Survey design edit

This commit is contained in:
Radim Lipovčan 2018-09-28 12:49:20 +02:00
parent 0323c18358
commit a6e3d821f9
2 changed files with 28 additions and 1 deletions

View File

@ -419,4 +419,13 @@ Protocol
year = 2018,
url = {https://www.acronis.com/en-us/blog/posts/black-ruby-combining-ransomware-and-coin-miner-malware},
urldate = {2018-08-11}
}
@inproceedings{krombholz2016other,
title={The other side of the coin: User experiences with bitcoin security and privacy},
author={Krombholz, Katharina and Judmayer, Aljosha and Gusenbauer, Matthias and Weippl, Edgar},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={555--580},
year={2016},
organization={Springer}
}

View File

@ -715,7 +715,7 @@ Although darknet markets may support Monero, a short inspection of top 10 market
\label{cha:monerousersurvey}
The goal of this research is to gather information on end users behavior regarding Monero cryptocurrency with emphasis on key management and security practices. For this purpose, an online questionnaire was created.
Specific research questions are based on typical usage patterns of cryptocurrency users, online forums and Reddit communities centered around Monero as well as problematic areas regarding computer and data security in general.
Specific survey design and research questions are based on Bitcoin security and privacy study, typical usage patterns of cryptocurrency users, online forums and Reddit communities centered around Monero as well as problematic areas regarding computer and data security in general \cite{krombholz2016other}.
\section{Research questions}
The survey was designed around seven question groups, some of them were shown only if the participant chose the appropriate answer.
\begin{itemize}\itemsep0em
@ -756,6 +756,9 @@ Complete survey is attached in chapter \ref{monero-user-study-pdf}.
\chapter{Obtaining Monero and running the network}
Monero mining is a process done by miners in order to verify transactions on the network and add them to the blockchain together in the form of a block. This results for them in a reward in the form of new coins that are emitted as a reward for block solving.
Very often, miners combine their computational resources into one of the pools on the network. Thanks to higher total hash rate, there is a greater chance of solving the block thus gaining the reward of newly emitted coins. After solving each block, the reward is distributed equally to miners connected to the pool according to PPS (per-per-share) or PPLNS (per-per-last-number-of-shares) system.
\section{Monero Proof-of-work}
\section{Mining pools, solo mining}
\section{Web mining, botnet mining}
@ -766,6 +769,18 @@ Complete survey is attached in chapter \ref{monero-user-study-pdf}.
\section{XMR obtaining comparison}
\chapter{Monero miners research}
%tento výzkum jsem nenašel, takže říct, že tam nic dalšího není napsat to tam
%zobrazování voleb pro multiple choice randomizovat
% total hardware dát pryč a místo toho jen hashrate OK
%obtain software > official github OK
%2x mám incident OK
%pooly podle abecedy OK
%vypustit verzi windows OK
%other u linux os OK
%mining os dodat OK
% škola > dodá Vlasta info
% místo interested in modern technologies >> eearly adopter OK
% privacy aspect vygooglit části
The goal of this research is to gather information on people who run mining cryptocurrency software and map their behavior regarding system administration with the emphasis on security practices. For this purpose, an online questionnaire was created.
Specific research questions are based on cryptocurrency mining setup patterns, used software and problematic areas regarding computer and data security in general.
@ -809,6 +824,9 @@ The goal of this research is to gather information about people who run mining p
Specific research questions are based on available pool software, infrastructure services, hosting software and problematic areas regarding computer and data security in general.
\section{Research questions}
%antiDDOS!!!!! OK
%co znamena zaloha poolu rozepsat OK
The survey was designed around five question groups, some of them were shown only if the participant chose the appropriate answer.
\begin{itemize}\itemsep0em
\item G01 - Introductory information