approximately 420 questionnaires to the different kind of computer users. It was included white-collar, students, teachers, and blue collar participated in the survey to help me collected the data. I did the questionnaire online for three days, at last I collect 400 pieces effectively questionnaire. There are some factors to choose the questionnaire.

Firstly, compare with other methods, questionnaire is more easily to do, nothing can replace it. When work with the questionnaire, the respondents only to tick the correct answer, everyone can make choice. Secondly, everyone is busy; If too many questions I asked and the questions are too professional, it was a challenge to the respondents, even some respondents complained to me waste their time. Therefore saving time is very important. Thirdly, I just ask respondents some common questions about the computer viruses and Trojan to help me get the users’ awareness and understanding of computer viruses.

Questionnaire Design

There were 14 questions in the questionnaire. Firstly, to ask some personal details of the respondents to help me got the basis information; these questions also help me to make the grouped statistics. Secondly, I made some simple questions about the computer viruses and computer security. It can help me got more basis of the user’s security awareness. After that, I began to ask them the core questions in the questionnaire. For the core questions I always focus on the changes of computer viruses and the influence of computer viruses. It was also including some methods how to protect the computer decrease the infection or even without infection.

Sampling

This research will collect all valid questionnaires to analyses the changes in computer viruses in china. Firstly, the questionnaire published on the Internet. The entire net user could join the questionnaires. Finally, selected the valid questionnaires to statistical. In this dissertation totally sent approximately 420 questionnaires to the different kind of computer users.

Data Collection, Coding, and Analysis

The questionnaire data saved as Microsoft Excel files, then import the files in SPSS. In this dissertation all the questionnaires data processed by SPSS and Microsoft Excel.

Semi-structured interviews

In this dissertation, I also did some interview to make the data collection more effective.

Interview Design

I interviewed some students in the university campus and some white-collar in a company who worked with computer every day.

There were 9 major questions in the interview. Below the main questions also includes some different sub questions. At the beginning of the interview questions it was same to the questionnaire questions I just took some details of the interviewees. After the simple questions I was tried to ask the main questions about computer viruses. In the interview questions, there were three parts of the main questions.

Part 1, I was focused on the basis of network. For example, "what is the way you access the Internet?" This was a very important question to focus on the question "why some body’s computer always infected by viruses or Trojan." In the second part, my questions were focus on the computer viruses in the past and when your computer first time infected by viruses. In this part, with the help of the different interviewees, I got the data about the history of computer viruses and the history of computer security. For example, in the past how viruses infect the computers; how people remove the computer viruses. In the last part of the interview, I was tried to get the detail of how people protect their computers, also tried to compare the impact of computer viruses in the past and present. With the interview questions help I could try to assess the Anti-viruses products in different periods.

Interview Sampling

In this dissertation I randomly interviewed 10 people in the universities and companies.

Data Collection, Coding, and Analysis

The questionnaire data saved as Microsoft Word files. Firstly I used the Microsoft Excel to classified the different answers and calculate the number of different answer of the same questions. After that then convert to the Microsoft Excel (.xls) files. In this dissertation the interview questions data processed by Microsoft Excel.

Statistic

This dissertation was to research the changes of computer viruses changed in China from 2003 to 2011.

Firstly, I need the quantity of the computer virus every year, then I can analysis the changes of virus’s quantity and give the reason of this change. Secondly, analysis the data published by different computer security company to research the changes of different viruses. For example, the changes in transmission route of the computer viruses and Trojan. Thirdly, analysis the quantity of different styles of computer viruses, why some kinds of computer viruses decline rapidly and to research the purpose and development of direction of computer viruses and Trojan.

Translation Issues

This dissertation was in English. However, I did this research in China, most respondents and interviewees could not understood the English, this time I use the Google Translate and English to Chinese dictionary to help me translate the questionnaires questions and interview questions in Chinese. The translation played a significant role in this dissertation, it made the questions easily to answer and also save a lot of time to me to explain all the questions to Chinese people.

Findings

Introduction

In this dissertation, there were several findings in it.

Questionnaire

In this research there were a total of 415 valid questionnaires, 213 are men, and 202 are women.

Figure 4

Source: Questionnaire

Based on to the results of the questionnaires, a large number of people prefer the cell phone rather than computer and Tablet PC. In the introduction the data come from Kingsoft Anti-virus Company, between 2009 and 2011 the number of computer viruses began to decline, because a considerable number of people no longer confined to use the computer to access the Internet, the usage of computers began to decline, the number of computer viruses will be reduced. So far the different electronic products run the different platform no viruses can run on different operating system platforms thus reduce the infection rates of computers. This is the answer of the introduction why the number of computer viruses from 2009 to 2011 began to decline.

Figure 5

Source: Questionnaire

The pie chart show how long the people use computer every day. Every day most people use computer more than 3 hours and a large number of people use computer to work or study. Such a high frequency use of computers, exacerbated the risk of virus infection

Figure 6

Source from Questionnaire

The sixth Figure illustrate when first time the computer infected by viruses. About 10 years ago, only 5.06% computers infected by viruses or Trojan. At that time, the computer virus infection was very low and the computers and Internet was safety enough for us to access. Every year new computer viruses are appeared, and therefore the numbers of infected computers are also rising. The Internet became more and more dangerous, the computer security also became a serious problem in china. In last 5 years more than 25.06% computers were infected by viruses. The Internet has become a high-risk zone; more and more people pay much attention to the computer security and Internet security.

Figure 7

Resource from Questionnaire

From the questionnaire questions most of computer users thought they need to improve the security awareness, all the people worried about their computer infected with the virus or other malicious programs. Link to my dissertation, most respondents were lack of the knowledge and awareness to maintained their computer. In this research most of the respondents only knew how to use the computer, they never maintains their computers.

Figure 8

Source: Questionnaire

The grapy show the percentage of different types of computer viruses. According to the graph we can know the Share of Spyware is minimal of all kinds of viruses. In the past most viruses were boot viruses, they always made the computer cannot boot, even when you try to format driver C and reinstall the operating system, it is not able to clear the virus. At last you have to use the fdisk [13] to recreate the partition of the hard disk. However, in this research we found the boot viruses with rapidly decline. Currently it is difficult for us to find its trace in our hard disks.

Due to the rise of the popularity of online banking and courier industry, more and more people prefer shopping online rather than go to the market. This promoted the development of viruses and Trojans. When the Internet communication just the beginning of the epidemic, the viruses and Trojan just interested in your Instant messaging account or network game account, they only steal these account for fun. Sometimes also to steal your online game equipment. However, after 2006, most Trojan becoming interested in your bank account and begin to focus on your privacy, especially for your password (Kingsoft, 2011).

According to the questionnaire result we can also found that the development of shopping online lead to the false advertising and Phishing sites. Some criminals to seize the hearts of the people to buy low-priced products, intentionally producing and advocacy the discount counterfeit products to entice the consumers to click and purchase of their counterfeit products; it has become a means of accumulating wealth by these criminals.

Most people pay less attention to the details of the websites. Some criminals build a websites it is high similarity to the normal site. Most customers are difficult to find the difference between both of the website. The phishing sites trick users into using a credit card or online bank account to make payments in order to cheat the account number and password of credit card and bank card. Compare with the false advertising phishing sites is more dangerous. Link to the dissertation, this is the biggest changes of the computer viruses.

For research objective 1 the changes in computer viruses. The number of computer viruses growing rapidly; the transmission of computer viruses become more diverse, such as floppy disks, CD-ROM, flash disk, e-mail etc. Currently more and more viruses rely on the Internet to transfer from one computer and to another.

While for the different types of viruses, the boot viruses becoming extinct, we difficult to find the traces of it. In the modern world a largeamount of viruses are Trojan.

Figure 9

source from Questionnaire

The bar char show how people protect their computer. Most of the people choose to install Anti-virus software to protect the computer. With the development of Cloud Security technology it is a new defense technology to detect the viruses; some people choose to join the Cloud Security. The Anti-virus software has become an indispensable part of operating system. Link to the dissertation, the computer viruses became more and more intelligent, traditional Anti-virus software is not the best way to detect the viruses install an Anti-virus software just a simple way to protect the PC.

Interview

In the interview, one of the interviewee said: "compare with the LAN [14] the wireless LAN [15] is more convenient and faster, it has brought great convenience to people's daily lives."

"In the LAN, when a computer infected by viruses, the virus will spread rapidly through the local area network to other computers."

"the spread speed of computer viruses through the network is much higher than the propagation velocity of the other media."

In this research, most of the interviewees use the flash disks to exchange the files between different colleagues. However, the viruses can also spread through flash disks.

"the viruses also rely on the auto run function of the operating system, in order to achieve the purpose of automatically running, that means when you insert the flash disks in computer, the viruses can automatically run in the computer."

In the survey, we found that, in order to more effectively prevent the invasion of computer viruses, some people choose to install multiple Anti-virus software.

"The focus of each Anti-virus software is not the same, largely caused by the conflict between the different Anti-virus software it also makes the operating system became unstable."

"The target of Viruses and Trojans more and more inclined to online banking and online payment."

This dissertation provided very valuable to the computer users, especially to regular online shopping crowd, we not only need to make the computer more security but also be careful to our property, even some lawless intentional disclosure of personal information, resulting in significant loss of privacy.

"Never use the same password to your card or account; the personal information not to be directly saved in your computer."

"people's awareness of behavior is more important than Anti-virus technology, Anti-virus software is not omnipotent; it needs to updates then to detect the latest computer viruses."

"After the upgrade the Anti-virus software still cannot fully detect the latest viruses, the interviewees thought that the most important point was in the user’s behavior and awareness."

Ethical and Legal Issues

There were some ethical and legal issues in this dissertation. The first issue was the voluntary. In this dissertation I did the questionnaire and interviews. When I did the questionnaires and interviews I had to give more detail to the respondents and interviewee the process and propose of this dissertation. However, some of the respondents and interviewees still did not want to help me with my work. Most of the people were worried the questions in the interviews and questionnaires, the questions might focus on their works and salaries, even some privacy. I could not got more efficient data, the findings did not meet expectations. The second issue was the storage of the data. There were variety kinds of data in this dissertation. However, some data was absolutely confidential, these data contain a lot of user information of respondents. Disclosure of the data resulted in lack of protection of the privacy of the respondents. The third issue was the honestly gathering the data. In this dissertation some of the data were come from the computer security companies. The data was copyrighted by the computer security company. I had to through the payment to obtain the data

Conclusion

In conclusion, there were three objectives in this dissertation. The first research objective was to analyses the changes in computer viruses from 2003-2011. In this research objective the main method was statistic. I collected the data from the Internet and most valuable data were come from the computer security companies such as Kingsoft Security Company and Jiangmin technology. I tried to statistic these data to support my research objective.

The second research objective in this dissertation was to examine the important of computer viruses from 2003-2011. The main method for the research objective was questionnaire, but also included the statistics. By comparison the data from questionnaire and statistic I could found the different status of computer virus or other kinds of threats from past to present.

Assessment of the effect of computer virus on PC users was the last research objective in this dissertation. For this research objective it was include questionnaire and interview and the main method was interview. According to the interview consequence I got a large amount of information about the impact of computer viruses and threats to the computer users.

This dissertation found that, the traditional computer viruses have been very little. However the new computer virus has become more and more intelligent, there were specialized to rely on different bugs in software to attack, some viruses against the Anti-virus software. In our study not only upgrade the Anti-virus software but also update the operating system. In this dissertation the most important thing to our own was, do not open unknown e-mail and files, we should always conduct safety inspections of systems and software.

Limitation

There were some factors to restrict this research. Money is the main reason. In this research I had to spend a lot of money to support my research. For example, currently, some statistic data I had to pay the money to download it. Even in some website, the price of the data totally depends on the valuable of the paper. If I have another opportunity to do the research in the future, I will ask my family or my friends to support me, I can do more depth research.

The other factor is the time. In this research I had to prepare a large amount of work to found the materials about the topic. After that, I had to go out to do the interviews. This was my first time to do the dissertation, I did not plain the schedule more effectively, and in the future research and I will pay attention on the time schedule.

With the result of the questionnaires and interviews most respondents are lack of the computer security knowledge, they just answer some basic questions of the computer security. Even some customers have few knowledge of the computer security, they just know some basis operation of the PC, they also only use computer to do some simply work. For most of the computer users only use the computer and Internet to play games, chatting online, and videos. This type of respondents not only has limited knowledge of computer security but also could not complete the questionnaire or interview. So I could not collect more effective data through the questionnaires and interviews. In the future research, I will make the questionnaire and interview questions more common, most people can understand the questions.

This time I only did the research in China, all the questionnaire and interview I did in Beijing. In the future I will expand my research, next time I could compare the computer viruses in different developing countries.

Future Work

Depend on this dissertation, in the future if have another opportunity to do this research, I will make deepth research, I will also make a comparison of the computer viruses in different developing countrys.

Appendix A Data requirement table

Research questions/objective: Examine the status of computer viruses in this period/ Assessment of the effect of computer virus on PC users

Type of research (descriptive/explanatory): descriptive data from questionnaire or interview.

Investigative Questions

Variables Required

Detail required

Measurement questions

1. What’s your gender?

Gender

(Male/Female)

What is your gender?

How long you use computer every day?

Do you remember when your computer was first infected by virus?

The time of your computer infected by viruses

10+ Years Ago/10-5 Years/5-1 Years

Less Than 1 Year

What type of viruses you faced?

Do you need to further improve the network security awareness?

The people who has the Internet security awareness.

(Yes/No)

Why you need to improve the network security awareness? What you worried about?

How you surfing the Internet?

The different electronic products people used.

Desktop/Laptop/Tablet PC/Mobile phone/Others

Do you think this product is more security than others?

What is the purpose of your Internet?

The aim of the people access the Internet

The habit of the net users

News/Music/Video/Shopping Online/Books/Entertainment/Social

Do you often encounter the interference of the virus in these activities?

How you protect your computer?

The way people to protect their computer

install an Anti-virus software/use the hardware Anti-virus technology

Cloud Security/other_____

Do you think this is the best way top

What effects of the virus have your suffered?

The influence of the computer viruses

Delete the files/Destroy the files/Shutdown the system/Format the disks/Disable the Interne/Stop the Anti-virus software

Does it influence your work and study?

What kind of network do you have at home?

The different way to access the Internet

ADSL/LAN/Wireless LAN/3G

Do you think this type of connection is more security than other?

Today, what is the main transmission of the virus and Trojan?

The transmission of the different threats

E-mail/Removable Storage/Download/Website

What kind of media do you usually use to exchange and share the files?

Currently, what is your opinion of the privacy?

People’s opinion of the p privacy

Nothing do not care

Serious problem

Do you store all your privacy information in your computer?(such as your bank account number, password)

Do you think people's awareness of behavior is more important than Anti-virus technology

People behavior

Interview questions

Appendix B – Questionnaire in English

Single choice

1. What’s your gender? □Male □Female

2. What’s your age?

â–¡Less 16 â–¡16-25 â–¡26-35 â–¡35-45 â–¡45+

3. What are you jobbing?

â–¡Student â–¡Teacher â–¡White Color â–¡Blue Color Worker

â–¡Other________

4. How often do you use computers?

â–¡Work With Computer â–¡Less Than 1 Hour â–¡1-3 Hours â–¡More Than 3 Hours

5. Do you remember when your computer was first infected by virus?

â–¡10+ Years Ago â–¡10-5 Years â–¡5-1 Years â–¡Less Than 1 Year

6. Do you think you need to further improve the network security awareness?

â–¡Yes â–¡No

Multiple choices

7. How you surfing the Internet?

â–¡Desktop â–¡Laptop â–¡Tablet PC â–¡Mobile phone â–¡Others_____

8. What is the purpose of your Internet?

â–¡News â–¡Musicâ–¡Video â–¡Shopping Online â–¡Books â–¡Entertainment

â–¡Social

9. Which type of viruses you often run into your computer?

â–¡Boot Virus â–¡File Virus â–¡E-mail Virus â–¡Trojan â–¡False Advertising

â–¡Phishing Sites â–¡Spyware

10. Which network account security issues you experienced?

â–¡Instant messaging software account was stole

â–¡The E-mail account was stole

â–¡The online-game account was stole

â–¡The bank account was stole

â–¡Find the Trojan in your computer

11. How you protect your computer?

â–¡install an Anti-virus software

â–¡use the hardware Anti-virus technology

â–¡Cloud Security

â–¡other______________

12. Which Anti-virus software is much better? (1 is the best 9 is the worst)

[ ] Kaspersky

[ ] McAfe

[ ] Avast

[ ] Nod32

[ ] Norton

[ ] Rising

[ ] Kingsoft

[ ] Jiangmin

[ ] 360

13. Currently, what is the antivirus software you are using?

â–¡Kasperskyâ–¡McAfeeâ–¡Avastâ–¡NOD 32â–¡Nortonâ–¡Risingâ–¡Kingsoftâ–¡Jiangmin â–¡360 â–¡Other_________

14. What effects of the virus have your suffered?

â–¡Delete the files

â–¡Destroy the files

â–¡Shutdown the system

â–¡Format the disks

â–¡Disable the Internet

â–¡Stop the Anti-virus software

Appendix C – Questionnaire in Chinese

单项选择

1.你的性别? □男 □女

2.你的年龄?

□小余16岁 □16-25岁□26-35岁 □36-45岁□45岁以上

3.你的工作是什么?

□学生 □教师 □白领 □蓝领 其他___________

4.你使用电脑的频率?

□每天用电脑工作 □少于1小时 □1-3小时 □多余3小时

5.你是否记得你的电脑第一次感染病毒是什么时候?

□少于1年 □1-5年 □5-10年 □10多年之前

6.你是否觉得自己需要提高网络安全意识

□是 □否

多项选择

7.你经常使用什么设备浏览网络?

□台式机 □笔记本 □平板电脑 □手机 □其他_______

8.你上网的主要目的是做什么?

□浏览新闻 □听音乐 □在线视频 □在线购物 □电子书 □娱乐 □社交

9.在你的计算机中你经常会遇到那种类型的计算机病毒?

□引导型 □文件型 □邮件型 □木马 □虚假广告

□钓鱼网站 □戒牒软件

10.你经历过以下哪种网络安全账户问题?

□即时通讯软件账号被盗(如QQ,MSN)

□邮箱账号被盗

□网游账号被盗

□网银账户被盗

□在你的计算机上发现木马程序

11.你是如何保护计算机的?

安装反病毒软件 □使用硬件反病毒技术 □加入云安全

12.以下哪个品牌的杀毒软件更好一些?(1最好,9最不好)

[ ]卡巴斯基

[ ]麦咖啡

[ ]小红伞

[ ]NOD32

[ ]诺顿防病毒

[ ] AVG

[ ]金山毒霸

[ ]江民科技

[ ]360杀毒

[ ] 瑞星杀毒

13.你当前正在使用的杀毒软件是什么?

□卡巴斯基 □麦咖啡 □小红伞 □NOD32 □诺顿反病毒 □AVG □金山毒霸 □江民科技 □360杀毒 □瑞星杀毒 □其他_______

14.计算机病毒病毒带来哪些影响?

□删除文件 □破坏文件 □自动关闭系统 □格式化磁盘

□阻止网络连接 □终止反病毒软件运行 □其他________

Appendix D – Interview Questions

1. What kind of network do you have at home?

1) When you began to use this internet connection?

2) Why you chose this type of connection to surf the internet?

3) How often you use the internet?

4) Do you think this is the best way to surf the internet?

2. What is definition of computer virus?

3. What is the influence (affect) of the computer virus?

4. Try to describe the first time the virus or Trojan infected your computer?

1) when the first time your computer infected by virus?

2) At that time how many viruses in your computer?

3) How these viruses enter your computer, can you tell me more details?

4) At last, how you anti these virus?

5. Do you think the computer virus will be disappearing in the future?

6. What is your opinion of the virus or Trojan theft the online account(online bank,BBS,Social,ect)

1) When the first time your online account stolen by virus Trojan?

2) Can you still remember how the Trojan stole your online account?

3) When the online account stolen, what is your first reaction?

4) Except the money, do you think the Trojan has other aims to stolen the bank account?

7. Today, what is the main transmission of the virus and Trojan?

1) What kind of media do you usually use to exchange and share the files?

2) How often do you use it?

3) Do you think it is security enough to exchange the files in different computers? If not, Which media do you prefer?

8. Currently, what is your opinion of the privacy?

1) Do you store all your privacy information in your computer?(such as your bank account number, password)

2) Do you think store in computer is more safety than others?

3) When you surf the internet do you usually us the "automatically save the username and password" function?

4) Do you want to change this habit?

9. Which methods do you usually to prevent the virus or Trojan invades the computer?

1) When you first time use the Anti-virus software?

2) What brand of software you use?

3) Why you chose this brand, can you give me some reasons?

4) How many computer security software are there in your computer?

5) Do you think install more than one Anti-virus software is a good way to protect your computer?

10. Do you think people's awareness of behavior is more important than Anti-virus technology?



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now