The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software. This presents a new threat to computer users that must be addressed, hence it is more important than ever that effective methods of prevention and control are designed to prevent future data loss.
Methodology
Design of the Study
The research study takes into consideration multiple factors when deciding the methodology. The history of viruses, positive and negative effects, organizational impacts, etc. will all be examined. These factors will be measured using a variety of techniques including field research that will involve collecting data on two user groups from a self administered questionnaire. The researcher will also compare data gathered from the literature review from the information gathered from the field research to identify what if any relationships exist between the two sets of information.
A quantitative research design will allow the researcher to distinguish what relationship exists between computer viruses and other dependent variables within a given population (Hopkins, 2000). The quantitative research design selected will be descriptive, establishing what association exists between the variables being examined. Independent variables to be examined will include user education, age, experience, sex, and job role. The dependent variable is the number of computer viruses attached to a specific user during a given time frame.
The main study will include a wide focus, in order to enable the researcher to estimate the effects of all variables likely to impact the dependent variable. For purposes of this study it may be more feasible to consider this a pilot study, as it will be difficult to survey a population sample size large enough to obtain the information necessary to complete a full descriptive analysis (Hopkins, 2000).
A pilot study will help the researcher identify the optimum sample size for a larger study, help determine the reliability of measurements necessary to complete the study and enable the researcher to verify whether the techniques adopted are feasible for a larger study (Hopkins, 2000).
Data Analysis
For purposes of this study the researcher will concern himself with measuring the difference in virus rates among two different users groups. The researcher will adopt a longitudinal research design to determine whether training and education result in less virus attacks and user error during a specified period of time (six months). Statistical analysis will be used to compare the relationships that exist between dependent and independent variables. Cross sectional longitudinal analysis will help the researcher measure the validity and reliability of the test in question.
Population Sample/Research Instrument
For purposes of this pilot study the researcher will sample two computer user groups consisting of 30 members each from 2 large urban corporate centers located in the downtown central business district. Users will participate answer questions provided on a survey that will identify their experience and level of training, number of viruses they are exposed to over a specified period of time, the damage incurred by those viruses and measures taken to prevent security risks and future attacks on their system. The survey will also attempt to identify users knowledge about the potential...
Benchmarking Keyloggers for Gathering Digital Evidence on Personal Computers Keyloggers refers to the hardware or software programs, which examine keyboard and mouse activity on a computer in a secretive manner so that the owner of the computer is not aware that their actions are monitored. The keyloggers accumulate the recorded keystrokes for later recovery or remotely convey it to the person employing them. Keyloggers aimed to serve as spyware and currently
Biochemical Analysis: Dengue Denv Protease Dengue Virus Protein Biochemical Analysis Database Search Methods Of the several CSU databases available, I chose to utilize PubMed, because Medline is specific for biological research. I also wanted to avoid retrieving qualitative studies, given the topic chosen, and felt Pubmed would be the best way to find quantitative studies. The first search string I used was , which retrieves 4,028 citations. Since I was unfamiliar with this topic,
Fibromyalgia syndrome (FMS) is a complex medical condition that affects about 5 million American people. The condition is characterized by "chronic widespread pain, fatigue, sleep disturbance, stiffness, impaired memory and concentration, anxiety and depression." (Facts of Life, 2001). Sleep disturbance and an increased sensitivity to pain follow a cyclic pattern in individuals having FMS, the result of which is a positive feedback loop. (Etiology of Fibromyalgia, 2003). Typically, fibromyalgia affects women,
Risk Analysis and the Security Survey The following risk analysis and security survey report will be centered on the hospital as an organization. Vulnerabilities can be classified as crime opportunities, opportunities for breaking rules and regulations, opportunities for profiting and also for loss. By definition, vulnerability can be a gap or a weakness inside a security program that might be exploited by opponents to acquire unlawful access. Vulnerabilities include procedural, human,
" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.
" (Muntenu, 2004) According to Muntenu (2004) "It is almost impossible for a security analyst with only technical background to quantify security risk for intangible assets. He can perform a quantitative or qualitative evaluation using dedicated software to improve the security of the information systems, but not a complete risk assessment for the whole information system. Qualitative assessment based on questionnaires use in fact statistical quantitative methods to obtain results. Statistical
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now