Computer virus avoidance system and mechanism
First Claim
1. A computer user behavior modification method for avoiding computer viruses in an electronic messaging system with users wherein a list of users who activate a mock computer virus is created, comprising:
- sending a user a message with a mock computer virus;
adding the user'"'"'s identifier to the list of users who activate a mock computer virus when the user activates the mock computer virus; and
using the list of users who activate a mock computer virus to identify computer users whose behavior needs to be modified to avoid activating real computer viruses.
1 Assignment
0 Petitions
Accused Products
Abstract
Nearly all computer viruses require an action by a computer user to infect and spread. The key is to educate users not to open e-mail attachments that might carry computer viruses. The key is behavior modification, as education is not sufficient. Effective behavior modification must have a means to reinforce the change and to measure how widespread the change is in a population. The invention is used to reinforce and measure the change in user behavior. The invention sends an e-mail with an attachment to e-mail users and creates a list of all users that open the attachment. The user is sent an e-mail with an attachment that looks similar to attachment that contain computer viruses. If the attachment is opened, an e-mail is sent to a specific e-mail address. This e-mail address collects all of the e-mail from users who have not changed behavior and need additional education or management attention.
-
Citations
12 Claims
-
1. A computer user behavior modification method for avoiding computer viruses in an electronic messaging system with users wherein a list of users who activate a mock computer virus is created, comprising:
-
sending a user a message with a mock computer virus;
adding the user'"'"'s identifier to the list of users who activate a mock computer virus when the user activates the mock computer virus; and
using the list of users who activate a mock computer virus to identify computer users whose behavior needs to be modified to avoid activating real computer viruses. - View Dependent Claims (2, 3, 4)
-
-
5. A method for creating a list of electronic message system users whose behavior may activate a computer virus in an electronic message system with users, comprising:
-
sending a mock computer virus in an electronic message to a user;
adding the user to the list of electronic message system users whose behavior may activate a computer virus when the user activates the mock virus; and
using the list of electronic message users whose behavior may activate a computer virus to identify users whose behavior may activate a real computer virus. - View Dependent Claims (6, 7, 8)
-
-
9. A method for creating a list of electronic message system users who activate a mock computer virus in an electronic message system with users, comprising:
-
sending an electronic message with a mock computer virus to a user;
adding the user to the list of electronic message system users who activate a mock computer virus when the user activates the mock computer virus; and
using the list of electronic message system users who activate a mock computer virus to identify users whose behavior may activate a real computer virus. - View Dependent Claims (10, 11, 12)
-
Specification