Computer Viruses: A Quantitative Analysis Term Paper

The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software. This presents a new threat to computer users that must be addressed, hence it is more important than ever that effective methods of prevention and control are designed to prevent future data loss.

Methodology

Design of the Study

The research study takes into consideration multiple factors when deciding the methodology. The history of viruses, positive and negative effects, organizational impacts, etc. will all be examined. These factors will be measured using a variety of techniques including field research that will involve collecting data on two user groups from a self administered questionnaire. The researcher will also compare data gathered from the literature review from the information gathered from the field research to identify what if any relationships exist between the two sets of information.

A quantitative research design will allow the researcher to distinguish what relationship exists between computer viruses and other dependent variables within a given population (Hopkins, 2000). The quantitative research design selected will be descriptive, establishing what association exists between the variables being examined. Independent variables to be examined will include user education, age, experience, sex, and job role. The dependent variable is the number of computer viruses attached to a specific user during a given time frame.

The main study will include a wide focus, in order to enable the researcher to estimate the effects of all variables likely to impact the dependent variable. For purposes of this study it may be more feasible to consider this a pilot study, as it will be difficult to survey a population sample size large enough to obtain the information necessary to complete a full descriptive analysis (Hopkins, 2000).

A pilot study will help the researcher identify the optimum sample size for a larger study, help determine the reliability of measurements necessary to complete the study and enable the researcher to verify whether the techniques adopted are feasible for a larger study (Hopkins, 2000).

Data Analysis

For purposes of this study the researcher will concern himself with measuring the difference in virus rates among two different users groups. The researcher will adopt a longitudinal research design to determine whether training and education result in less virus attacks and user error during a specified period of time (six months). Statistical analysis will be used to compare the relationships that exist between dependent and independent variables. Cross sectional longitudinal analysis will help the researcher measure the validity and reliability of the test in question.

Population Sample/Research Instrument

For purposes of this pilot study the researcher will sample two computer user groups consisting of 30 members each from 2 large urban corporate centers located in the downtown central business district. Users will participate answer questions provided on a survey that will identify their experience and level of training, number of viruses they are exposed to over a specified period of time, the damage incurred by those viruses and measures taken to prevent security risks and future attacks on their system. The survey will also attempt to identify users knowledge about the potential...

...

The preliminary research reviewed suggests that some users fail to understand the importance of security measures, whereas others do not understand how to configure security software and hardware properly to prevent a serious virus attack (Williams, 2001).
For purposes of this study the researcher also intends to find that a direct relationship or correlation exists between user training, experience and susceptibility to viral attacks. There is some evidence suggesting that user error is largely to blame for many virus attacks, whether that user error is the result of improper use or improper installation of security protection programs (Williams, 2001).

The researcher also intends to find that several simple best practices measures can be adopted to prevent future attacks on systems. These may include but are not limited to proper analysis of user vulnerabilities, testing organizational security protection methods against business applications, applying adequate security patches, updating systems documentation, regular and ongoing or specific training and attention to security management programs (Williams, 2001).

Conclusions/Implications and Recommendations

The research conducted in this study is of vital importance to private end users and organizational enterprises alike. Studies suggest that computer users are just as exposed if not more exposed in recent years to increasingly virulent and damaging strains of computer viruses. Much of the evidence presented thus far suggests that multiple factors may increase a users vulnerability to attacks, including but not limited to inadequate training and knowledge of the threats computer viruses pose.

This pilot study has much larger implications for the technological environment as a whole. The data collected from this study will help affirm what measures are likely to reduce computer virus risk for users regardless of their experience and the settings they work in. It will also help identify what techniques researchers can adopt in the future to further explore computer viruses and their reaching effects on the population at large.

This study will provide the framework and groundwork for future analytical studies that can include much larger population sample sizes, encompassing hundreds and even thousands of users on a global level. Hopefully the results of this study and of any studies that will follow will significantly reduce the number of people negatively impacted by computer viruses now and in the future. This in turn may result in greater data protections, personal protections and security insurance as users continue to use the Web for increasingly sophisticated practices well into the future.

Sources Used in Documents:

References

Hickman, J.R. (1995). "Viruses: New strains, new solutions." ABA Banking Journal,

Hopkins, W. (000). "Quantitative Research." Sports Science. 30, October 2005: http://www.sportsci.org/jour/0001/wghdesign.html

Horn, R.V. (2003). "Technology: Prudent computing." Phi Delta Kapan, 85(3): 183.

Hunton, J.E. (1998). "Facts and fables about computer viruses." Journal of Accountancy,


Cite this Document:

"Computer Viruses A Quantitative Analysis" (2005, October 30) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/computer-viruses-a-quantitative-analysis-70344

"Computer Viruses A Quantitative Analysis" 30 October 2005. Web.24 April. 2024. <
https://www.paperdue.com/essay/computer-viruses-a-quantitative-analysis-70344>

"Computer Viruses A Quantitative Analysis", 30 October 2005, Accessed.24 April. 2024,
https://www.paperdue.com/essay/computer-viruses-a-quantitative-analysis-70344

Related Documents

Benchmarking Keyloggers for Gathering Digital Evidence on Personal Computers Keyloggers refers to the hardware or software programs, which examine keyboard and mouse activity on a computer in a secretive manner so that the owner of the computer is not aware that their actions are monitored. The keyloggers accumulate the recorded keystrokes for later recovery or remotely convey it to the person employing them. Keyloggers aimed to serve as spyware and currently

Biochemical Analysis: Dengue Denv Protease Dengue Virus Protein Biochemical Analysis Database Search Methods Of the several CSU databases available, I chose to utilize PubMed, because Medline is specific for biological research. I also wanted to avoid retrieving qualitative studies, given the topic chosen, and felt Pubmed would be the best way to find quantitative studies. The first search string I used was , which retrieves 4,028 citations. Since I was unfamiliar with this topic,

Fibromyalgia syndrome (FMS) is a complex medical condition that affects about 5 million American people. The condition is characterized by "chronic widespread pain, fatigue, sleep disturbance, stiffness, impaired memory and concentration, anxiety and depression." (Facts of Life, 2001). Sleep disturbance and an increased sensitivity to pain follow a cyclic pattern in individuals having FMS, the result of which is a positive feedback loop. (Etiology of Fibromyalgia, 2003). Typically, fibromyalgia affects women,

Risk Assessment and Analysis
PAGES 15 WORDS 4889

Risk Analysis and the Security Survey The following risk analysis and security survey report will be centered on the hospital as an organization. Vulnerabilities can be classified as crime opportunities, opportunities for breaking rules and regulations, opportunities for profiting and also for loss. By definition, vulnerability can be a gap or a weakness inside a security program that might be exploited by opponents to acquire unlawful access. Vulnerabilities include procedural, human,

Released by the FBI and
PAGES 65 WORDS 17274

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

" (Muntenu, 2004) According to Muntenu (2004) "It is almost impossible for a security analyst with only technical background to quantify security risk for intangible assets. He can perform a quantitative or qualitative evaluation using dedicated software to improve the security of the information systems, but not a complete risk assessment for the whole information system. Qualitative assessment based on questionnaires use in fact statistical quantitative methods to obtain results. Statistical