<img alt="dcsimg" id="dcsimg" width="1" height="1" src="//www.qsstats.com/dcsuuvfw300000gkyg9tnx0uc_3f7v/njs.gif?dcsuri=/index.php/c/a/Research/Security-2001/9&amp;WT.js=No&amp;WT.tv=10.4.1&amp;dcssip=www.cioinsight.com&amp;WT.qs_dlk=XOjB0xwd7j5EfGzDfa7JGQAAAAM&amp;">
 

Methodology

By Terry Kirkpatrick  |  Posted 08-01-2001 Print

Methodology

How the survey was done: CIO Insight designed the security survey in partnership with Survey.com, a San Jose, Calif.-based supplier of online research services. The study was e-mailed to CIOs, CTOs and vice presidents of information technology and services gathered from a number of sources, including third-party lists and other Ziff Davis Media publications. The survey was posted on a password-protected Web site, and 554 people responded from June 12 to June 14.



 

Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.