West Sussex Personal Use Cybercrime/Online Safety Survey

Closes 19 Nov 2018

CyberCrime Survey

1. What is your postcode?

2. How often do you access the internet?

(Required)

3. How much time do you spend online in an average day?

(Required)

4. In what ways do you use the internet? (Please select all that apply)

(Required)

5. What do you access the internet for? (Please select all that apply)

(Required)

6. What are your biggest concerns in relation to Cybercrime? Please rank from highest concern to lowest concern.

Definitions list

Courier scam:

When you’re called by someone pretending to be from your bank, the police or other law enforcement authority, and convinced to tell them your card details over the phone. They arrange for a courier to pick up your card to take it away for evidence or to have it destroyed. In reality, the card is collected by the fraudsters to withdraw money from your account

Fix scam:

Victims are cold called, usually by phone and told that there is a problem with their computer and for a nominal fee the suspect can fix it. The suspects often claim to be working with Microsoft who have identified that the computer has been infected with a virus and offer an update or fix

Identity theft:

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, to the other person's disadvantage or loss

Phishing scam:

An attempt at identity theft in which criminals lead users to a counterfeit website in the hope that they will disclose private information such as user names or passwords

Virus - malware issues:

A file written with the intention of doing harm, or for criminal activity created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Short for ‘malicious software’

Trolling:

The word 'troll' is slang for a person who deliberately starts arguments on the internet with the aim of provoking an individual or group into an emotional response or of otherwise disrupting normal on-topic discussions

(Required)

7. How confident do you feel in recognising different types of Cybercrime?

(Required)

8. How safe do you feel about your personal information when you are online?

(Required)

9. Do you have security software installed on your personal device(s)?

(Required)

10. Are you aware of any attempted, but ultimately unsuccessful, Cybercrime attacks made against you in the last 12 months?

(Required)

11. Are you aware of being a victim of Cybercrime in the last 12 months?

(Required)