Joke Collection Website - Public benefit messages - Network research report

Network research report

Research report on network

In our current society, reports are more and more closely related to us, so we should pay attention to the format of reports when writing. So, how to write the report correctly? The following is a network survey report I collected for you, hoping to help you.

Network research report 1 1. Research purposes: In order to expand the tea sales channels of Company A and improve the brand influence of Company A, the company plans to select Pu 'er tea for online sales. Through the investigation of online consumers, we can understand the online consumers of Pu 'er tea at present and further explore the online consumers of Pu 'er tea. At the same time, people of different ages are surveyed to understand the different needs of consumers, so that operators can better locate their products.

Second, research background: With the emergence of e-commerce, it seems to be changing the usual trading methods in this industry, and more and more tea merchants are integrated into Taobao. It is reported that only on Taobao, there are tens of thousands of online stores selling tea. In the recent data of sogou search, the topic related to "tea" has become the focus of netizens' attention. Famous teas such as Tieguanyin, Pu 'er Tea and West Lake Longjing are at the forefront of netizens' attention list. In this regard, many tea friends have begun to pay attention to the dynamics of the tea market online, and have opened stores and started online sales. This survey aims to more effectively understand the market and potential purchasing power of Pu 'er tea, determine consumers' personal preferences and understand the scale of online purchase of Pu 'er tea by consumers.

Third, the main categories of research:

1) The network market scale and marketing environment of Pu 'er tea (market capacity, market demand, market potential, sales situation, service satisfaction and deficiency, sales trend, etc. )

2) Online consumers of Pu 'er tea (consumer characteristics (age, gender, region, etc. ), purchase motivation, purchase behavior, purchase habits, etc. )

3) Competitor survey (who are the main competitors, their market share, strength, competitive strategy, advertising methods, positioning and means of Internet marketing strategy, development potential, etc.). ).

Fourth, the main survey methods:

Through online questionnaires (which can basically cover various factors that consumers must or may consider when buying tea), observation (Taobao shop, pat shop, etc. ), special discussion, search engine (Baidu, sogou and other comprehensive search engines), forum (tea website forum), community (Taobao, Alibaba community), Baidu know, etc. To make industry websites (food and health products websites, etc.). )

Verb (abbreviation for verb) Respondents:

(1) consumer

(2) the enterprise's competitors

(3) enterprise cooperators and industry neutrals

VI. Findings:

The online sales market of Pu 'er tea is huge and has great potential;

1) With the rise of online tea shops, the tea industry has touched "electricity" one after another: tea farmers sell their places of origin online, and the price is more than 30% cheaper than the market. Although the success rate of this promotion form is not high, it is still reasonable. At the same time, some professional shopping websites have been opened, and many tea merchants have also opened flagship stores online to attract customers with low prices and high quality. At present, there are tens of thousands of online shops selling tea on Taobao. With the spread of online sales trend, more and more Yunnan tea merchants began to go out of physical operation and go to the road of online sales. According to the survey, the online sales methods of Yunnan tea merchants are mainly divided into two categories. One is from physical operation to online sales, and the two business models are combined with each other.

2) Online cost advantage: Many tea merchants believe that tea retail stores have great limitations in business hours and market scope, and online sales can be sold to the market all day with developed logistics, which is a big advantage of online stores. In addition, online sales are more important. For operators, online sales save expenses such as facade rent, so the profits are more considerable. Low logistics cost and broad customer base are beyond the reach of entity management. With the powerful publicity function of the Internet, tea companies can publicize their tea products to win more consumers.

3) The overall operation level of the industry is not high: for brand tea enterprises and some professional websites, although the market atmosphere is good and the comparative advantages in e-commerce are obvious, it has not yet become a climate.

Consumer characteristics: ● Women are slightly higher than men. The survey shows that the proportion of women who drink the most drinks is higher than that of men, which is not unrelated to the fact that female consumers value the health and fashion characteristics of Pu 'er tea. In addition, drinking Pu 'er tea without getting fat is one of the main reasons why women choose Pu 'er tea more than men.

● Age: Young people are the main force. According to the survey, consumers aged 65,438 +05-25 are the main target consumers of Pu 'er tea, followed by consumers aged 26-35, accounting for 69.5% of the total and becoming the main consumers of Pu 'er tea.

The valid questionnaire data of 5600 respondents were classified, with males accounting for 5 1.94%, females accounting for 46.82%, and gender unknown accounting for 1.24%. According to the age of the respondents, 14.68% is under 20 years old, 36.9% is 20-40 years old, 34.05% is 40-60 years old, and 14.37% is over 60 years old (as shown in the figure

1); According to the occupations of the interviewees, 37.7 1% of them work in institutions, 33.07% in enterprises, 9.52% in students and 65,438+09.70% in other occupations.

● Drinking frequency: According to the survey data, most Pu 'er tea consumers in seven major cities are light consumers (drinking less than three times a month in 1), accounting for 55.9% of consumers, while the proportion of heavy consumers (drinking every day) is only 6.8%. This shows that there is still a large market development space in China Pu 'er tea market.

● The most common occasions for drinking Pu 'er tea: From the occasions when consumers drink Pu 'er tea, "when they are usually thirsty" is the most common occasion for consumers to drink Pu 'er tea, accounting for 68.9% of the respondents, followed by when they are out/traveling, and fewer consumers usually drink it.

Network research report 2 1. The background of the survey is 2 1 century, which is a network era. The network has entered various fields and plays an extremely important role in economy, politics, daily life or military affairs. Network has become an indispensable part of the world. Now, the new culture of network culture is spreading rapidly in China. Because it is different from all previous cultures in content and form, it will inevitably have a great impact on traditional culture. Now, network culture has become a new cultural phenomenon in university campus. So, what kind of influence does network culture have on college students? .

Second, the investigation method and process

In this survey, our research group adopts random questionnaire survey as the main method, supplemented by interviews and literature research, which mainly includes three aspects: first, the motivation and intention of college students to surf the Internet; Secondly, what influences and changes the network has brought to college students' life and study; Third, college students' understanding and views on the network. In order to understand this problem, the three of us conducted a random questionnaire survey on students in our college, which was conducted on Saturday and Sunday. A total of 100 copies were distributed and 98 copies were received. The recovery rate is 98%. The purpose of this questionnaire is to understand what positive and negative effects the internet has brought to college students, so as to attract the attention of schools and college students themselves. Therefore, guide college students to correctly understand and use the network. Minimize the negative impact of the network on college students.

Third, the survey results and analysis

positive impact

With the development of information network technology, the Internet has become a channel for college students to share and obtain information resources, which has a great positive impact on college students' thinking mode and behavior mode.

1. Network has opened up a broad information channel for college students.

With the gradual popularization of computer networks, college students can obtain ever-changing information of the times and knowledge of humanities and science and technology from various networks, and learn all kinds of knowledge and nutrition to develop and strengthen themselves. For example, in the questionnaire, the students' answer to "Do you think the internet makes your life better?" is: broaden your horizons and increase your knowledge by 52%; There are more things to do, and a sense of accomplishment accounts for 27%; 7% waste a lot of time. This result shows that the network has played a great role in improving the cultural quality of college students. The network has expanded our knowledge and given us room to roam. Its appearance has changed our traditional way of life and thinking, enabling us to sit at home and browse online books, receive a letter from Wan Li in a few minutes, get the information we need in the shortest time, and learn more knowledge through the distance education network. The network has opened up a new world of interpersonal communication, which is conducive to the development and expansion of interpersonal relationships. The development of the Internet has brought people a brand-new "network lifestyle".

Internet has opened the door for college students' study.

Nowadays, there are more and more resources shared on the Internet, and the dissemination of information and cultural exchange are only in an instant. The openness and convenience of the network and the diversity and extensiveness of the content provide college students with a broad learning space, which greatly broadens their ways of seeking knowledge and helps them broaden their horizons and promote their studies. Network can provide a free, relaxed and stress-free learning environment for college students, which is helpful to cultivate and develop their innovative ability. The network is a vast space with many new and unknown things, which is helpful to develop the potential of college students. It is convenient for college students to consult materials and solve learning problems. According to the survey results, 39 out of 100 college students have been in contact with the Internet for more than 4 years, and most of them spend 1 to 3 hours using online social tools, which shows that the Internet is closely related to college students' social activities. The survey data about "social network" shows that college students prefer to regard social network as a hobby or a tool for study and work, rather than an object they must rely on. Only a few college students show that social networks occupy most of their leisure time. On the other hand, the survey data about "social adaptability" shows that college students' social adaptability and realistic social skills are not good, but they hope to improve their social communication ability to be competent for future workplace life. In the questionnaire "Do you think there are any learning materials you need online?" The answer is: 85% of them are many; Some of them account for15%; No one thinks it's not. Also, in the questionnaire "How to ask for help when you encounter difficulties in your study": 23% students received counseling; Internet help accounts for 73%; Independent solutions accounted for 4%. This result shows that the network has a positive impact on college students' learning.

3. The network promotes the friendship and interaction of college students, and improves them together.

The most prominent advantage of the network is its interactivity. It is not only the carrier of information, but also the intermediary of the media, and it is a fast channel for communication between people. In reality, the relationship between people is relatively closed, and they always have scruples about their own behavior. The network only provides various virtual spaces such as forums, chat rooms, virtual communities, emotional post stations, etc. So that college students and netizens can directly express their opinions and opinions, fully express themselves, make friends, introduce their experiences to each other and make progress together. On the Internet, college students can not only express their feelings, exchange their thoughts and experiences, but also complain and express depression, thus achieving the dual effects of relieving study and mental stress.

4. The network guides the employment of college students and depicts the blueprint of their career.

Everything has advantages and disadvantages, and the network is also a double-edged sword, which has both positive and negative effects on college students. The openness, freedom and socialization of the network often make the network environment more complicated and lack of effective management and protection, which causes various problems when college students use the network, such as indulging in the network, indulging in online games, and over-networking life.

negative impact

1, the network may make college students' realistic emotion atrophy and communication ability degenerate.

In real life, interpersonal relationships are quite complicated, and interpersonal communication is always cautious. Mutual suspicion among people makes college students afraid to show their true feelings in many cases. The virtual society of the Internet provides a wide, safe and hidden communication platform for college students, which accords with the psychology that college students want to express their feelings but are afraid of emotional injury. Therefore, college students' strong desire for communication urges them to be infatuated with the communication mode of online virtual society. As far as the perception of time and space in interpersonal communication is concerned, the infinite extension of the network can easily make people feel far away from real life, and even lead to onlineness. Some people play "virtual roles" on the Internet and divide themselves into several roles, which leads to confusion of role conflicts, double or multiple personality conflicts with real roles, and may even lead to "split personality". Others have psychological barriers to communication, such as doubt and loneliness, due to their dependence on the Internet.

It takes time to learn interpersonal communication and deal with interpersonal relationships. However, college students' infatuation with the communication mode of online virtual society makes them lose the opportunity to communicate with others to a great extent and weaken their desire to communicate with others. The reduction of interpersonal communication tends to aggravate the self-enclosed psychology, cause the interpersonal relationship to fade, and lead to the phenomenon that college students only meet their spiritual needs and are divorced from reality. The network makes college students' emotions recognized and satisfied, and makes them have a strong sense of belonging and dependence on the network. In contrast, they are bored and indifferent to reality. Under this kind of passive resistance, some students feel nervous and uncomfortable in real communication, thus avoiding and fearing real interpersonal communication, resulting in interpersonal communication obstacles.

2. The network may make college students' thinking narrow and passive.

The real world is all-encompassing, which is obviously different from the virtual network. The limitation of college students' online life is that they are too emotional, superficial and one-sided, and there are often too few topics for realistic and rational thinking. In terms of interpersonal motivation, the network distorts some people's communicative motivation. Many people enter their own fields of interest as soon as they get online. This extreme style of "people are divided into groups" is narrow and is not conducive to the all-round development of personality.

College students' understanding of this society is often only to receive information and opinions from others, without full digestion and understanding, and without their own opinions and opinions, which leads to the phenomenon of conformity and lack of exercise in examining problems and phenomena with rational eyes, which will inevitably lead to one-sided and passive thinking of college students. In the attitude of interpersonal communication, the Internet has reduced people's mutual trust. Now, we are all concerned about the honest society. However, the inherent virtuality of the network determines its inevitable illusion. Facing the computer, you can tell who you are, and even you can choose your gender. I remember a famous joke: a person fell in love with the computer and the "net" at the other end of the network, but he didn't know that it was a dog surfing the internet opposite. Therefore, "I didn't know you were a dog" became a vivid portrayal of the illusory nature of the network. It is hard to imagine how much content can be trusted when communication lacks the cornerstone of trust. I don't know if this is the luck or misfortune of communication. In addition, the illusory nature of the network will bring a series of social problems, which we have to face in the network age.

3. The intersection of emotional barriers.

In the emotional aspect of interpersonal communication, the disorder and temptation of the network easily lead to emotional obstacles in communication. The network will also cause people's anxiety about communication security and induce "emotional indifference". Due to the appearance of the Internet, we seldom have heart-to-heart communication with our parents, and the distance between us and our families is getting farther and farther. We like to reveal anything online, whether it's talking to netizens or publishing diaries, feelings, etc. This should be shared with friends, and we are used to bringing it into this virtual world. Due to the characteristics of the media, communication through the media loses information. Although the network is very developed, it is still different from face-to-face communication with people. After all, the discourse information is finished, but emotional interaction is like shooting a cow across the mountain. The simplification of communication mode loses not only emotion, but also sense of justice, conscience and public morality.

4. College students are addicted to the Internet

College students have more free time. Some college students often chat or play games online in the afternoon and evening, but few really study online. With its high openness and compatibility, the Internet has brought knowledge and convenience, but it is also full of decadent and even reactionary contents and arguments. However, college students are at an important turning point where their outlook on life and values have not yet been finalized, and their discrimination and judgment on things are often insufficient. Moreover, college students will have a strong curiosity about new things, which makes their own ideology eroded by unhealthy information on the Internet, and then they can't control themselves, which leads to a vicious circle. In the questionnaire "How long do you spend on the Internet every day on average", the answer is: 25% is less than 1 hour; 1-2 hours accounted for 37.5%; 2-5 hours accounted for 29.2%; 8.3% were over 5 hours. The results show that although a few people surf the Internet for a long time, it also shows that college students are addicted to the existence of the Internet.

Four. suggestion

Understand the influence of the network on college students, while making full use of the advantages of the network, we should also face up to the imbalance of the network among college students, attract attention and solve problems. Here are some suggestions:

1, automatic control

(1) Enhance self-awareness. People with dual personality charm of rationality, self-discipline and humanistic care are needed in any era, especially in the network age. College students should have perfect self-discipline and desire to restrain their personal indulgence, use the Internet rationally and morally, and give full consideration to the benign interaction between people and society while demonstrating their network skills.

(2) cultivate a wide range of hobbies. Because of their wide hobbies, college students will inevitably spend less time online. In reality, they will take part in more leisure activities and strengthen interpersonal communication.

(3) Seek real external assistance, find ways to meet the needs in real life, and find real support. For example, communicate with counselors and counselors, listen to their opinions, or strive to achieve good results in learning to meet psychological needs.

2. Correct your thoughts.

A person's attitude towards life determines a person's lifestyle, and a positive and good psychology will inevitably make people bravely face difficulties and setbacks. If college students can regard the obstacles and difficulties in real life as opportunities to test themselves and overcome themselves, and carefully analyze the reasons, the problems will always be solved. If we continue the sincere release mentality on the Internet into reality and get rid of the hypocrisy and distorted mind, we will not fall into unprovoked depression and embarrassment, and there is no need to completely pin our emotions on the virtual network world and ignore the communication between people.

Ideals and beliefs are the spiritual pillar of life. College students should aim high, keep struggling, strive to create a brilliant life and make more contributions to society. There are so many college students who pursue life, and naturally there are not so many network problems.

Network Research Report 3 At present, with the continuous development of e-commerce, more and more financial companies carry out online business. E-banking and online stock trading once turned from physical form to virtual network.

Online trading may attract network intruders, whether it is online trading, theft or changing financial information; This is a huge risk for banks that focus on credit. How to ensure the security of transactions and keep secrets for customers is still the biggest difficulty to overcome in the development of online banking, and our upcoming large payment system has the same concerns.

First, the status quo of network security

2. The results of the 20-year national information network security survey released by the Ministry of Public Security not long ago show that 58% of 7072 users of important information networks and information systems in the fields of government, financial securities, education and scientific research, telecommunications, energy and transportation, national defense and enterprises have been surveyed.

Among them, 1 time accounts for 22 of the total, 2 times accounts for 13, and 23 times or more. Among the network security incidents, security incidents caused by computer viruses, worms and Trojan viruses account for 79% of the total security incidents, network attacks such as denial of service, port scanning and tampering with web pages account for 43%, and security incidents caused by large-scale spam spread account for 36%. 54% of the surveyed units suffered slight losses due to network security incidents, and serious and very serious losses accounted for 10 of the total number of units where security incidents occurred.

The relevant person in charge of the Public Information Network Security Supervision Bureau of the Ministry of Public Security said that the main reasons for cyber security incidents are the lack of implementation of the security management system and weak awareness of security prevention, among which 66% of the security incidents are caused by reasons such as not patching and preventing software loopholes.

In addition, the Public Information Network Security Supervision Bureau of the Ministry of Public Security and the Computer Security Professional Committee of the China Computer Federation also investigated the computer virus infection of more than 8,400 computer users. The survey shows that the computer virus infection rate of computer users in China is 87.9, an increase of 2. However, the number of users infected with computer virus for more than three times decreased significantly, accounting for 57. 1 of the total number of infected users, 26 fewer than last year, indicating that users' ability to prevent virus infection has improved.

The continuous development of the financial industry requires thorny institutions to share those extremely sensitive financial information in an open environment. Of course, there must be absolutely safe and effective safeguards to do so.

Electronic payment is the use of the original commercial computer network processing system, the introduction of debit cards and sales terminals and other technologies, fundamentally changing the traditional paper money, checks and manual counting, deposit and loan diversion settlement. In this way, it not only reduces the circulation of cash and checks in the society, but also makes the banking business break through the limitations of time and space.

The second is the existence of technical risks, which are gradually or continuously discovered. In other words, when a product is just launched, it is considered to have no security holes, but it may appear after a period of time. Many people don't know enough about it, which makes the risk exist for a long time.

At present, people usually access remote connections through passwords, which seems to be an unwritten industry standard. However, using a computer to run password attack software can crack passwords quite easily.

In order to meet the needs of users and enterprises and always maintain competitive advantage, enterprises have to constantly expand their network systems. However, every expansion of the network, even a new computer, a new server and a software application platform, will leave opportunities for viruses and worms and bring additional security risks to the enterprise network. At the same time, the era of pure virus is gone forever. Computer viruses that made headlines a few years ago, such as loffler, Melissa and Michelangelo, are no longer news, but they have been replaced by new viruses, and their damage has increased geometrically. This new virus is called mixed virus, which combines the destructiveness of traditional e-mail virus with the new network-based destructiveness, and can quickly discover and discover security vulnerabilities in the whole enterprise network, and carry out further destruction, such as denial of service attacks, dragging down servers, and attacking weak links of computers or systems.

With the continuous development of mixed threats, a single protection measure is powerless, and enterprises need multi-layer and deep protection of the network to be effective. A real defense-in-depth system can not only find malicious code, but also actively prevent malicious code attacks.

Second, measures to strengthen network security

Generally speaking, the security measures of online banking are mainly reflected in four aspects: first, the two sides shake hands, that is, customers must go through an encrypted secure channel to access the banking network; The second is to strengthen the construction of security infrastructure at the network level; The third is to increase the intrusion detection system, which can alarm in time when the invasion comes; Finally, the PKI mechanism is implemented in the application layer. Experts believe that, in theory, taking these four safety measures is foolproof.

At the same time, advanced two-factor authentication also provides a new mode that is more secure than password. This kind of network security goes beyond the traditional static password function. If a user wants to access specific data or information resources, he must input the password and dynamic code he knows. For example, a bank employee wants to access the bank's customer information database. In addition to entering the password provided by the bank IT administrator for each employee, he also needs to enter a different code generated every 60 seconds on the SecurID authentication device. For the authentication device, the code is unique and can be effectively displayed in the form of symbols within 60 seconds. The code generated by the authentication device, whether it is an illegal intruder or not, can hardly be deciphered in one minute, so the network security has been greatly improved.

At the same time, making a detailed and feasible disaster backup and recovery plan is also an indispensable means to ensure network security, that is, using technology, management means and related resources to ensure that designated key data, key information systems and key businesses can be restored and continue to operate within a certain period of time after the disaster. And use these measures to achieve zero data loss.

The large payment system will be popularized and operated in the whole country soon. If the network is interrupted, it will not only affect the interbank clearing business of commercial banks within its jurisdiction, but also have an immeasurable impact on the deposit and withdrawal and refinancing of the People's Bank of China. Therefore, it is suggested that network security should be the most important in the operation of this scheme, so as to effectively eliminate hidden dangers of accidents and ensure the safety of interbank funds.

;