Beruflich Dokumente
Kultur Dokumente
By:
January 2019
SENIOR HIGH SCHOOL – ICT
Chapter 1
Introduction
you to interact with people online. These interactions vary from each social
media site. You can interact with your friends through instant messaging,
biggest appeal of these types of sites is that they make social interactions
functions are formed, including social media. They are widely used in this
with their friends and families. Some people use it without thinking twice of
the risks that may happen if they were to be too careless when sharing
media are identity theft, card number theft, personal information leakage,
personal safety against risks to private information and property that are
by Norton-Team that with more than 1.5 billion users on Facebook, 1000
it’s fair to say that social networking has been globally embraced. As social
media becomes chocked with our daily lives and personal information, it’s
important to think about social safety for you and those you care for.
protection is reliable enough for our data or information to be safe, but any
security measures that laid out by any computer security expert, and
hacking is very common today. Social medias are very easy target, years
have passed from 10% claiming that they use at least one social media from
the internet and more than a decade later it increased to 84% according,
and 9 out of 10 also limit what they share online for anonymity and to avoid
being hacked but, somehow, they are outwitted by hackers, 2 out of 3 U.S
SENIOR HIGH SCHOOL – ICT
adults who have social media accounts said that their accounts have been
States appeared to be more concerned about the data they could glean from
social media than protecting privacy of the average citizen in the online
state attorneys are the ones who protect and regulate social medias, these
enforcement are have only tended to enforce the privacy policies that social
medias to enforce, “However, if the social media site had a vague privacy
policy that never clearly disclosed all of the information it gathered, or if the
site gathered and sold massive amounts of personal data from its users, and
the site revealed its behavior in its privacy policy, then no enforcement
action would be initiated because the site was not breaking any known
misinterpreted, data is retrieved and how what they do about it. However, in
social media using different gadgets and devices, simply because of this
cyber bullying, cyber safety and online safety are very scarce or limited.
victimization and physical fighting resulting victims who were bullied are less
bullying that cyber bullying is far more insidious, but it remains inconclusive
crime to Philippine law (Romulo, 2010). Using social media Web sites is
among the most common activity of today's children and adolescents. Any
gaming sites and virtual worlds such as Club Penguin, Second Life, and the
Sims; video sites such as YouTube, and blogs. Such sites offer today's
sites can be found anywhere and they could be used for different purposes.
technology compared to the past years. There are activities that could be
done with a few limits. The privacy policies are properly constructed for the
netizens. Social media can easily be access in just a short period of time.
The social media affects the online environment for the millennials because
modernization where technology can make things easy for us. With the help
of the internet, we are capable of knowing or searching for our special needs
in a creative and faster way. Everyone can have an easy access on social
media may it be teenagers, adults, children, and even the elderly. Internet
can be useful and harmful to people depending on the way they use it.
(www.technopedia.com).
with the research in order to lessen the amount of those who are victims of
Conceptual Framework
Demographic Questionnaire
Profile ❖ Percentage
❖ Age Statistical of Grade 12
❖ Sex Treatment ICT students
❖ Slovin’s
Awareness of who are
Formula
the Respondents ❖ Percentage aware
❖ Security ❖ Weighted regarding
❖ User’s Mean their safety
Profile ❖ Pearson on social
❖ Privacy Correlation media
Policy Coefficient platforms
Is there a
significant effect
on the
awareness of the
students
regarding their
safety on social
media
platforms?
Feedback
of:
1.1. Age
1.2. Sex
2.1. Security
Hypothesis
following hypotheses:
Northgate are taken as subject and respondents. The researchers used the
Slovin’s formula with 5% as the margin of error in order to get the total
sample of 154 respondents, with 22 students from each section. Due to the
limited time for the research to be done, the researchers are narrowing the
The researchers aim to inform the students the dangers that could occur on
the research.
accounts.
Definition of Terms
a. Operational Definition
security measures that laid out by any computer security expert, and
netizens.
spread due to the hackers without your knowledge if your security is not
on social media are identity theft, card number theft, personal information
other problems like identity theft and scamming, is unhealthy for the
or other problems like identity theft and scamming, is unhealthy for the
b. Conceptual Definition
networking.
system.
information and property associated with using the Internet, and the self-
knowledge or intelligence.
operation.
document (in privacy law) that discloses some or all of the ways a party
10. Identity Theft. Identity theft is the fraudulent acquisition and use
Chapter 2
give insights in the research of the present study. The researches have read
through several theses, web articles, and books published in the Philippines
past. Presented below are the works from the previous researchers that
Brookings Institution.
SENIOR HIGH SCHOOL – ICT
period. Many things have changed over the years. Due to modernization
many things have also been accelerated in office, agriculture, factory, and
others. However, this time many people are losing their jobs because of
machinery in every part of company. Just like in the internet. They send
letters in the early times but nowadays, people send messages over the
media sites that is in demand like Facebook, Twitter, Instagram, and other
social medias. In here you can send your message in just a second with the
access of the internet. Although using social media have advantage and
or good for the user. One of the disadvantages is that you can access the
profile of anyone else and know their information. One of the advantages of
this is you can reach your love ones easily by using video call or chatting
with them, especially those who are abroad. They can easily get in touch
with their family in one click. But being careful of sharing our personal
SENIOR HIGH SCHOOL – ICT
information online is a must because the dangers online are the same as
offline.
the rest of ‘online media’. Social media call for a new audience relationship
are potentially always connected to the Internet, and often on the move, will
receive more attention. However, the ethical debate is already here. There
private and what constitutes “informed consent” in the net (Kozinets, 2002:
65). These concerns can be added to others related with online research in
(Anderson, 2009; Weare and Lin, 2000: 289). The enormous amount of
al, 2010:8).
Consumers are driving markets, and the Internet changes the way
them for consumer intelligence, trying to deepen users’ knowledge and this
spectacular, there are still significant business model doubts. Their early life
expectations about their potential. But this market situation will not last
We have already some indications about the low level of click-through rates
for banners in social media. How are going to be the most interesting
effective? Advertising is a key source of income for social media survival but
The need for human contact and interaction is a constant that always
finds new ways to express itself. Some could argue that the present passion
for social media will give way to some skepticism. But we seem to be
(Latre, 2011).
We can’t even imagine the life without social media and internet.
Internet is nothing less than a boon for person related to any field -- be it
student, employee or anything else. We can stay updated with the latest
happenings in the world, can stay connected with the world all the time, can
get knowledge about anything we want and we can do lot other things with
the Internet. But as you know, nothing comes with ‘only’ benefits. Everything
has got its negative points as well, and so does the Internet. But all of the
negative effects that have on the social media, there is still a positive
SENIOR HIGH SCHOOL – ICT
purpose like you can easily communicate with your family or others
everywhere as it is portable and for the emergency purpose, we can use the
internet for banking work, and the teacher and student also benefit to from
being able to research any topic from library catalogues and the worldwide
web.
shape made up of individuals (or agencies) called “nodes”, that are tied
Abhyankar (2011) talked about that from the very starting; humans always
throughout generations. All people crave social life, but now not all may
have time and sources to experience social circle wherein they are able to
ideas that may drive humans to create systems for verbal exchange and
corporations etc.) like a tree with more than one branches and nodes. Those
branches are the numerous agencies, communities, forums and so on. that
DiMicco and Millen (2007) adds that social community sites were
researches of social network web site use in companies, there are a couple
(2009), and a handful extra looking at makes use of private, inner sites
Brzozowski (2009).
way for customers to engage over the net and instantaneous messaging.
Online network services are now and again considered as a social network
Social media are becoming increasingly popular among politicians and their
interests and needs of constituents and the broader public, raise funds, and
build networks of support. These activities often take place on privately run
Facebook, Twitter, and MySpace and Flickr. The content posted on these
sites may relate to policy issues and the official work of politicians or to
In this Digital Age, everyone seems to make his or her presence felt
through social networks and blog sites seems to be the norm, not just
among individuals, but also among companies and businesses. With this,
the Honor Award Program (HAP) of the Civil Service Commission (CSC) has
Program.
Chairman Ivan John E. Uy said that social networking sites can be a useful
interview aired over DZRB. There are 24 million Internet users in the
time to engage with our stakeholders. There are 1.4 million government
workers all over the country. Filipinos should hear of the inspiring stories of
our outstanding public servants. Being on Facebook is one way to reach out
to the public that we serve,” said CSC Chairman Francisco T. Duque III. The
this thrust, the provincial government led by Gov. Amado Espino Jr.
SENIOR HIGH SCHOOL – ICT
said Espino wanted to raise the level of quality of public service given to the
Service. Since there are now some 300,000 Pangasinenses who are on
Facebook, Padilla said Espino thought of coping with the times by “switching
of bringing government service closer to the people, having seen the intense
the governor, learn more about the province and the various programs and
just few clicks. Provincial employees lauded the project, expressing their full
support to the cause by putting their own group page so they can post their
regular activities and enable the public to keep track of the efforts of the
project.
The Philippines has been on the World Wide Web since the early
commanded that every office ought to have a nearness on the internet. This
was to permit the open get to data as well as a implies to communicate with
their properly chosen lawmakers. There are different levels of web nearness
the most elevated, is: Developing Web Nearness level may be fair a basic
inactive site with subtle elements of the particular organization and contact
data.
abuse.
DepEd and the Stairway Foundation have produced the CyberSafe Project
The manual discusses online privacy and the risks students face
It aims to develop students’ capacity to stay safe from online child abuse
and harm, and at the same time educate teachers and parents about online
safety.
Education Secretary Armin Luistro noted that nine out of 10 Filipino students
“It is important to educate students of the risks they face online and
“According to our survey, 50 percent of the kids are given any kind of
advice on how to properly use this very unrestricted space. And that’s scary,
to. That is why parents need to also know these things, so their children can
breached, but users also control over their security, what they share, and
Mediavillo (2017) identified different types of privacy behavior and fall into
where to post, and who can view it). it also tackled in the study of self-
contacts.
psychological research facility consider in Malate, Manila and 2 for the pilot-
testing study – one in Sta. Ana, Manila and the other in Mexico, Pampanga.
SENIOR HIGH SCHOOL – ICT
the little example of members included and in that capacity are not delegate
has not been built up that youthful youngsters have the ability to connect
matured 10-12 approach and order online security, how their online
could be bolstered. I utilize for the most part subjective information gathering
focal point, as it suits inquire about where center is around complex social
activity.
assistance.
Kids say they like learning while at the same time doing, and seek
after a positive tone and solid guidance from online security training.
Instructors feel alone in choosing how online wellbeing is educated and wish
adoring trust, and contribution. While some control is called for, I urge
specialized and dynamic intercession that serves the two guardians' and
Chapter 3
RESEARCH METHODOLOGY
the conduct of this study. It incorporated the sources of data, the research
how the researcher came to the necessary data for this study, and how
these data were analyzed, interpreted and presented in the easiest way
possible.
Research Design
as involving the current status of the subject of the study. This method is
SENIOR HIGH SCHOOL – ICT
the same book by Cristobal, he also cited Travers (1978) who considered
a situation as it exists at the time of the study and explores the causes of a
particular phenomenon.
Research Instrument
Northgate.
The tool used by the researchers consisted of two (2) parts: the
prepared fifteen (15) questions that will determine the awareness of the
avoid indolent answers from the respondent, the researchers used a Likert
not all members of the population are given a chance of being selected as
wherein the students who were at the moment present during the research
It also means that anyone who answers the questionnaire given will
value for their responses to each item. The answers in which they gain the
media platforms. The rating system used or the questions is 5 for Always, 4
social media in their everyday life. The study was conducted only for the
School Year 2018-2019. There were 243 Grade 12 ICT students in total and
using the Slovin’s formula, the sampling size is 154 respondents, with 22
students from each section. The study was conducted in Informatics College
answered in the research and have the approval of the teacher. The next
step is to choose the data gathering method in order to determine the type
proceeds to start the first chapter of the research up to the third chapter.
City, Philippines. The making of the three (3) chapters lasted for 7 months.
Statistical Treatment
shown below:
𝑁
n=
1 + 𝑁(𝑒)2
Where in:
N = Sample size
𝐹
P= x 100
𝑁
taken from the average of the population (Cristobal, 2013). The formula
𝑅𝑎𝑡𝑒𝑥𝐹𝑟𝑒𝑞𝑢𝑒𝑛𝑐𝑦
Wx =
𝑇𝑜𝑡𝑎𝑙𝑁𝑢𝑚𝑏𝑒𝑟𝑜𝑓𝑅𝑒𝑠𝑝𝑜𝑛𝑑𝑒𝑛𝑡𝑠
The data for this study were gathered from the 154 students from
The researchers employed the Likert scale which has the following