Current location - Recipe Complete Network - Healthy recipes - Network research report
Network research report
Research report on network

In our present society, reports are more and more closely related to us, so we should pay attention to the format of reports when writing. So, how to write a good report? The following is the online survey report I collected for you, hoping to help you.

Network research report 1 1. Research purposes: In order to expand a company's tea sales channels and improve a company's tea brand influence, the company plans to choose Pu 'er tea for online sales. Through the investigation of online consumers, we can understand the current online consumers of Pu 'er tea and further tap the online consumers of Pu 'er tea. At the same time, people of different ages are surveyed to understand the different needs of consumers, so that operators can better locate products.

Second, research background: With the emergence of e-commerce, it seems to be changing the usual trading methods in this industry, and more and more tea merchants are integrated into Taobao. It is reported that in Taobao alone, there are tens of thousands of online stores selling tea. In the recent data of sogou search, the topic related to "tea" has become the focus of netizens' attention. Famous teas such as Tieguanyin, Pu 'er Tea and West Lake Longjing are in the forefront of netizens' attention list. In this regard, many tea friends have also begun to pay attention to the dynamics of the tea market online, and have opened stores and started online sales. The purpose of this survey is to more effectively understand the market and potential purchasing power of Pu 'er tea, determine consumers' personal preferences, and understand the scale of online purchase of Pu 'er tea by consumers.

Third, the main categories of research:

1) The network market scale and marketing environment of Pu 'er tea (market capacity, market demand, market potential, sales situation, service satisfaction and deficiency, sales trend, etc. )

2) Pu 'er tea online consumers (consumer characteristics (age, gender, region, etc. ), purchase motivation, purchase behavior, purchase habits, etc. )

3) Competitor survey (who are the main competitors, their market share, strength, competitive strategy, advertising methods, positioning and means of Internet marketing strategy, development potential, etc.). ).

Fourth, the main survey methods:

Through the online questionnaire (the questionnaire can basically cover various factors that consumers need or may consider when buying tea), observation (Taobao shop, pat shop, etc. ), thematic discussions, search engines (comprehensive search engines such as Baidu and sogou), BBS forums (tea website forums), communities (Taobao and Alibaba communities), Baidu Know, and industry websites (food and health products websites, etc. ), so that

Verb (abbreviation for verb) Respondents:

(1) consumer

(2) the competitors of the enterprise

(3) the partners of the enterprise and the neutrals in the industry.

VI. Findings:

The online sales market of Pu 'er tea is huge and has great potential;

1) With the rise of online tea shops, the tea industry has touched "electricity" one after another: tea farmers sell their places of origin online, and the price is more than 30% cheaper than that on the market. Although the success rate of this promotion form is not high, it is still reasonable. At the same time, some professional shopping websites have been opened, and many tea merchants have also opened flagship stores online to attract customers with low prices and high quality. At present, there are tens of thousands of online shops selling tea on Taobao. With the spread of online sales trend, more and more Yunnan tea merchants began to go out of the entity business and go to the road of online sales. According to the survey, the online sales methods of Yunnan tea merchants are mainly divided into two categories. One is from physical operation to online sales, and the two business models are combined with each other.

2) Online cost advantage: Many tea merchants believe that tea retail stores have great limitations in business hours and market scope. Online sales and well-developed logistics can be sold to the market all day, which is a big advantage of online stores. In addition, online sales are more important. For operators, online sales save expenses such as facade rent, so the profits are more considerable. The low cost of logistics and the wide customer base are beyond the reach of entity management. With the powerful publicity function of the network, tea enterprises can promote their own tea products and win more consumers.

3) The overall operation level of the industry is not high: for brand tea enterprises and some professional websites, although there is a good market atmosphere and obvious comparative advantages of e-commerce, it has not yet become a climate.

Consumption characteristics: ● Women are slightly higher than men. The survey shows that the proportion of women who drink the most drinks is higher than that of men, which is not unrelated to the fact that female consumers value the healthy and fashionable characteristics of Pu 'er tea. In addition, drinking Pu 'er tea without getting fat is one of the main reasons why women choose Pu 'er tea more than men.

● Age: Young people are the main force. The survey shows that consumers aged 15-25 are the main target consumers of Pu 'er tea, followed by consumers aged 26-35, accounting for 69.5% of the total, and become the main consumers of Pu 'er tea.

The valid questionnaire data of 5600 respondents were classified, with males accounting for 5 1.94%, females accounting for 46.82% and unknown gender accounting for 1.24%. According to the age of the respondents, 14.68% is under 20 years old, 36.9% is 20-40 years old, 34.05% is 40-60 years old, and 14.37% is over 60 years old (as shown in the figure

1); According to the occupations of the respondents, 37.7 1% have institutions, 33.07% have enterprises, 9.52% have students, and 19.70% have other occupations.

● Drinking frequency: According to the survey data, most Pu 'er tea consumers in seven cities are light consumers (1 drinking less than three times a month), accounting for 55.9% of consumers, while the proportion of heavy consumers (drinking every day) is only 6.8%. This shows that the Pu 'er tea market in China still has great market development space.

● The most common occasions for drinking Pu 'er tea: From the occasions when consumers drink Pu 'er tea, "when they are usually thirsty" is the most common occasion for consumers to drink Pu 'er tea, accounting for 68.9% of the respondents, followed by when they are out/traveling, and fewer consumers usually drink it.

Network research report 2 1. The background of the survey is 2 1 century, which is an era of network. The network has entered various fields and plays an extremely important role in economy, politics, daily life or military affairs. Network has become an indispensable part of the world. Now, the new culture of network culture is spreading rapidly in China. Because it is different from all previous cultures in content and form, it will inevitably have a great impact on traditional culture. Now, network culture has become a new cultural phenomenon in university campus. So, what kind of influence does network culture have on college students? .

Second, the investigation method and process

In this survey, our research group adopts random questionnaire survey as the main method, supplemented by interviews and literature research, which mainly includes three aspects: first, the motivation and intention of college students to surf the Internet; Second, what influence and changes the network has brought to college students' life and study; Third, college students' understanding and views on the network. In order to understand this problem, the three of us conducted a random questionnaire survey on students in our college on Saturday and Sunday. * * * Issued 100 copies and received 98 copies. The recovery rate is 98%. The purpose of this questionnaire is to understand what positive and negative effects the network has brought to college students, so as to attract the attention of schools and college students themselves. Therefore, guide college students to correctly understand and use the network. Minimize the negative impact of the network on college students.

Third, the survey results and analysis

(A) positive impact

With the development of information network technology, the Internet has become a channel for college students to enjoy and obtain information resources, which has a great positive impact on college students' way of thinking and behavior.

1. Network has opened up a broad information channel for college students.

With the gradual popularization of computer networks, college students can obtain ever-changing information of the times and knowledge of humanities and science and technology from various networks, learn all kinds of knowledge and nutrition, and develop themselves. For example, in the questionnaire, the students' answer to "Do you think the internet makes your life better?" is: broaden your horizons and increase your knowledge by 52%; There are more things to do, and 27% are more fulfilled; 7% waste a lot of time. This result shows that the network has played a great role in improving the cultural quality of college students. The network has expanded our knowledge and given us room to roam. Its appearance has changed our traditional way of life and thinking, enabling us to sit at home and browse online books, receive a letter from Wan Li in a few minutes, get the information we need in the shortest time, and learn more knowledge through the distance education network. The network has opened up a new world of interpersonal communication, which is conducive to the development and expansion of interpersonal relationships. The development of Internet has brought people a brand-new "network lifestyle".

2. Internet has opened the door for college students to study.

Nowadays, there are more and more resources on the Internet, and the dissemination of information and cultural exchange are only in a flash. The openness and convenience of the network and the diversity and extensiveness of the content provide college students with a broad learning space, greatly broaden their ways of seeking knowledge, help them broaden their horizons and promote their studies; Network can provide a free, relaxed and stress-free learning environment for college students, which is helpful to cultivate and develop their innovative ability. The network is a vast space with many new and unknown things, which is helpful to develop the potential of college students. It is convenient for college students to consult materials and solve learning problems. According to the survey results, 39 out of 100 college students have been in contact with the Internet for more than 4 years, and most of them spend 1 to 3 hours using online social tools, which shows that the Internet is closely related to college students' social activities. The survey data about "social network" shows that college students prefer to regard social network as a hobby or a tool for study and work, rather than an object that they must rely on. Only a few college students show that social networks occupy most of their leisure time. On the other hand, the survey data about "social adaptability" shows that college students' social adaptability and realistic social skills are not good, but they hope to improve their social communication ability to be competent for future workplace life. In the questionnaire "Do you think there are any learning materials you need online?" The answer is: 85% is a lot; Some of them account for15%; No one thinks it's not. Also, in the questionnaire "Ways to seek help when encountering difficulties in study", 23% of the students were consulted; Internet help accounts for 73%; Independent solutions accounted for 4%. This result shows that the network has a positive impact on college students' learning.

3. The network has promoted the friendship and communication of college students, and * * * has been improved.

The most prominent advantage of the network is interactivity. It is not only the carrier of information, but also the intermediary of the media, and it is a fast channel for communication between people. In reality, the relationship between people is relatively closed, and there will always be some scruples about their actions. The network only provides a variety of virtual spaces, such as forums, chat rooms, virtual communities and emotional stations, so that college students and netizens can express their views and opinions directly, fully express themselves, make friends, introduce experiences to each other and make progress together. On the Internet, college students can not only express their feelings, exchange their thoughts and experiences, but also complain and express depression, thus achieving the dual effects of relieving study and mental stress.

4. The network guides the employment of college students and depicts their career blueprint.

Everything has advantages and disadvantages, and the network is also a double-edged sword, which has both positive and negative effects on college students. The openness, freedom and socialization of the network often make the network environment more complicated and lack of effective management and protection, which leads to various problems in the use of the network for college students, such as indulging in the network, indulging in online games and living too networked.

(B) the negative impact

1, the network may make college students' realistic emotions shrink and their communication ability deteriorate.

In real life, interpersonal relationship is quite complicated, and interpersonal communication is always cautious. Mutual suspicion between people makes college students afraid to show their true feelings in many cases. The virtual society of the network provides a broad, safe and hidden communication platform for college students, which conforms to the psychology that college students want to express their feelings but are afraid of being hurt. Therefore, college students' strong desire for communication urges them to be infatuated with the communication mode of online virtual society. As far as the perception of time and space in interpersonal communication is concerned, the infinite extension of the network can easily lead to a sense of distance from real life and even onlineness. Some people play "virtual roles" on the Internet and divide themselves into several roles, which leads to confusion of role conflicts, conflict between dual or multiple personalities and real roles, and may even lead to "split personality". There are also some people who have psychological barriers to communication such as suspicion and loneliness because of their dependence on the Internet.

It takes time to learn interpersonal communication and deal with interpersonal relationships. However, college students' infatuation with the communication mode of online virtual society makes them lose the opportunity to communicate with others to a great extent and weaken their desire to communicate with others. The reduction of interpersonal communication is easy to aggravate the self-enclosed psychology, cause the interpersonal relationship to fade, and lead to the phenomenon that college students only meet their spiritual needs and are divorced from reality. The network makes college students' emotions recognized and satisfied, and makes them have a strong sense of belonging and dependence on the network. In contrast, they are bored and indifferent to reality. Under this kind of negative resistance, some students feel nervous and uncomfortable in real communication, resulting in escape and fear of real interpersonal communication and interpersonal communication obstacles.

2. The network may make college students' thinking narrow and passive.

The real world is all-encompassing, which is obviously different from the virtual network. The limitation of college students' online life is that they are too emotional, superficial and one-sided, and there are often too few topics for realistic rational thinking. In terms of interpersonal motivation, the network distorts the communication motivation of some people. Many people enter their fields of interest as soon as they get online. This extreme style of "people are divided into groups" is narrow and is not conducive to the all-round development of personality.

College students' understanding of this society is often just to receive information and opinions from others, without adequate digestion and understanding, and without their own opinions and opinions, resulting in the phenomenon of conformity. Lack of exercise in examining problems and phenomena with a rational eye will inevitably lead to one-sided and passive thinking of college students. In the attitude of interpersonal communication, the Internet has reduced people's mutual trust. Now, we are all concerned about the honest society. However, the inherent virtuality of the network determines its inevitable illusion. Facing the computer, you can tell who you are, and even you can choose your gender. I remember a famous joke: a person fell in love with the computer and the "net" at the other end of the network, but didn't know that it was a dog surfing the internet opposite. So "I didn't even know you were a dog" became a vivid portrayal of the illusory nature of the network. It is hard to imagine how much content can be trusted when communication lacks the cornerstone of trust. I don't know if this is luck or misfortune in communication. Moreover, the illusory nature of the network will bring a series of social problems, which we have to face in the network age.

3. The intersection of emotional barriers.

In the emotional aspect of interpersonal communication, the disorder and temptation of the network easily lead to emotional obstacles in communication. The network will also cause people's anxiety about communication security and induce "emotional indifference". Due to the appearance of the Internet, we seldom have heart-to-heart communication with our parents, and we are getting farther and farther away from our families. We like to reveal anything online, whether it's talking to netizens or publishing diaries, feelings, etc. It should be shared with friends, and we are used to bringing it into this virtual world. Due to the characteristics of the media, communication through the media loses information. Although the network is very developed, there is still a difference between face-to-face communication with people. After all, the discourse information is finished, but emotional interaction is like shooting a cow across the mountain. The simplification of communication mode loses not only emotion, but also sense of justice, conscience and public morality.

4. College students are addicted to the Internet

College students have more free time. Some college students often chat or play games online in the afternoon and evening, but few really study online. With its high openness and compatibility, the Internet brings knowledge and convenience, but it is also full of decadent and even reactionary content and arguments. However, college students are in an important turning point when their outlook on life and values have not yet been finalized, and their discrimination and judgment on things are often insufficient. Moreover, college students will have a strong curiosity about new things, so that their ideology will be eroded by unhealthy information on the Internet, and then they can't control themselves, resulting in a vicious circle. In the questionnaire "How long do you surf the Internet on average every day", the answer is: 25% is below 1 hour; 1-2 hours accounted for 37.5%; 2-5 hours accounted for 29.2%; 8.3% were over 5 hours. The results show that although there are not a few people who surf the Internet for a long time, it also shows that college students are addicted to the Internet.

Four. suggestion

Understand the influence of the network on college students, while making full use of the advantages of the network, we should also face up to the imbalance of the network among college students, attract attention and solve problems. Here are some suggestions:

1, automatic control

(1) Enhance self-awareness. People with dual personality charm of rationality, self-discipline and humanistic care are needed in any era, especially in the network age. College students should have perfect self-discipline and desire to restrain personal indulgence, use the internet rationally and morally, and give full consideration to the benign interaction between people and society while demonstrating their network skills.

(2) cultivate a wide range of hobbies. College students have a wide range of interests and hobbies, so they will inevitably spend less time online. In reality, they will take part in more leisure activities and strengthen interpersonal communication.

(3) Seek real external assistance, find ways to meet needs in real life, and find real support. For example, communicate with counselors and counselors and listen to their opinions, or try to get good grades in study and meet psychological needs.

2. Correct mentality.

A person's attitude towards life determines a person's way of life, and a positive and good psychology will inevitably make people brave to face difficulties and setbacks. If college students can regard the obstacles and difficulties in real life as opportunities to test themselves and overcome themselves, and carefully analyze the reasons, the problems will always be solved. If we continue the sincere release mentality on the network into reality and get rid of the false and distorted mentality, we will not fall into unwarranted depression and embarrassment, and there is no need to pin our emotions entirely on the virtual network world and ignore the communication between people.

Ideals and beliefs are the spiritual pillar of life. College students should aim high, keep struggling, strive to create a brilliant life and make more contributions to society. There are so many college students who pursue life, and naturally there are not so many network problems.

Network Research Report 3 At present, with the continuous development of e-commerce, more and more financial companies carry out online business. E-banking and online stock trading have changed from physical form to virtual network for a time.

Online trading may attract network intruders, whether it is online trading, theft or changing financial information; This is a big risk for banks that value credit. How to ensure the security of transactions and keep secrets for customers is still the biggest difficulty to overcome in the development of online banking, and our soon-to-be-launched large payment system also has the same hidden concerns.

First, the status quo of network security

2. The results of the 20-year national information network security survey released by the Ministry of Public Security not long ago show that 58% of 7072 users of important information networks and information systems in the fields of government, financial securities, education and scientific research, telecommunications, energy and transportation, national defense and enterprises were surveyed.

Among them, 1 time accounts for 22 of the total, 2 times accounts for 13, and more than 3 times accounts for 23. Among the network security incidents, 79% are caused by computer viruses, worms and Trojan horses, 43% are caused by network attacks such as denial of service, port scanning and tampering with web pages, and 36% are caused by mass spam. 54% of the surveyed units suffered slight losses due to network security incidents, and serious and very serious losses accounted for 10 of the total number of units where security incidents occurred.

The relevant person in charge of the Public Information Network Security Supervision Bureau of the Ministry of Public Security said that the main reasons for network security incidents are that the security management system is not implemented and the awareness of security prevention is not strong. Among them, security incidents caused by reasons such as not patching and preventing software loopholes account for 66% of the total.

In addition, the Information Network Security Supervision Bureau of the Ministry of Public Security and the Computer Security Professional Committee of the China Computer Federation also investigated the computer virus infection of more than 8,400 computer users. The survey shows that the infection rate of computer virus among computer users in China is 87.9, an increase of 2. However, the number of users infected with computer virus for more than three times decreased significantly, accounting for 57. 1 of the total number of infected users, 26 fewer than last year, indicating that users' ability to prevent virus infection has improved.

The continuous development of the financial industry requires prickly institutions to enjoy those extremely sensitive financial information in an open environment. Of course, there must be absolutely safe and effective safeguards to do so.

Electronic payment is the use of the original business computer network processing system, the introduction of debit cards and sales terminals and other technologies, fundamentally changing the traditional paper money, checks and manual counting, deposit and loan diversion settlement. In this way, it not only reduces the circulation of cash and checks in the society, but also makes the banking business break through the limitations of time and space.

Secondly, the existence of technical risks is gradually or continuously discovered. That is, when a product was first launched, it was considered to have no security holes, but it may appear after a while. Many people don't know enough about it, which makes the risk exist for a long time.

At present, people usually access remote connections through passwords, which seems to be an unwritten industry standard. However, using a computer to run password attack software can crack passwords quite easily.

In order to meet the needs of users and enterprises, and always maintain a competitive advantage, enterprises have to constantly expand their network systems. However, every expansion of the network, even a new computer, a new server and a software application platform, will leave opportunities for viruses and worms and bring additional security risks to the enterprise network. At the same time, the era of pure virus is gone forever. Computer viruses that made headlines a few years ago, such as loffler, Melissa and Michelangelo, are no longer news, but are replaced by new viruses whose destructive power has increased geometrically. This new virus is called mixed virus, which combines the destructiveness of traditional e-mail virus with the new destructive ability based on network, and can quickly find and discover security vulnerabilities in the whole enterprise network, and further destroy it, such as denial of service attacks, dragging down servers, attacking weak links of computers or systems, etc.

With the continuous development of mixed threats, a single protective measure is powerless, and enterprises need to protect the network in multiple layers and in depth to be effective. A real defense-in-depth system can not only find malicious code, but also actively guard against malicious code attacks.

Second, measures to strengthen network security

Generally speaking, the security measures of online banking are mainly reflected in four aspects: first, the two sides shake hands, that is, customers must go through an encrypted secure channel to access the banking network; The second is to strengthen the security infrastructure at the network level; The third is to increase the intrusion detection system, which can alarm in time; Finally, the PKI mechanism is implemented in the application layer. Experts believe that, in theory, taking these four safety measures is foolproof.

At the same time, advanced two-factor authentication also provides a new mode that is more secure than password. This kind of network security goes beyond the traditional static password function. If a user wants to access specific data or information resources, he must input the password and dynamic code he knows. For example, a bank employee wants to access the bank's customer information database. In addition to entering the password provided by the IT administrator of the bank for each employee, he also needs to enter a different code generated every 60 seconds on the SecurID authentication device. For the authentication device, the code is unique and can be effectively displayed in the form of symbols within 60 seconds. The code generated by the authentication device, whether it is an illegal intruder or not, can hardly be deciphered in one minute, so the network security has been greatly improved.

At the same time, making a detailed and feasible disaster backup and recovery plan is also an indispensable means to ensure the network security ratio, that is, using technology, management means and related resources to ensure that designated key data, key information systems and key businesses can be restored and continue to operate within a certain period of time after the disaster. And use these measures to achieve zero data loss.

The large payment system will be popularized and operated in the whole country soon. If the network is interrupted, it will not only affect the interbank clearing business of commercial banks within its jurisdiction, but also have an immeasurable impact on the deposit and withdrawal and refinancing of the People's Bank of China. Therefore, it is suggested that during the operation of this scheme, network security should be taken as the top priority to effectively eliminate hidden dangers of accidents and ensure the safety of interbank funds.

;