A Study On Current Attitudes Influencing Consumer Behavior With Regard To Computer Protection Software
A Study On Current Attitudes Influencing Consumer Behavior With Regard To Computer Protection Software
Final Dissertation
Submitted by
ANU MATHEWS
The project work has been carried out at Loyola Institute of Business Administration
(LIBA), Chennai.
I would like to express my gratitude to all those who gave me the possibility to
complete this dissertation. Especially I am obliged to the Director, Loyola Institute of
Business Administration (LIBA) Rev. Fr. Christie and the Finance Controller, LIBA
Rev. Fr. Maria Augustine. I have furthermore to thank the Chairperson for the part-
time PGDM programme Dr. Thiagarajan for his stimulating support.
The present attitude of the consumers with respect to the protection of their computers
has to be studied. This will give an insight into the consumer awareness level on the
dangers that the computer is exposed to in the everyday activities.
Also the study is meant to understand the consumer behavior factors influencing
specific brand choice among current users for computer protection softwares. There
are more than a dozen softwares brands available in the market today. The study
would would also help in understanding the choice of a particular brand of software
over another and the features that consumers look for in these brands.
CURRICULUM VITAE
Email : [email protected]
Page
BONAFIDE CERTIFICATE
ACKNOWLEDGEMENT
ABSTRACT ii
CURRICULAM VITAE v
GLOSSARY
CHAPTER 1
Introduction
Computer virus
Antivirus software
History
Internet usage pattern in india
Scope of the study
Objective of the study
CHAPTER 2
CHAPTER 3
RESEARCH METHODOLOGY
Research objectives
Sample design
Instrumentation
Discussion guide
Data analysis
Limitations of the study
CHAPTER 4
CHAPTER 5
Bibliography 44
LIST OF FIGURES
Figure Title
Page
The following are some of the commonly used terms in this thesis:
Common types of malware and what they might do to your infected computer:
Spyware: collects some personal information about you, like passwords and
information that is typesd into your computer.
INTRODUCTION
COMPUTER VIRUS:
A computer virus is a computer program that copies itself to infect a computer. The
term "virus" is also commonly but used to refer to other types of malware, adware,
and spyware programs that do not have the reproductive ability. A virus usually
spread from one computer to when its host is taken to the target computer; for
instance because a user sent it over a network or the Internet, or carried it on a
removable medium such as a floppy disk, CD, DVD, or USB drive.
“Computer virus" is sometimes used as a umbrella term to include all the various
types of malware, adware, and spyware programs that do not have the reproductive
ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware,
dishonest adware, crimeware, and other malicious and unwanted software, including
true viruses. Viruses are sometimes confused with computer worms and Trojan
horses, which are technically different.
ANTIVIRUS SOFTWARE
Antivirus (or anti-virus) software is used to prevent, detect, and remove malware,
including computer viruses, worms, and the trojan horses and the other viruses. Such
programs may also prevent and remove adware, spyware, and other forms of
malware.
The topic for the study has been chosen to interpret the consumer behaviour with
regard to the usage of anti-virus softwares and awareness level of online threats
among computer users.
85 million Indians are PC literates. 57m are claimed users and 42 million are active
internet users. India is listed 4th among the countries with highest no. of Internet users.
China, United States and Japan are ahead of India in the list.
3 out of 4 computer users in India use Internet and PC ownership has increased by
48% last year. Out of these, 4 million internet users access it through mobile phones.
Only 13% of existing internet surfers prefer to read in english.
SCOPE OF THE STUDY
The scope of the study is to understand the current attitudes and perceptions about the
computer protection software and online computer threats.
Also, the scope of the study includes factors influencing specific brand choice among
current users and reasons for preferences have also been analyzed.
The broad objective of the study is to provide relevant inputs developed through
distilling of end consumer understanding in the following areas
1. current attitudes and perceptions which influence consumer thinking and behavior
with regards to computer protection software
2. factors influencing specific brand choice among current users
CHAPTER 2
There are competing claims for the innovator of the first antivirus product. Possibly
the first publicly documented removal of a computer virus in the wild was performed
by Bernt Fix in 1987.
Earlier viruses were typically spread by infected floppy disks. Antivirus software
came into use, but was updated relatively infrequently. During this time, virus
checkers essentially had to check executable files and the boot sectors of floppy and
hard disks. However, as internet usage became common, initially through the use of
modems, viruses spread throughout the Internet.
Virus checkers had to check many more types of files. As always-on broadband
connections became the norm and more and more viruses were released, it became
essential to update virus checkers more and more frequently. Even then, a new zero-
day virus could become widespread before antivirus companies released an update to
protect against it.
The way computer viruses work, where they come from and the problems they create,
it is a recent phenomenon that has threatened the PC world to a great extent today.
But the actual truth is that computer viruses have been around for longer than most
people might think.
The first computer virus popularly known as the 'Brain virus' was created in 1986 by
two Pakistani brothers, Amjad and Basit Farooq Alvi. This virus, which spread via
floppy disks, was known only to infect boot records and not computer hard drives like
most viruses today. The virus also known as the Lahore, Pakistani, Pakistani Brain,
Brain-A and UIUC would occupy unused space on the floppy disk so that it could not
be used and would hide from detection. It would also disguise itself by displaying the
uninfected bootsector on the disk.
In 1987, the Lehigh virus was discovered at Lehigh University in the United States.
The Lehigh virus was the first memory resident file infector that attacked executable
files and took control when a file was opened. The Jerusalem virus also appeared
around this time at Hebrew University in Israel. Like the Lehigh virus, the Jerusalem
virus was also a memory resident file infector. It contained bugs to re-infect programs
that were already infected.
In March 1988, the first anti-virus was designed to detect and remove the Brain virus.
The anti-virus also immunized floppy disks to get rid of the Brian infection. At the
same time, the Cascade virus appeared in Germany. The Cascade virus was the first
encrypted virus, which was coded and could not be changed or removed.
Thus, during the late 1980's and the early 1990's, viruses on the loose which infected
files, disks etc. on the computer and caused a great deal of damage received a lot of
media attention. Magazines such a Business Week, Newsweek, Fortune, PC
magazine, and Time began publishing articles about these destructive viruses running
wild and demanded a solution for all these problems.
In 1991, Symantec released the Norton Anti-virus software. Anti-virus products from
IBM, McAfee, Digital Dispatch and Iris also became available.
A few years ago, in 2000, the ILOVEYOU virus wreaked havoc around the world.
The virus that was created in the Philippines was sent through email and spread
around the world in one day infecting 10 percent of computers connected to the
Internet and causing $ 5.5 billion dollars in damage. Hence, viruses are still common
and still create chaos even today. It is hard to determine the reasons for all these
actions and why virus writers create computer viruses. Some do it for their personal
gain, for research projects, pranks, vandalism, etc., while others want to help make
improvements in programs.
METHODS TO AVOID DETECTION
Some viruses can infect files without increasing their sizes or damaging the files.
Some viruses try to avoid detection by killing the tasks associated with antivirus
software before it can detect them.
MS-DOS platform, makesd sure that the "last modified" date of a host file stays the
same when the file is infected by the virus. This approach does not fool anti-virus
software, however, especially those which maintain and date Cyclic redundancy
checks on file changes.
As computers and operating systems grow larger and more complex, old hiding
techniques need to be updated or replaced. Defending a computer against viruses may
demand that a file system migrate towards detailed and explicit permission for every
kind of file access.
TYPES OF ONLINE THREATS
It's well known that the part most likely to cause an automobile accident is the
nut behind the wheel. Sadly, the person at the keyboard is often the weakest
link in computer security.
Many attacks simply take advantage of weak spots in the operating system (i.e.,
Windows) or programs. There are many ways to deliver malicious content to
computers that will directly or indirectly install all sorts of malware
The network (Internet for most users) is another vulnerable part of the system.
Network worms, eavesdropping and hacking are methods used to attack the network.
Even computer hardware can be attacked. For example, if someone can gain
momentary access to your computer, it's simple to insert a simple bug, called a key
logger, between your keyboard and computer. Then everything you type, including
account numbers and passwords is sent to person who installed it.
WiFi adds another easily compromised element to the network. Criminals also use
legitimate websites by breaking in and substituting poisoned pages that attack anyone
who visits them. This is a growing threat.
THE IDEAL ANTI-VIRUS SOFTWARE
Factors we took into consideration while looking for an ideal anti-virus software
The ideal anti-virus software should remove all the existing viruses on a pc
The ideal anti-virus software should also be able to prevent viruses from
The ideal anti-virus software should remove existing spyware and trojan
The ideal anti-virus software should proactively prevent spyware and trojan
The ideal anti-virus software should proactively remove all spyware and trojan
The ideal anti-virus software should also remove all adware from the pc
The ideal anti-virus software should also prevent adware from penetrating
your pc
The ideal antivirus software should prevent popup ads from appearing on your
pc
• 330,000 new pcs around the world are turned into zombies every day, sending
more and more spam. Source: Panda
• Rs. 4.06 is the cost of a working stolen credit card number with CVV security
number, on underground hacker websites.
• 182,500$ is the amount it costs a company with 1000 employees to deal with
spam per year due to productivity losses.
• Malicious websites on the rise, most surfers unaware: The research also found
that more than 77% of the websites that were found to be malicious were
actually sites with good reputations that had been compromised by attackers.
Furthermore, of all the unwanted email in circulation in the 2nd half of 2008,
90.4% contained links to spam sites and/or malicious websites.
DNS translates web addresses into actual requests, meaning any url typed into a
browser’s address field on an infected PC can send the user to a fake clone website.
• Facebook : Users are receiving fake messages claiming to lead them to videos
of drunk girls dancing or performing stripteases, at which point they are
redirected to a facebook lookalike page and asked to install a fake Flash
update called ‘Adobe_player11.exe’.
There will be more victims of cybecrime as security is something that isnt visibly
beneficial, and some people may start cutting corners.
Trends to watch out for in the field of corporate security inteligence include
threats potentially caused by disgruntled employees and data loss through negligence
or theft of equipment.
The prevalance of botnets means that more and more computers in homes and
offices around the world are infected than people realize or are capable of detecting.
The level of entrepreneurship shown by online criminals only shows how
sophisticated and widespread crime is becoming.
NEED FOR THE CURRENT STUDY
The consumer attitude towards the computer protection softwares has not been
researched upon by many people earlier. And there is a very interesting discovery to
be made in this topic because the use of the internet has increased drastically and so
has the danger levels for the online threats.However, there is not much awareness
among the consumers on the need for computer security softwares.
Hence there is a need to understand the minds of the consumers and their perception
on online threats and computer protection softwares.
CHAPTER 4
RESEARCH METHODOLOGY
RESEARCH OBJECTIVES
The main purpose of this study is to investigate the consumer attitude towards the use
of computer protection as there is not much awareness among the consumers on the
need for computer security softwares, inspite of the high level of danger posed by
online threat.
Primary Objectives:
1. To identify the perception about online threats ands the relevance of usage of
computer protection softwares. To understand the attitude of the consumer
with regards to the danger posed by the online threats.
2. To identify the types of consumers using computer protection softwares.
Secondary Objectives:
1. To assess the reasons for brand choice while buying a computer protection
software
SAMPLE DESIGN
The study was carried out among 32 one to one conversations with consumers across
Chennai. The sample included males from the age group of 20-40 years.The SEC
category of the sample was SEC A/B.
INSTRUMENTATION
The study used a preset discussion guide to help through the one to one discussion
with the consumer. The discussion guide contained all the areas to be covered during
the conversation. However, there was no questionnaire which had to be filled in by
the consumers. The conversations were recorded in audio and by memory.
DISCUSSION GUIDE
Data was analyzed through the SPSS program using Pearson correlation coefficient
and multiple regression analysis, and simple regression analysis. These techniques are
appropriate to variables with interval scales and each allows an independent variable
to be correlated with a dependent variable.
Though the research has been properly planned and well executed, there are certain
limitations, which are inherent in nature and are out of the researcher’s control. The
effectiveness of the project is felt only when the results are read along with the
limitations and constraints faced during the course of this study. The response from
the respondents could be casual in nature. This may be due to lack of interest or time
on their part. The correctness of information provided by the respondents in the
personal data could not be established. Some of the information provided by the
respondents might not be true. Getting timely responses from the respondents was a
difficult task. The reason for this may be attributed to their busy schedule.
CHAPTER 5
The analysis based on the research that was carried out gave some definite and useful
insights into the consumer perception and attitude on the use computer security
softwares and their attiude towards the dangers which their computer is exposed to
everytime they use the internet.
This chapter covers the following analysis and interpretations made on consumer
behavior with regard to computer security softwares:
“Computer Virus”
The first category of consumers have a high prominence for computer security threats.
They tend have a much higher mindspace for computer security softwares. These
consumers also have high familiarity levels for computer security softwares. Their
perceptions are based in high number of incidents which have either happened either
to them or their friends.
Computer Destruction Before One’s Eyes
The second category of consumers has a low prominence for computer security
threats. They tend have a much lower mindspace for computer security softwares.
These consumers also have lower familiarity levels for computer security softwares.
They have had lower impressions of incidents which have either happened either to
them or their friends and their impressions are also based on these low number of
incidents.
Following are the segments of consumers based on the mindset and behavior with
regard to the usage of computer security softwares
SEGMENTS
Enlightened Victims
Vigilant
Novice
Freeloaders
Dropouts
Smug
Apathetic
ENLIGHTENED VICTIMS
• Category endorsement as
reaction to a personal event;
agenda of preventing another
disaster
Enlightened Victim
Some of the statements made by the enlightened victims during the conversation are:
“ there was important files related to my work in my laptop which were corrupted…it
made my life really difficult…now do not want to take a chance anymore”
VIGILANT
Vigilant
Statements made by the vigilant victims during the conversation are:
“Anyone who uses the computer for accessing the net is under threat”
“One can surf and download with a free mind when there is good antivirus
protection in the computer”
“I am sure that my system would have had viruses if I did not have protection in it”
“I cannot be always be behind my son and daughter when they use the system… this
way, I am safer”
ENDORSEMENT OF LICENSED VERSIONS BY BOTH ENLIGHTENED
VICTIMS AND VIGILANT SEGMENTS
“unlicensed might have some files missing because when a software is cracked, not
all files will get copied…un licensed cannot give good protection as licensed antivirus
software”
“ only licensed software can detect all viruses as only these will get updated
properly”
“ free antivirus versions will not be good…only the licensed ones that are bought
will be able to get updates to offer protection from new virus”
“ trial and free versions will not give protection against new viruses”
“ with free versions, while detection is possible, deleting might not be possible”
NOVICE
incidents
Novice:
Some of the statements made by the novice customers during the conversation are:
SEGMENT DEFINING ASPECTS KEY IMPLCATIONS
• impression that it is a
waste of money to buy
when companies are
giving free trial versions
“ I do not know much about computers and all…. I bought it for my children to help
them with their school projects and all…at the place where I bought the system, they
included the virus software also … I have not now bothered to renew”
“ It was there as part of the initial things we got with the computer…but it has not
been used much… I do not think we need to buy again now”
Free Loaders
Some of the statements made by the free loaders during the conversation are:
“Why waste money when you have trial versions to use whenever you need?”
“ As long you can access trial versions which offer solutions on that immediate
moment when you sense there is a problem with your computer, there is no need to
renew subscriptions”
DROP OUTS
SEGMENT DEFINING ASPECTS KEY IMPLCATIONS
Drop outs
Some of the statements made by the drop outs during the conversation are:
“I used to have it once … then I uninstalled it… Antivirus slows the computer
significantly”
“Antivirus takes a lot of space in the computer and increases its load”
“ Antivirus consumes a lot of RAM and makes the computer very slow”
“ Antivirus will keep launching dialogue boxes and will not let us work smoothly”
SMUG
Smug Segment
Some of the statements made by the smug during the conversation are:
“If you are connected with the internet, then only protection is necessary… I am very
careful in terms of what is inserted in my computer”
“ I am the only person using my computer…it is very safe as I use it only for
mailing and for social networking”
“ only foreign softwares like Norton are available and these can be purchased only
online and are very costly ….these must be at least 4000 to 5000 per year…it is not a
necessary expense if one is visiting only secure sites”
‘ when we have managed without antivirus for so long without facing problems, then
why opt for one now? ”
APATHETIC
SEGMENT DEFINING ASPECTS KEY IMPLCATIONS
Apathetic segment
Some of the statements made by the apathetic segment during the conversation are:
“ they say all these things but I have not faced problems yet…so not really
necessary”
CRITICAL TASKS
There are various factors which consciously influence the choice of brands for
a computer protection software. Brand stature and acceptability, in the
computer protection context for the consumers is rooted in
impressions of its effectiveness,
credibility gathered from “personal experts “
“neutral” credible sources
It is the sense of popularity and goodwill perceived about a brand that has
greater influence on involvement with it than factors like presence or absence
of international lineage, prestige value when it comes to the purchase of
computer protection softwares
CHOICE OF BRANDS:
When faced with choice of brands with established expertise and having to
evaluate them, the following factors find mention with weightage depending
on personal considerations
Some of the statements made by the consumers about the choice of brands are:
“ Kaspersky has the reputation of being the best… it is a big brand all over the
world”
“ Everyone uses Kaspersky these days… hence there is nothing to think about before
buying this”
“ I was using Norton before… then the SP Road shopkeeper only suggested
Kaspersky saying that thus is equally good”
“ Everyone knows about Quick heal…it must be the most widely used antivirus”
“ Anyone who you ask mentions the name of Quick heal only”
“ Positive of Quick heal is that it repairs corrupt files unlike MacAfee, Norton, Avast
which delete files instead of repairing”
“Norton is the biggest name in antivirus… I think they are the world’s biggest…you
pay for that reliability and trust when you pay 200 Rs more for Norton”
“ I let the person who comes to help with my computer problems decide which
brand to buy… he said MacAfee is very good and it was his choice”
“ shopkeeper recommended K7…he said that it was good and he will vouch for it…I
bought antivirus from him last time as well… that time I bought Norton…but he told
that this is lesser price but with no dip in quality or effectiveness… he recommended
this as a better buy”
“ came to know of K7 from the dealer…I bought the computer from him only…was
using MacAfee before…while it searches for viruses, it cannot delete all…with K7, I
feel that problem is not there”
They are rather more assured to buy a software which has been rcommended
by their friends/relatives.
“ even before you see the brand advertisement and all, you get to read about
it somewhere if it is very good”
“ the best scheme for a new brand is when people who know about computers
talk about it …. That is more reassuring that a price offer for me”
“ I will definitely doubt an unknown brand of antivirus that is priced much
cheaper than the leading ones… who knows whether it is genuine, and safe…
what if it is a stripped version which can give protection only from a few
viruses”
“ I do not ever want to try antivirus that I have not heard of before or that
the person from whom I bought the computer does not know anything about”
“ I need to know that the antivirus company will be giving safety from viruses
that come up even after the day that I purchase it”
CHAPTER 5
The research study and analysis has helped in understanding the mindset of
Indian consumers with regard to the use of computer security softwares. The
main concern being that the number of online threats and virus infections are
on the rise.
However, the Indian consumer is clearly not very conscious about the safety
of his computer. The consumers have been segmented in to Enlightened
victims, Vigilant, Novice, Freeloaders, Dropouts, Smug and Apathetic.
The choice of brands is again not very reasonable. The purchase is made based
on the recommendations made by their friends and family.
There is no positive sense of adventure and excitement in making the
discovery of a computer protection brand.
The segment of computer security software is highly cluttered and there is not
a definite kind of ideal customer. Each one of them have their own
experiences and reasoning for either using or not using a computer security
software.
It would take a few more years before the Indian consumer gets fully educated
and aware of the threats faced by its computer and take protection proactively
and not reactively.