Sie sind auf Seite 1von 85

Document Code: DCAVRKMI-F-URFR

MANUEL S. ENVERGA UNIVERSITY FOUNDATION


Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 1 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

SOCIAL MEDIA AS USED IN COMMITTING CYBERCRIME

An Undergraduate Thesis

Presented to the Faculty of the College of Criminology and Law

Enforcement

Manuel S. Enverga University Foundation

Lucena City

In Partial Fulfillment of the Requirements

for the Degree of Bachelor of Science in Criminology

by

name of the author

December 2018
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 2 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Approval Sheet

This thesis hereto entitled:

SOCIAL MEDIA AS USED IN COMMITTING CYBERCRIMES

prepared and submitted by Hannah Marie Jaime, Kristine Roda R.


Capilitan, Reynaldo C. Gonzales Jr., in partial fulfillment of the
requirements for the Degree of Bachelor of Science in Criminology has been
examined and is recommended for acceptance and approval for Oral
Examination.

MONETTE G. TENORIO, PhD


Adviser

Approved by the Committee on Oral Examination with a grade of


on _____________.

DENNIS S. LAGUMEN, PhD ELLAINE C. VELUZ, MSCrim


Member Member

HENEDINA A. LAGUMEN, PhD


Chairman

Accepted in partial fulfillment of the requirements for the Degree of Bachelor


of Science in Criminology.

HENEDINA A. LAGUMEN, PhD


Dean, CCLE
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 3 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Table of Contents
PAKIPANTAY NA LANG PO NG MGA PAGE #
Title
Page
Page Title ……………………………………………………………………….. 1
Approval Sheet ………………………………………………………………….2
Table of Contents ………………………………………………………………….3
List of Figures and Table ………………………………………………………...4
Acknowledgement ………………………………………………………………...5
Abstract ……………………………………………………………………………..6
Background ……………………………………………………………………...7
a. Rationale of the research ……………………………………………..7
b. Purpose of the research ………………………………………………9
c. Theoretical Framework ………………………………………………15
d. Literature Survey ………………………………………………………17
e. Significance of the Research ………………………………………..29
f. Statement of Desired Outcomes …………………………………….29
g. Major Final Output …………………………………………………….30
h. Target Beneficiaries of Research Results …………………………30
i. Definition of Terms ……………………………………………………30
j. Scope and Limitation of the Study ……………………………………32
Description of Method or Approach …………………………………………..32
a. Research Design/Research Instrument/Data Gathering Procedures …32
b. Respondents/Units of Analysis/Subjects of the Study ……………33
c. Sampling Design and Procedures …………………………………34
d. Data analysis plan ……………………………………………………35
e. Research Paradigm/Conceptual Framework ………………………37
Results and Discussion …………………………………………………………38
Conclusions ……………………………………………………………………….47
Recommendations …………………………………………………………….48
Implication of the Study …………………………………………………………49
References ………………………………………………………………………49
Appendices ……………………………………………………………………..51
A. Curriculum Vitae of the Researcher ……………………………51
B. Research Instruments…………………………………………………54
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 4 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

C. Letter to the Respondents ……………………………………………


59
D. Informed Consent …………………………………………………60
E. Consultation Form ……………………………………………………64
F. Tally Sheet …………………………………………………………65
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 5 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

List of Figures and Tables

Title
Page

Figure 1. Conceptual paradigm of the study ................................................37

Table 1. Distribution of respondents to the demographic profile ……….38

Table 2. Distribution of responses to the awareness of the respondents on

the different types of cybercrime……………………………………40

Table 3. Ways on How Social Media is Use to Commit Cybercrimes ………43

Table 4. Ways to Avoid being Victimized of Cybercrime ………………….45


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 6 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Acknowledgments

The researchers would like to give glory to Almighty God for giving

knowledge, strength and endless blessing this year.


The researchers would also like to extend the sincerest gratitude and

appreciation to the following persons for making this study possible.


Dr. Monette G. Tenorio, their research adviser, for her guidance and

suggestions for the improvement of this work;


Dr. Henedina Lagumen, Dr. Dennis Lagumen, and Ms. Ellaine

Concepcion, for sharing the ideas during the oral defense to enhance the

study;
The librarians of Manuel S. Enverga University Foundation for the

assistance and providing the researchers the necessary references related

to this research and


Their parents, friends and classmates for the support and guidance

that sustained the researcher throughout their study.

The Researchers

Research Title: Social Media As Used In Committing Cybercrime

I. Name of Researcher : Hannah Marie Jaime


Kristine Roda R. Capilitan
Reynaldo C. Gonzales Jr.
Degree : BS-Criminology
Specialization : _____________________
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 7 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Name of Research Adviser : Monette G. Tenorio, PhD.

1. Abstract

This study aimed to determine how to prevent and control the wide

range spread of cybercrime especially on highly-used social media, and

others when it has earned the trust of many people. While on the other side,

people didn’t know that they have shared information that they are not aware

that it was beyond their privacy. This study also focused on bringing

awareness to the forms and types of cybercrimes for the people to not

become exploited and victimized. In this perspective, the researchers utilized

the descriptive survey method of research and distributed 4 sets of

questionnaires for the selected respondents in Lucena City randomly to

gather and accumulate pertinent data. By this study, the researchers have

assessed the effectiveness of the programs being conducted by the PNP in

the prevention and control of cybercrime in our country and to increase their

level of knowledge about crimes circulating in the Internet so as to limit the

number of victimization, especially in social media applications. IMPROVE

INCLUDE THE RESULTS OF THE STUDY AND THE RECCOMENDATION

YOU HAVE PROVIDED

2. Background
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 8 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

a. Rationale of the research

The use of social media can be useful yet destructive. People should

consider it as a powerful tool in terms of being able to communicate to others

and we must value it because it gives each person the ability to easily come

up to what are trends in the social media. But, some people use it as a tool

for destructive and bad intentions. Having a computer with internet and

different applications is the reason why many people are being entertained

by social media. Social media was being used in many ways that a person

enjoys using computer that will led them in different kind of situations they

are not even aware of.


The first recorded cybercrime took place in the year 1820. That is not

surprising considering the fact that the abacus, which is thought to be the

earliest form of a computer, has been around since 3500 B.C. in India,

Japan, and China. The era of modern computers, however, began with the

analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard a

textile manufacturer in France, produced the loom. This device allowed the

repetition of a series of steps in the weaving of special fabrics. This resulted

in a fear amongst Jacquard’s employees that their traditional employment

and livelihood were being threatened. They committed acts of sabotage to

discourage Jacquard from further use of the new technology. This is the first

recorded cybercrime. (www.bezapeaks/cybercrime/history)


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 9 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Cybercrimes are encountered by persons or individuals who are not

being careful in using their accounts. They are being victimized by the

cybercriminals because they are not careful in using different applications.

Cybercriminals analyzes and think on how they will commit certain crime and

who will be their victims. The common way of cybercriminals is by hacking an

account of a person and using it on everything that may ruin a person’s life.
Cybercrime through social media not only affects individuals, but also

includes industrial and corporate infrastructure with threats to intellectual

property, organizational integrity, communications, mobile platforms, insider

activity, public confidence in the organization, and corporate assassinations

in which a company or organization is attacked to take it down or defame the

group’s leadership. (Slahor, 2013)


An examination of cybercrime ought to begin with the Internet, for the

simple reason that without the latter, the former could and would not exist. It

is the Internet that provides the crucial electronically generated environment

in which cybercrime takes place. Moreover, the Internet should not be viewed

as simply a piece of technology, a kind of “blank state” that exists apart from

the people who use it. Rather, it needs to be seen as a set of social practices

- the Internet that takes the form that it does because people use it in

particular ways and for particular purposes. (Snyder, 2001)


Over the past two decades, cybercrimes has become an increasingly

widely debated topic across many walks of life. Our understandings of


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 10 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

cybercrime are simultaneously informed and obscured by political and media

discussions of the problem. It is clear that the rapid growth of the Internet has

created unprecedented new opportunities for offending. These developments

present serious challenges for law and criminal justice, as it struggles to

adapt to crimes that no longer take place in the terrestrial world but in the

virtual environment of cyberspace, which span the globe through the

Internet’s instantaneous communication, and afford offenders new

possibilities for anonymity, deception and disguise. (Yar, 2013)


The number of cybercriminals continues to grow and grow in

numbers, as the solution and protection to those people who are being

victimized they implemented the law constituting the punishment if a person

commit a cybercrime. As a shield and protection of an individual if they are

being victimized, many forensic computer technician got through everything

that may solve those kinds of cybercrime.


Since the many people in the Philippines are being victimized this

research will take up about the awareness and prevention of social media

users about cybercrimes. It concerns to those people that are social media

dependent, because they are just using social media because they only

know that they can use it as a fastest way of communicating to others but

they are not aware of those things that may led them to be the victim of

different cybercrimes.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 11 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

b. Purpose of the research

The study seek to determine the respondents’ evaluation of social

media users as the platform of cybercrimes in order for them to have

awareness and knowledge on how not to be victimized;


Specifically this study intended to seek the answers to the following

objectives:
1. Identify the demographic profile of the respondents in terms of;
1.1. Age
1.2. Sex
1.3. Civil Status
1.4. Educational Attainment
1.5. Type of Gadget Used
1.6. Time Spent on the Social Media

2. Evaluate the level of awareness of the respondents on the different types

of cybercrimes.

3. Identify how the social media is use to commit cybercrimes.

4. Identify ways to avoid being victimized of cybercrime.

c. Theoretical Framework

In Social Learning Theory, Albert Bandura emphasized that a person

is not born with the ability to behave violently. These theories assume that

people are born with no tendency to commit crimes but that they learn to be

aggressive through their life experiences. These experiences include


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 12 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

personally observing others acting aggressively to achieve some goal or

watching people being rewarded for violent act on television or in a movies.

People learn to act aggressively when, as children they model their behavior

after the violent acts of adults (Copes & Topall, 2013).


Social learning theory relates in the study of cybercrimes because

some people who use social media imitates those acts that they witness

while using it. They tend to learn bad/violent behavior through the acts of

other people that uses social media with bad intentions.


Furthermore, according to Routine Activities Theory by Lawrence

Cohen and Marcus Felson assumes that both the motivation to commit crime

and the supply of offenders are constant. Every society will always have

some people willing to break the law for revenge, greed, or some other

motive. It is the view that victimization results from the interaction of three

everyday factors: the availability of suitable targets, the absence of capable

guardians, and the presence of motivated offenders (Siegel, 2015).


This relates in the study of cybercrime because of the existence of the

three factors, which are availability of suitable targets, absence of capable

guardians, and the presence of motivated offenders in social media

applications can lead in committing crimes.


On the other hand, Cornish (2010) argue in his Rational Choice

Theory that an individual decision to commit a crime is based on cost –

benefit proportion. ‘Rationality’ means that an individual balances cost and

benefit to arrive at action that maximizes personal benefit. Cyber stalkers


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 13 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

commit a crime after weighing the prospective rewards against the potential

risk. Stalking via internet allows the offender to do it from a relatively remote

distance. The offence inflicts the same type of fear and harassment as in the

case of victims who are in direct face-to-face situation with cyber stalkers.

Rational choice theory is accepted by many people because it assumes that

people act in a manner that is rational. It assumes that many of the cyber

criminals are talented and well educated, not necessarily in formal manner

but they have an ability to think rationally. They attack the victims whom they

believe would give them the greatest amount of financial gain with least

caught. The high tech criminals are hardly caught because of the skill to

cover their tracks and move through proxy servers so that they are

undetected. They commit large fraudulent schemes and remain undetected

online.
This one theory of victimization relates in the study of cybercrimes

because criminals on cyberspace rationalized what will be the cost-benefit of

community crimes first. In other words, they first come to think of it before

they actually doing it because what they consider is to maximize personal

benefit or of that will be profitable enough.


Additionally, according to Douglas Thomas and Brian D. Loader

(2000), cybercrime can be regarded as computer-mediated activities which

are either illegal or considered illicit by certain parties and which can be

conducted through global electronic networks. Its distinctiveness is derived


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 14 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

from the versatile capabilities provided by the new ICT’s. The global

connectivity of the Internet, for example, makes it much easier for criminals

to act beyond national boundaries to conduct their illegal affairs. It also

makes it possible for existing organized crime to use more sophisticated

techniques to support and develop networks for drugs trafficking, money

laundering, illegal arms trafficking, smuggling and the like. For hackers with

the requisite computer skills, a large market exists for security and trade

secrets which can be accessed and transmitted electronically. Furthermore,

the many-to-many communication which is an essential feature of the

Internet enables the production and worldwide dissemination of information

and knowledge which could be potentially harmful, threatening or liable to

incite violence.

d. Literature Survey

According to Kaspersky (2012) “social media is the latest tool in the

arsenal of cybercrimes, with groups using social networking websites, such

as Twitter, to manipulate that masses’ into thinking a certain way (Barmick,

2012). Cellular telephones, media, have added another dimension to the

investigation of internet crime.


Social Media has taken the world by storm. More than a billion people

use applications such as Facebook, Twitter, LinkedIn and Instagram as their


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 15 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

primary means to link with friends, relatives, and increasingly, business.

Social media is popular because it facilitates the practice of social networking

and is based on the premise that people are profoundly communal and have

a need to interact using voice, gesture, and written language. Natural human

indications help make social media enticing and fun to use. Social media

supports a variety of interaction in digital environments by making it possible

to users to supply, aggregate, filter, and consume information in various

forms. Not only do people seek social outlets for daily life, they rely on social

cues in business activities such as decision making, planning, and

communication. New technology and a willingness to interact online make it

possible to move the inherent social nature of humans onto new digital

platforms (Sachs & Mchaney, 2016).


Jewkes (2015) added that by the 1960’s academic scholars were

turning their backs on positivist, behaviorist research, believing that it

attributed for much power on the media and underestimated the importance

of the social contexts of media consumption, the social structures which

mediate the relationship between the state and the individual, and the

sophistication and diversity of the audience similarly, positivist approaches to

explaining crime in terms of its individual, biological roots were giving away

to more sociologically informed approaches which originated in the work of

the Chicago School in the 1920s and 1930s. The over-riding concern of
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 16 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Chicago School sociology was to understand the role of the social

environment and social interaction on deviant and criminal behavior. In other

words, it was recognized that where people grow up and who they associate

with is closely linked to their likelihood of involvement in crime and anti-social

behavior.
Concepcion (2015) supported this that among the environmental

influences that affect teenagers’ development, perhaps the most difficult to

study is the wide, fast-evolving array of media and technologies that are part

of their lives. People nowadays are becoming increasingly aware of the

influence of it in the lives of their children. Television, radio, and the press are

sources of education, as great as or even greater than the more traditional

institutions of the community. The media constitute a very large national

industry, dependent in large part on the patronage of the young. It is

important to examine the collective efforts of this industry on the

development of young people, the values that are being taught by the media;

the images of the adult social roles that the youth sees, and above all, the

works done by the media advertising on our youth who became conspicuous

co summers at very early age.


Guardian (2014) stated that over the last two decades take-up of the

Internet has resulted in radical and far-reaching changes in both

industrialized nations and, increasingly, in the ‘developing world’. Most

people’s working, sopping, financial and leisure patterns have altered


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 17 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

dramatically as a result of linked, mobile, digital technologies and the World

Wide Web. At the vanguard of profound social, cultural, political and

economic changes, Facebook had, as of the end of 2013, 1.23 billion active

users, was worth $135 billion, and is accessed by 556 million people every

day.
According to Luyun (2013) that the modern society has become more

complex than ever with the advent of modern technology. Computers

boomed, making children spend more time on it. They spend more time

using the internet to do any of the following - researching, watching movies,

listening to music, chatting, and the like. They use the internet in various

ways sometimes they do no notice they use it in an abusive way.


Furthermore, Starcevic & Aboujaoude (2015) stated that the Internet

and related technologies permeate our everyday functioning to the extent

that it has become difficult to imagine life without them. As their penetrance

increases, so does discussion of, and research into, new problematic

behaviours and psychopathologies, especially “Internet addiction” and

“online gaming addiction”.


Additionally, while social networking sites are used by people of all

ages, they have particularly revolutionized the ways in which young people

communicate, compete, and interact. We may have seen the emergence of

the ‘kidult’, as the media have termed adults who enjoy a prolonged (or

permanent!) state of adolescence, but young people use new


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 18 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

communications technologies differently to their parents’ generation (Jewkes,

2015).
So profound the changes have been and how rapidly new forms of

social action and interaction have become normalized, taken-for-granted,

even mundane. eBay (established in 1995), Google (1998), Wikipedia

(2001), YouTube (2005), Facebook (2006) and Twitter (2007) are among the

most ubiquitous brands in contemporary life. Yet it is worth remembering that

25 years ago the Internet was unheard of among the general populace, and

was known only to a small and specialized community largely confined to

academic and scientific institutions. From this position of marginality, the

subsequent expansion of the Internet has been exponential (Jewkes & Yar,

2010).
Cybercrimes
According to A. Alvola & J. Alvola (2014) cybercrime is the use of

electronic communication for criminal and transgressive activities that

involved the internet and web-based information and communication

technologies. Cyber crime as any activity in which computers or networks are

a tool, a target or a place of criminal activity (Rajpurohit, 2016). Nowadays,

almost all the people in the Philippines are social media users. As a

dependent of it they just enjoy using their social media accounts, they also

use it as their past time and somewhat they use it as the way of their

communication to others but they are not aware of what they are doing
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 19 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

sometimes. They don’t understand or they are not aware that they can be

victimized of using their social media accounts. Many people are expert in

using social media and many of those people are the criminals that’s why

many accounts are being hacked or they are victimized in a way that they

use it as the transaction of goods and services not knowing if it is true or just

an imitation.

Meanwhile, Broadhurst, (2015) proved and stated that over the past

decade, considerable progress has been made within and between nations

to develop the capacity of police to respond to cyber ‐crime and there is now

growing awareness amongst computer users of the need for basic security

online.

In 2011, we saw the coordination of mass mayhem via “flashmobs” or

“flashrobs” through the use of cellphones and social media by individuals in

the United Kingdom and the United States (Pinkston, 2011). One parole

officer found through a mobile phone examination and checking a social

networking site that a violent offender was participation in a gang called

M.O.B. (Money Over Bitches).


Kurston & Konnie G (2015) stated that the U.S. Department of Justice

(DOJ) categorizes computer crimes in three ways. As a target, a computer is

the subject of the crime (such causing computer damage) for example, a
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 20 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

computer attacks the computers others in a malicious way (such as

spreading virus). As a weapon or a tool: a computer is used to help commit

the crime. This means that the computer is used to commit “traditional crime”

normally occurring in the physical world (such as fraud or illegal gambling).

As an accessory or incidental to the crime: a computer is used peripherally

(such as for record-keeping purpose). The DOJ suggests this would be using

a computer as a “fancy filing cabinet” to store illegal or stolen information.


In addition, for combating cybercrime, Maras (2015), stated that the

proliferation of cybercrime has created a need for new laws and enforcement

processes to attack this problem. Given that technology and crimes

committed via this technology are evolving very rapidly, effective

enforcement of cybercrime is becoming particularly challenging. To

effectively combat cybercrime, one must innovate faster than cybercriminals

and must be smarter in thinking ahead and making counter-moves -

especially those that take offenders tie, and expense to combat.


Cybercriminals
Cybercriminals constantly seek new opportunities to exploit new

victims. As such, authorities need to develop the capacity to anticipate the

features of computer, information, and communication technology that might

open up new opportunities to cybercriminals to engage in illicit activities.

Some websites put you at higher risk for getting your computer

infected with a virus or spyware than others. Pornography and gaming sites
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 21 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

are notorious for this. So the best advice is to avoid them like the plague.

Some major internet companies, including Google, are taking steps to warm

computer users if they are about to visit a webpage that could harm their

computer (Milhorn, 2014).

Milhorn, (2014) stated that people should be wary of downloading free

programs or files over the Internet. Things are seldom completely free. These

files or programs may contain spyware, viruses, or other malicious software.

Also be wary of floppy, CD, or DVD discs received in the mail if you don’t

know the sender personally. Buying products online from reputable retailers

all but eliminated the threat of an attack in this manner.

Dileone (2014) stated that, we must be mindful that the vast freedom

provided by this new digital world imposes new responsibilities on us. We

need to keep our new digital domains secure, and protect ourselves and our

fellow citizens from criminality. After all, as human beings, we each employ

technology for our own chosen ends, so age-old human behaviours (both the

good and bad) are often transposed onto the digital networks. However,

many people are unaware of the reality of the darker side of the internet. But

for cybercrime our reaction of different because it does not come to our

attention until we are affected by the consequences, for instance our bank

account being hacked into, or our children being targeted by cyber-bullies. In


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 22 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

this sense it is unfortunate that the evolution of digital technologies has been

so rapid, because the regulations and our ideas about what constitutes anti-

social behaviour have simply been unable to keep pace. Some parts of the

internet are still subject to very little regulation, and in this regard there is still

much to be done. We need to develop new strategies for policing the cyber-

world, with respect to data retention and protection, users’ privacy, and crime

prevention and detection.

In this digital age, what information literacy therefore means that

understanding a technology is not enough. What everyone must also do is to

learn how to utilize those incredibly diverse and powerful technologies

efficiently and effectively search for, retrieve, organize, analyse, evaluate

information and then use it for specific decision making and problem solving

situation (de Vera, 2010).

Cybercrimes in the Philippines


As time goes by, many people are being victimized and because of it

the government implement laws enacted in order to prevent the widespread

of cybercrimes in the Philippines. The Republic Act No. 10175 or the

Cybercrime Prevention Act of 2012 was the first law specifically penalizing

computer crimes such as cybersquatting, cybersex, child pornography,

identity theft, illegal access to data, illegal interception, data and system
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 23 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

interference, computer-related forgery, computer-related fraud, and libel

which are punishable under this law. This law will greatly help social media

users for their protection and their own privacy.


As the Philippines discover the wonders and benefits that cyberspace

has to offer, it becomes increasingly dependent on it. However, with the

rising dependence on the internet comes the danger of exposure to rapidly

evolving threats and risks. It is therefore pertinent that the Philippine

Government develop a logical, intelligible and strategic response to the

security challenges that may arise from these ever progressing dangers.
Knowing the dangers of cybercrimes and the security threats pose in

our cyberspace, the Philippine National Police (PNP) through the leadership

of Police Director General Allan La Madrid Purisima Chief, PNP, pushed for

the activation of the PNP Anti-Cybercrime Group (ACG) on March 20, 2013

as strategic response to all cyber security challenges. The PNP-ACG has

conceptualized and believed that to fight cybercrime and to strengthen cyber

security, there must be a synergy among the following components:

Competence and Capability building of the Organization and Personnel;

Public and Private Partnership; strong International Cooperation; Advocacy

and Public Awareness and; the implementation of strong Laws, Policies and

Regulations. (www.pnpacg.ph)
The PNP-ACG implemented programs that will fight cybercrimes such

as cybercrime investigation, arrest of cybercriminals, seizure of electronic


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 24 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

evidence, computer forensic examination, cellphone forensic examination,

video forensic examination. They also conduct vulnerable assessment,

penetration testing, cyber security bulletins, and cyber security lectures.


Pinaroc (2015) stated that there was a cyber-disaster as the “LOVE

bug stuck the world in the early part of the year 2000. It is estimated that the

so-called “Love-Bug” email virus has caused some $10 billion losses in as

many as 20 countries. Surprisingly, it was a Filipino student who was the

main suspect as the author of the “I love you” virus. Six weeks after the

attack of the “I LOVE YOU” virus, the government outlawed some computer

crimes through the E-Commerce Law. The Electronic Commerce Act of 2000

or Republic Act 8792 was signed into law on June 14, 2000. It was a

landmark legislation as it was the country’s response to the changes brought

about by the information age. It focuses more on electronic evidence and

common online crimes such as hacking and copyright violations.


According to Angara (2015), the E-Commerce Act aims to facilitate

domestic and international dealings, transactions, arrangements,

agreements, contacts and exchanges including storage of information

through the utilization of electronic, optical and similar medium, mode,

instrumentality and technology. Likewise, the act gives recognition to the

authenticity and reliability of electronic documents related to such activities

and this includes the promotion and use of electronic transactions in the

government and general public (Sec 3).


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 25 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

If there is one reason why corporations and businessmen would not

enter into an e-commerce business, it must be in the issue of security. The

general security concerns in e-commerce are the user authorization and data

and transaction security. The available authorization schemes which make

sure that only authorized users and programs gain access to information

resources such as user accounts, files, and databases, are password

protection, encrypted smart cards, biometrics and firewalls (Laviña, 2015).


Laws on Combatting Cybercrimes
The Cybercrime Law is advantageous to some Filipinos particularly to

the victims of such crimes mentioned above. One popular instance is the

case of Senator Tito Sotto who was recently cyber-bullied for plagiarizing in

his speeches on the Senate. In fact, he is the one who inserted libel as a

“content-related” offense in this law. With the newly approved law, violators of

libel committed through a computer system, if proven in court, will be

punished with one degree higher than what the Revised Penal Code as

amended, thus, protecting people who are cyber-bullied and lost on how to

fight for their rights online. Likewise, this law ensures every user’s protection

from hackers, identity thieves, cyber-squatters, and from people who practice

cybersex and child pornography, as stated by Senator Edgardo Angara, the

principal author of the bill and the Chair of the Senate Committee on Science

and Technology (www.scribd.com)


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 26 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

According by Rachel (2012) that the government should not only

focus their attention towards implementing the law because there are a lot of

issues and problems in the society that is more severe like murders and wars

happening within the borders of the country. There are malignant issues that

should be solved than cybercrime offenses because the life of people is

more important than any money or reputation loss.


Cybercrime or RA 10175 is an act that prevents, investigate and

suppress the crimes on the internet world. It also imposes penalties of any

offense made. The contents of the law include the collaborative IRR of the

law with its provisions, punishable acts, penalties, enforcement, jurisdiction,

and for other purposes (www.zdnet.com).


Republic Act 10175 contents includes the punishable acts that was

protested by citizens of the Philippines such as cybercrime offense like illegal

access, illegal interception, data and system interference, misuse of devices,

cyber squatting, computer forgery, fraud and identity theft, most especially

cybersex and child pornography and unsolicited commercial

communications, abetting in the commission of cybercrime

(www.wordpress.com).
People who are favour of the bill includes the online account owners,

such as facebook, twitter, email, online bank account owners who will be

more worry free from their passwords being hacked. Another is bloggers;

web publishers, software developers and any original computer data owners
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 27 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

will also have a strong ownership with their contents. And most especially are

parents who will not be troubled that their children will now be safe against

child pornography and cybersex (www.wordpress.com).


Cybercrime Prevention Act of 2012 has benefits especially among

Filipino citizens because it helps in maintaining peace for all internet users,

lessen the cases of hacked online accounts, gives acknowledgment of the

owner of an software or accounts made. But most especially is to stop

cybersex and child pornography (www.blogspot.com).

e. Significance of the Research

The study aimed to secure the society in using social media

applications or social networking sites and give awareness on the different

types of cybercrimes.
For the social media users, this served as the basis for the awareness

and how to prevent such cybercrimes. This study will also help the users not

to be victimized, exploited, and compromised. This research also aims to

inform the netizens on right usage of their social media accounts.


For the future researchers, this study will serve as a reference for their

study that will help support their research studies about cybercrimes and also

to serve as the basis of their study.

f. Statement of Desired Outcomes


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 28 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

The study has the following expected desired outcome:


In short term outcome, this will serve as a guide to all people who

uses social media or social networking sites for them to have enough

knowledge and to avoid being victimized. This will also help future

criminology students who will choose to study cybercrimes to be their basis

of their research.
For long term outcome, this will help in order to develop a program for

the benefit of people who uses different social media websites that can help

them to be kept away from any risk factors and threats in the social media,

as to increase their knowledge of how not to be victimized and exploited.

g. Major Final Output

The major final output of the research is to increase the awareness among

users using social media applications or social media networking sites to prevent

victimization. HOW….BE MORE SPECIFIC..THE OUTPUT SHOULD BE

OBSERVABLE

h. Target Beneficiaries of Research Results

Target Beneficiaries Total


1. High School Students Approx. 2,000
2. College Students Approx. 4,000
3.Professionals Approx. 3,000

3. Social Media Users Approx. 6,000


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 29 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

i. Definition of Terms

Anonymity is the ability to engage in social action and communication

without having one’s identity made available to others.


Child Pornography is a form of child exploitation. It is any visual

depiction of sexually explicit conduct involving a minor (persons less than 18

years old).
Computer-related Forgery is the input, alteration, or deletion, of any

computer data without right resulting in inauthentic data with the intent that it

be considered or acted upon for legal purposes as if it were authentic,

regardless whether or not the data is directly readable or intelligible.


Computer-related Fraud is the unauthorized input, alteration, or

deletion of computer data or program or interference in the functioning of a

computer system, causing damage thereby with fraudulent intent.


Cybercrime is also referred to as “computer crime”, is any illegal

behavior directed by means of electronic operations that targets the security

of computer system and the data processed by them.


Cybersex is the act of role-playing sexual acts or exchanging explicit

sexual messages with people through chat rooms via the internet.
Cybersquatting is the acquisition of a domain name over the internet

in bad faith to profit, mislead, destroy reputation, and deprive others from

registering the same.


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 30 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Data Interference is the intentional or reckless alteration, damaging,

deletion, or deterioration of computer data, electronic document, or electronic

data message, without right, including the introduction or transmission of

viruses.
Identity Theft is the intentional acquisition, use, misuse, transfer,

possession, alteration or deletion, of identifying information belonging to

another whether natural or juridical, without right.


Illegal Access is the access to the whole or any part of a computer

system without right.


Illegal Interception is the interception made by technical means

without right of any non-public transmission of computer data to, from, or

within a computer system including electromagnetic emissions from a

computer system carrying such computer data.


Libel is a method of defamation expressed by print, writing, pictures,

signs, effigies, or any communication embodied in physical form that is

injurious to a person’s reputation, exposes a person to public hatred,

contempt or ridicule, or injures a person in his/her business or profession.


Sabotage is to hinder functioning of a computer system or network.
System Interference is the intentional alteration or reckless hindering

or interference with the functioning of a computer or a computer network by

inputting, transmitting, damaging, deleting, deteriorating, altering, or

suppressing computer data or program, electronic document, or electronic

data message, without right or authority, including the introduction or

transmission of viruses.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 31 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

j. Scope and Limitation of the Study

The researchers focused on determining the level of awareness in

cybercrimes on social media. It delimits the study to one hundred (100)

selected respondents who uses social media applications. Also, to assess

their level of knowledge on different types of cybercrimes and what they can

do in order to avoid being victimized and exploited by cybercriminals

circulating around the Internet. The selected respondents will be from

Lucena City only involving 50 professionals and 50 students of Manuel S.

Enverga University Foundation in order to obtain data.

3. Description of Method or Approach

a. Research Design/Research Instrument/Data Gathering


Procedures

This study used quantitative research method to determine the

significant influences of social media in their lives and the level of security

and awareness they have when they are using social networking sites or

applications. This study recognized the specific outcome of social networking

sites or application they use and the problems that they have encountered

using social media. It has also focused on the security of their different

accounts and it can really be helpful in their everyday life.


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 32 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

This study utilized the descriptive survey method to recognize the

specific outcome of social networking sites or application they use and the

problems that they encounter using social media. It has also focused on the

security of their different accounts.


The instrument contained questions that focused on the platform or

programs that will guide the social media users.


The data to be presented camed from the people who are users of

different social networking sites or applications in Lucena City.

b. Respondents/Units of Analysis/Subjects of the Study

The researchers have used two groups or sets of respondents that

evaluate the level of security and awareness in cybercrimes. The first group

of respondents have included 50 students from Manuel S. Enverga

University Foundation.
The second group of respondents have included 50 professionals that

are working in different establishment in Lucena City that also uses different

social media applications. The researchers selected our respondents

because they are the one who can utilize and give reliable data regarding

cybercrimes they witness in the cyberspace, especially in social networking

sites.
Respondents were asked to sign the informed consent form to signify

their willingness to be part of study. They were properly oriented about the
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 33 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

objectives of the study and were informed that they can also be given a copy

of the research results if they want them.


The researchers have ensured the privacy and confidentiality of the

respondents by giving the respondents an option to not provide their names

and other personal information which are not relevant to the study.
Those who refused to answer or decided to terminate the survey was

replaced with another respondent who is available and willing to participate

in the study.

c. Sampling Design and Procedures

The researchers used the random sampling procedure in gathering

information. That is vital in this study, the researchers provided each of the

respondents a prepared questionnaire through coordination with the person

in the locality of Lucena City who are fifty (50) professionals and fifty (50)

students of Manuel S. Enverga University Foundation.


The respondents who answered and contributed their thoughts and

ideas in connection to the study. The researchers used randomized sampling

technique because the instrument gave equal chances for the respondents

to answer the questions and problems being asked.


The researchers ensured the privacy and confidentiality of the

respondents by giving the respondents an option to not provide their names

and other personal information which are not relevant to the study.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 34 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Those who refused to answer or will decide to terminate the survey

was replaced with another respondent who is available and willing to

participate in the study.

d. Data analysis plan

After the data is gathered, the responses of the questionnaires were

analyzed and interpreted in graphs and tables aided with the use of statistical

treatment.
The study utilized simple percentage for sub-problem number one to

compare proportions of the frequency of responses to the total number of

responses in the demographic profile of the respondents.

where:

P = percentage

F = frequency

N = total number of respondents

The study used weighted mean for sub problem number two which is

to know the level of knowledge of the respondents coming from 50 students

from Manuel S. Enverga University Foundation, Lucena City, and 50

professionals from different working establishments and sub problem three


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 35 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

which will identify how using social media is use to commit cybercrimes that

are being encountered by the respondents. Weighted mean formula will also

be used in sub-problem four which will determine that in what the users can

do to avoid being victimized, compromised, and exploited. The formula for

weighted mean is:

x = weighted mean

∑ = summation

F = frequency

X = weight of each option

N = total number of respondent


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 36 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

e. Research Paradigm/Conceptual Framework

Evaluate the level Increase awareness


of knowledge of the and responsible use
Social Media as of social media to
Used in Committing respondents on the
different types of prevent victimization
Cybercrimes through
cybercrimes
lectures/seminar
through survey
Figure 1. Paradigm

The paradigm illustrates that social media was being used in committing

cybercrimes. To prevent and control the existence of these crimes, first you

have to evaluate the level of knowledge of the respondents on different types

of cybercrimes through survey and questioning as to increase awareness to

the responsible and right usage of different social media networks or

applications, also to prevent victimization by the use of conducting lectures

or seminars. ELABORATE THE EXPLANATION MORE…

4. Results and Discussion


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 37 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Age Frequency
15-19 40%
20-24 27%
25-29 7%
30-34 8%
35-39 3%
40-44 4%
45-49 3%
50-54 8%
Sex Frequency
Male 49%
Female 41%
Civil Status Frequency
Single 76%
Married 24%
Widowed/er 0%
Separate 0%
Educational Attainment Frequency
Elementary Graduate 0%
Undergraduate 50%
College Graduate 50%
Gadget Used Frequency
Computers 20%
Mobile Phones 68%
Tablets 6%
Laptops 6%
Time Spent Frequency
1-2 hours 24%
3-4 hours 20%
5-6 hours 28%
7-8 hours 16%
9-10 hours 8%
11-12 hours 4%

Table 1. Demographic Profile of the Respondents

The table shows that most of the respondents fell in the age bracket of

15-19 years old which was 40% of the pie. It also shows that 27% of the

respondents belonged to the age bracket of 20-24 years old. 30-34 years old

and 50-54 years old has the same percentage of 8% the graph. While, 7% of
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 38 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

the pie was 25-29 years old, 40-44 years old it has 4%, 35-39 years old and

45-49 years old has only 3% of the respondents’ answer.

The majority of the respondents were male which is 55% of the total

number of respondents as compared to female which represented by 41% of

the total population. The blue legend on the graph shows the respondents

that are male. While on the other hand, the orange legend shows the

respondents that are female. This indicates that majority of the respondents

involved in answering the survey questionnaire were male.

Most of the respondents who answer are single with 76% and the rest

are married with 24%. The value of 24% on the table shows the respondents

that are married. While on the other hand, the value of 76% shows the

respondents that are single. This implies that majority of the respondents

were single.

The table shows 50-50 percent on both of the undergraduate and

college graduate. It implies that 50% of the respondents graduated college,

while 50% were college undergraduates.

The table above shows the result on what are the type of gadget use

of the respondents. 68% of the respondents are using their Mobile Phones.

Second to the highest percentage is 18% which is the Computer. 10% of

them are using Laptops and 4% are using Tablets. This proves that Mobile

Phones are the most gadget used by the respondents.


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 39 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

It can be concluded that people can't get enough of their phones or

any gadget nowadays that's why they are more prone to cybercrimes based

on the survey conducted.

The table shows the survey result of the time spent on the internet of

the respondents. 5-6hrs have the highest percentage which results to 28%.

Thus, 24% of the respondents spent their time on the internet for 1-2hrs and

20% of them for 3-4hrs. On the other hand, 16% of the respondents are

killing their time on the internet for 7-8hrs, 8% of them spent for 9-10hrs and

4% of them spent their time on surfing the net for 11-12hrs. This just proves

that internet is getting most of our time instead of having our time on doing

something that is worth of our time.

Spending 5-6hrs on the internet can disturb a person's way of living.

And since people spent most of their time on the internet, they are more

expose on the virtual world which can lead to a huge possibility that they will

be expose in any cybercrime.

Table 2.

Responses on the awareness of the respondents on the different types of


cybercrime
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 40 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Respondents
Statement
WM VI Rank
1. Cyber-squatting. The practice of inhabiting someone else’s
property without their permission. Domain names are cheap and 4.14 MA 7
are sold on a “first come, first served” basis.
2. Cyberbullying. Use of cell phones, instant messaging, e-mail, chat
rooms or social networking sites such as Facebook and Twitter to 4.54 EA 1
harass, threaten or intimidate someone.
3. Cybersex. Involves using the internet for sexual purposes,
especially by exchanging sexual messages with another person. 4.4 MA 11
4. Child Pornography. Involves images of children and involved in
sex acts. If a man possess videos in which the camera was 4.4 SWA 12
focused on the clothed genital region of young girls.
5. Identity Theft/Stealing One’s Identity. A crime in which an
impostor obtains key pieces of personally identifiable information 4.34 MA 4
in order to impersonate someone else.
6. Illegal Access to Data. Involves the unauthorized or illegal
viewing, access or retrieval of data by an individual, application or 4.18 EA 2
service.
7. System Interference. Disruption of the functioning of a computer
3.95 MA 8
or a computer network without right or authority to do so.
8. Data Interference. Intentional damaging of computer data,
4.03 MA 6
electronic document, or electronic data message, without right.
9. Computer-related Forgery. Forging or counterfeiting the
authenticity of electronic documents, such as birth certificates and 3.89 MA 10
the same to commit any crime.
10. Computer-related Fraud. Any dishonest misinterpretation of fact
intended to let another to do or refrain from doing something
which causes loss. Examples are variety of internet scams, many 4.15 MA 5
based on phishing and social media engineering, target consumers
and businesses.
11. Libel. Saying or writing something about the person that hurts
4.34 EA 3
their reputation.
12. Illegal Interception. The unauthorized interception of a
conversation, communication or digital transmission in real time.
The various forms of communication include phone calls, 3.92 MA 9
emails, instant messages or any other internet services.
General Weighted Mean 4.02 – Moderately Aware
Legend:
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 41 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

4.21-5.00 – Strongly Agree 1.81-2.60 – Disagree


3.41-4.20 – Agree 1.00-1.80 – Strongly Disagree
2.61-3.40 –Moderately Agree

The table above represents the level of awareness of the respondents

regarding the different types of cybercrimes circulating around the internet

day-by-day. It also shows that cyber-bullying or the use of cell phones,

instant messaging, e-mail, chat rooms or social networking sites, illegal

access to data or the act that involves the unauthorized or illegal viewing,

access or retrieval of data by an individual, application or service, and libel or

the act of saying or writing something about the person that hurts their

reputation, with a weighted mean of 4.51, 4.50, and 4.34 respectively.

Meanwhile, Broadhurst, (2015) proved and stated that over the past

decade, considerable progress has been made within and between nations

to develop the capacity of police to respond to cyber ‐crime and there is now

growing awareness amongst computer users of the need for basic security

online.

The study shows that according to the respondents’ level of

awareness on the different types of cybercrimes, obtained a general

weighted mean of 4.02, these results states that the social media users who

responded to the survey are moderately aware of the crimes happening

inside the cyberspace

MAKE ALL YOUR TABLE LIKE TABLE 2…EDIT


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 42 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Table 3

Ways on How Social Media Is Used to Commit Cybercrimes

Respondents
Students Professionals Overall
Statement
Ran Ran
WM VI WM VI WM VI Rank
k k
1. Human errors/accidental
posts or tweets/unknowing 3.78 A 2.5 4.28 SA 7 4.03 A 4
clicks on phishing links.
2. Not paying
attention/leaving your 3.64 A 7 4.22 SA 8 3.93 A 8
account unmonitored.
3. Viruses that send spam
3.7 A 5.5 3.84 A 9 3.77 A 9
messages to others.
4. Links that has viruses that
3.92 A 1 4.44 SA 1 4.18 A 1
can affect your computer.
5.Malicious applications or
softwares and attacks
3.78 A 2.5 4.42 SA 2.5 4.10 A 2
targeting individuals and
computers.
6. Phishing scams that tricks
people into handling over
personal information (such 3.48 A 9 4.4 SA 4 3.94 A 7
as banking details and
passwords).
7. Not implementing privacy
or security settings on 3.7 A 5.5 4.3 SA 6 4.00 A 5.5
accounts.
8. Cyberbullies 3.72 A 4 4.36 SA 5 4.04 A 3
9. Providing information
about their credit or debit
card to use those cards to 1.79 SDA 8 4.42 SA 2.5 4.00 A 5.5
purchase different products,
items, or services.
General Weighted Mean 4.00- Agree

Legend:
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 43 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

4.21-5.00 – Strongly Agree 1.81-2.60 – Disagree


3.41-4.20 – Agree 1.00-1.80 – Strongly Disagree
2.61-3.40 –Moderately Agree

The table above shows that the respondents agreed that the ways on

how social media is being used to commit cybercrimes came from human

errors, accidental posts or tweets, unknowing clicks on phishing links with a

weighted mean of 4.03, not paying attention/leaving your account unmonitored

with a weighted mean of 3.93, links that has viruses that can affect your

computer with a weighted mean of 4.18, cyberbullies with a weighted mean of

4.04, and providing information about their credit or debit card to use those

cards to purchase different products, items, or services with a weighted mean

of 4.00.

In this digital age, what information literacy therefore means that

understanding a technology is not enough. What everyone must also do is to

learn how to utilize those incredibly diverse and powerful technologies

efficiently and effectively search for, retrieve, organize, analyse, evaluate

information and then use it for specific decision making and problem solving

situation (de Vera, 2013).

This study shows that the respondents agreed to all of the statements

that those are the ways on how social media is used to commit cybercrimes

by cybercriminals with a weighted mean of 4.00 which means that based on


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 44 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

their perception, the statements above were used by the cybercriminals in

order to victimized social media users.

IMPROVE

Table 4

Ways to Avoid Being Victimized of Cybercrimes

Respondents
Statement Students Professionals Overall
WM VI Rank WM VI Rank WM VI Rank
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 45 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

1. Avoid using public networks.


Refrain from connecting to free
4.1 A 9 4.34 SA 8 4.22 SA 9
Wi-Fi networks from coffee
shops or other public places.
2. Avoid using public
computers for sensitive
business. If you’re about to do
some personal transactions like 4.28 SA 7 4.4 SA 4.5 4.34 SA 7
banking or online shopping, do
not do it using public
computers.
3. Use strong passwords. A
strong password is one that
cannot be easily guessed, or 4.5 SA 2 4.58 SA 2 4.54 SA 2
broken by a brute force attack
in a reasonable amount of time.
4. Do not give out your
passwords. Keep the passwords
4.6 SA 1 4.66 SA 1 4.63 SA 1
of your various accounts to
yourself.
5. Avoid downloading
unknown applications. The
Internet is full of free software
from unknown sources. These
kinds of programs normally 4.2 A 8 4.26 SA 9 4.23 SA 8
carry malicious applications
with it and installing it may
infect and cause serious
damage to your computer.
6. Avoid downloading illegal
contents. Purchase media
contents straight from 4.48 SA 3 4.4 SA 4.5 4.44 SA 4
legitimate sources only, like
iTunes or Amazon.
7. Report any site that shares
pirated contents. If you come
across websites that shares
illegal contents, contact your
4.32 SA 6 4.4 SA 4.5 4.36 SA 5.5
ISP or local government units
responsible for handling such
kinds of issues and report these
kinds of illegal activities.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 46 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

8. Back up your files, regularly.


It won’t prevent you becoming
a victim but it will limit the 4.36 SA 5 4.36 SA 7 4.36 SA 5.5
damage such a cyberattack
could inflict on you.
9. Use common sense. If you
don’t know the sender of an
email promising you vast sums
of money, if you’re suddenly
4.42 SA 4 4.52 SA 3 4.47 SA 3
getting told by email that an
account has been jeopardized,
or it seems too good to be true,
it’s probably a virus.

General Weighted Mean 4.40 - Strongly Agree


Legend:
4.21-5.00 – Strongly Agree 1.81-2.60 – Disagree
3.41-4.20 – Agree 1.00-1.80 – Strongly Disagree
2.61-3.40 – Moderately Agree

The table above reveals that the respondents that the social media

users should use strong passwords with a weighted mean of 4.54, do not

give out passwords or keep the passwords of your various accounts to

yourself with a weighted mean of 4.63, avoid downloading unknown

applications with a weighted mean of 4.23. Also, results have shown that the

respondents strongly agreed that social media users should avoid

downloading illegal contents with a weighted mean of 4.44.

Some websites put you at higher risk for getting your computer

infected with a virus or spyware than others. Pornography and gaming sites

are notorious for this. So the best advice is to avoid them like the plague.

Some major internet companies, including Google, are taking steps to warm
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 47 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

computer users if they are about to visit a webpage that could harm their

computer (Milhorn, 2014).

Milhorn, (2014) stated that people should be wary of downloading free

programs or files over the Internet. Things are seldom completely free. These

files or programs may contain spyware, viruses, or other malicious software.

Also be wary of floppy, CD, or DVD discs received in the mail if you don’t

know the sender personally. Buying products online from reputable retailers

all but eliminated the threat of an attack in this manner. IMPROVE THE

INTERPRETATION

5. Conclusions

In view of the findings, the following conclusions were drawn:

1. Most of the respondents fell in the age bracket of 15-19 and are male

who got the highest percentage which was 40% and 59% of the entire

survey respectively. Most of the respondents are using their mobiles

phones spending their time on the internet 5-6 hours and above,

increasing their potential risk of being victimized by cybercriminals and

exposed of different cybercrimes in the internet. EDIT THIS REMOVE

ALL THE PERCENTAGE..YOU SHOULD BE DIRECTLY

ANSWERING THE OBJECTIVES #1


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 48 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

2. Cyberbullying got the highest weighted mean which means that the

respondents are fully and extremely aware of it and that the

respondents are increasingly being aware of all the different types of

cybercrimes circulating around the cyberspace or the internet.

3. Links that has viruses that can affect your computer are most common

way used in order to commit cybercrimes which has inclined the result

among the other statements.

4. The social media users shall use strong passwords, should not give

out their passwords, avoid downloading illegal contents and

applications, avoid using public networks and computers, use

common sense, back up files regularly, avoid downloading illegal

contents, and report those site in order not to become a victim of

cybercrimes.

6. Recommendations

Based on the conclusions, the following recommendations are made:

1. Users should limit their time in using the Internet considering that it

could increase the potential risk of cybercrimes and become harmful

and dangerous while scrolling out because of bad intentions of people

you don’t personally know, but instead, spend most of it in recreational

activities with family and friends.


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 49 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

2. Social media users should increase their awareness and their level of

security on their accounts and keep it monitored from time-to-time in

order to be secured and to avoid high risks of being victimized.

3. Do not go to untrusted sites, especially those that offers free contents

and applications which are illegally obtained. Do not give out your

passwords to people you don’t trust or you don’t personally know.

4. Do not be afraid to report persons who commit cybercrimes to let the

law enforcement agencies to handle those persons and also to lower

the number of victimization. Report or block those sites in order not to

become a victim.

7. Implication of the Study

This study has a significant role in determining the committed

cybercrimes in using social media. It will provide the community to become

aware on the cybercrimes being committed with the used of social media.
Also, this will help social media users to be more safe when accessing

their social media accounts. They will be more educated that it is important

to keep their accounts on private mode to prevent them from being victim of

cybercrimes.

8. References
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 50 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Aas, K. F. (2013). Globalization and crime (2nd Edition). Los Angeles: SAGE.

Broadhurst, R. (2015) “Development in the global law enforcement of cyber-


crime”, Policing: An International Journal of Police Strategies &
Management, Vol. 29Issue: 3. Pp. 408-433

Bryant, R., & Bryant, S. (2015). Policing digital crime. England: Ashgate
Publishing Limited.

Cullen, F., & Wilcox, P. (2010). Encyclopedia of criminological theory. SAGE

Publications, New York

Lenca, M., & Haselager, P. (2016). Ethics and information technology.

Jewkes, Y. (2015). Media and crime (3rd Edition). Los Angeles: SAGE.

Laviña, C. G. (2016). Social, ethical, legal, and professional issues in


computing

Lehto, M., & Limnéll, J. (2016). Cyber security capability and the case of
finland. Paper presented at the 182-190.

Mañez, J. (n.d). Philippines Cybercrime Law Paper. retrieved from


http://www.scribd.com/doc/116772461/Philippines-Cybercrime-Law-
Paper

Maras, M. H. (2015). Computer forensics: Cybercriminals, laws, and


evidence (2nd Edition). Burlington: Jones and Bartlett Learning,
LCC.

Melgosa, A., & Scott, R. (2013). School internet safety more than 'block it to
stop it'. The Education Digest, 79(3), 46-49

Milhorn, T. H. (2014) How to Avoid Becoming a Victim. Boca Raton, Florida,

USA.

Rajpurohit, G. S. (2016). Crime and criminal justice in asia. New Delhi India:
Random Publications
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 51 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Sachs, D., & McHaney, R. (2016). Web 2.0 and social media business in a
connected world.

Siegel, L. (2015). Criminology: The Core (5th Edition). Stanford, CT USA:


Cengage Learning.

Shipley, T. G., & Bowker, A. (2014). Investigating Internet Crimes (An

Introduction to Solving Crimes in Cyberspace). Amsterdam: Elsevier,c.

Yar, M. (2013). Cybercrime and Society. (2nd Edition). London: SAGE

Appendices “A”

A. Curriculum Vitae of the Researcher


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 52 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

HANNAH MARIE JAIME


#154 Allarey St., Barangay 8 Pob., Lucena City
Mobile #: 09175572543
Personal Data
Age : 19 years old
Date of Birth : May 6, 1999
Place of Birth : Lucena City, Quezon
Gender : Female
Civil Status : Single
Citizenship : Filipino
Dialect Spoken : Filipino, English
Height : 5'1”
Weight : 49 kg
Religion : Iglesia Ni Cristo
Father's Name : N/A
Mother's Name : Marissa B. Jaime

Educational Background
Tertiary Bachelor of Science in Criminology
Manuel S. Enverga University Foundation, Lucena City
Secondary Manuel S. Enverga University Foundation, Lucena City
Elementary Lucena East II Elementary School

Seminars Attended
Data Analysis and Interpretation Seminar
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 53 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

KRISTINE RODA R. CAPILITAN

Brgy. San Isidro Ilaya, General Luna, Quezon


Mobile #: 09952689567
Personal Data
Age : 19 years old
Date of Birth : November 20, 1998
Place of Birth : Sta. Cruz, Laguna
Gender : Female
Civil Status : Single
Citizenship : Filipino
Dialect Spoken : Tagalog
Height : 5'4
Weight : 55 kg
Religion : Roman Catholic
Father's Name : Rodolfo C. Capilitan
Mother's Name : Lourdes R. Capilitan

Educational Background
Tertiary Bachelor of Science in Criminology
Manuel S. Enverga University Foundation , Univesity Site, Lucena
City
Secondary San Isidro National High School
Elementary San Isidro Elementary School

Seminars Attended
Data Analysis and Interpretation Seminar

REYNALDO CORONADO GONZALES JR.


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 54 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Via Bergamo St. Citta Grande Subd., Lucena City


Contact #: 09995035447
Personal Data
Age : 19 years old
Date of Birth : January 4, 1999
Place of Birth : Catanauan, Quezon
Civil Status : Single
Citizenship : Filipino
Height : 5’11
Weight : 73kg
Sex : Male
Religion : Roman Catholic
Mother : Estela Coronado Gonzales
Father : Reynaldo Revilla Gonzales

Educational Background
Tertiary Bachelor of Science in Criminology
Manuel S. Enverga University Foundation, Univesity Site, Lucena
City
Secondary Manuel S. Enverga University Foundation Catanauan, Inc.
Primary Catanauan Central School (CCS), Catanauan, Quezon

Seminars Attended
Data Analysis and Interpretation Seminar

B. Research Instruments
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 55 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Part I. Demographic Profile of the Respondents. This part will determine


the appropriateness of the chosen respondents to the present study.
Direction: Kindly put a check mark (/) on the black that corresponds to your
answer.

A. Age
___ 15 - 19 ___ 35 - 39
___ 20 - 24 ___ 40 - 44
___ 25 - 29 ___ 45 - 49
___ 30 - 34 ___ 50 - 54

B. Sex
___ Male
___ Female

C. Civil Status
___ Single ___ Separated
___ Married
___ Widowed/Widower

D. Educational Attainment
___ Elementary Graduate ___ Others (Please
specify):
___ Highschool Graduate
______________________
___ College Graduate

E. Type of Gadget Used


___ Computers ___ Laptops
___ Mobile Phones ___ Others (Please
specify):
___ Tablets
______________________

F. Time Spent on the Social Media


___ 1-2 hours ___ 7-8 hours
___ 3-4 hours ___ 9-10 hours
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 56 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

___ 5-6 hours ___ 11-12 hours

Part II. Level of Awareness of the Respondents on the Different Types


of Cybercrimes. This part of the research instrument will determine the level
of knowledge of the respondents on the different types of cybercrimes.

Direction: Please read and analyze the following statements, then put a
check mark (/) on the space provided that corresponds to your opinion.
Please use the following scales listed below as your guide.
(5) EA - Extremely Aware (2) SA - Slightly Aware

(4) MA -Moderately Aware (1) NA - Not at All Aware

(3) SWA - Somewhat Aware

5 4 3 2 1
STATEMENT (EA) (MA) (SWA) (SA) (NA)
1. Cyber-squatting. The practice of inhabiting
someone else’s property without their permission
domain names are cheap and are sold on a “first
come, first served” basis.
2. Cyberbullying. Use of cell phones, instant
messaging, e-mail, chat rooms or social networking
sites such as Facebook and Twitter to harass,
threaten or intimidate someone.
3. Cybersex. Involves using the internet for sexual
purposes, especially by exchanging sexual messages
with another person.
4. Child Pornography. Involves images of children
and involved in sex acts. If a man possess videos in
which the camera was focused on the clothed genital
region of young girls.
5. Identity Theft/Stealing One’s Identity. A crime in
which an imposter obtains key pieces of personally
identifiable information in order to impersonate
someone else.
6. Illegal Access to Data. Involves the unauthorized
or illegal viewing, access or retrieval of data by an
individual, application or service.
7. System Interference. Disruption of the
functioning of a computer or a computer network
without right or authority to do so.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 57 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

8. Data Interference. Intentional damaging of


computer data, electronic document, or electronic
data message, without right.
9. Computer-related Forgery. Forging or
counterfeiting the authenticity of electronic
documents, such as birth certificates and the
same to commit any crime.
10. Computer-related Fraud. Any dishonest
misinterpretation of fact intended to let another
to do or refrain from doing something which
causes loss. Examples are variety of internet
scams, many based on phishing and social
media engineering, target consumers and
businesses.
11. Libel. Saying or writing something about the
person that hurts their reputation.
12. Illegal Interception. The unauthorized
interception of a conversation, communication
or digital transmission in real time. The various
forms of communication include phone calls,
emails, instant messages or any other internet
services.

Part III. Ways on How Social Media is Use to Commit Cybercrimes. This
part of the research instrument will determine how the social media is use to
commit cybercrimes.

Direction: Please read and analyze the following statements, then put a
check mark (/) on the space provided that corresponds to your opinion.
Please use the following scales listed below as your guide.
SA - Strongly Agree D - Disagree

A -Agree SDA - Strongly Disagree

MA -Moderately Agree

(5) (4) (3) (2) (1)


STATEMENT
SA A MA D SDA
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 58 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

1. Human errors/accidental posts or tweets/unknowing clicks


on phishing links.
2. Not paying attention/leaving your account unmonitored.

3. Viruses that send spam messages to others.

4. Links that has viruses that can affect your computer.


4. Malicious applications or softwares and attacks targeting
individuals and computers.
6. Phishing scams that tricks people into handling over
personal information (such as banking details and passwords).
7. Not implementing privacy or security settings on accounts.

8. Cyberbullies
9. Providing information about their credit or debit card to use
those cards to purchase different products, items, or services.

Part IV. Ways to avoid being victimized of cybercrime. This part of the
research instrument will determine what the users can do to avoid being
victimized, compromised or exploited in using social media accounts, sites or
networks.

Direction: Please read and analyze the following statements, then put a
check mark (/) on the space provided that corresponds to your opinion.
Please use the following scales listed below as your guide.
(5) EA - Extremely Aware (2) SA - Slightly Aware

(4) MA -Moderately Aware (1) NA - Not at All Aware

(3) SWA - Somewhat Aware

5 4 3 2 1
STATEMENT
(EA) (MA) (SWA) (SA) (NA)
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 59 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

1. Avoid using public networks. Refrain from


connecting to free Wi-Fi networks from coffee
shops or other public places.

2. Avoid using public computers for sensitive


business. If you’re about to do some personal
transactions like banking or online shopping, do not
do it using public computers.
3. Use strong passwords. A strong password is one
that cannot be easily guessed, or broken by a brute
force attack in a reasonable amount of time.
4. Do not give out your passwords. Keep the
passwords of your various accounts to yourself.

5. Avoid downloading unknown applications. The


Internet is full of free software from unknown
sources. These kinds of programs normally carry
malicious applications with it and installing it may
infect and cause serious damage to your computer.

6. Avoid downloading illegal contents. Purchase


media contents straight from legitimate sources
only, like iTunes or Amazon.
7. Report any site that shares pirated contents. If
you come across websites that shares illegal
contents, contact your ISP or local government units
responsible for handling such kinds of issues and
report these kinds of illegal activities.
8. Back up your files, regularly. It won’t prevent
you becoming a victim but it will limit the damage
such a cyber-attack could inflict on you.
9. Use common sense. If you don’t know the sender
of an email promising you vast sums of money, if
you’re suddenly getting told by email that an
account has been jeopardized, or it seems too good
to be true, it’s probably a virus.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 60 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 61 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

INFORMED CONSENT FORM

TITLE
SOCIAL MEDIA AS USED IN COMMITING CYBERCRIMES

STUDY PROPONENT/PRINCIPAL INVESTIGATOR


Hannah Marie Jaime / 09569329664
Kristin
e Roda R. Capilitan / 09952689567
Reynaldo C. Gonzales Jr. / 09995035447

CONFLICT OF INTEREST
Declaration
No conflict of interest.

You are being invited to participate in this study because you qualify as one of the respondents
that could help in the advancement of this research. You are fit in the category of respondents: a
student and a professional that uses social media or social networking sites. This consent form
provides you with information to help you make an informed choice. Please read this document
carefully. If you have any questions, they should be answered to your satisfaction before you
decide whether to participate in this research study.

STUDY BACKGROUND AND RATIONALE


This study aims to determine how to prevent and control the wide range spreading of cybercrime
especially on highly-used social media sites like Facebook, Twitter, and others when it has
earned the trust of many people. This study will also focus on bringing awareness to the forms
and types of cybercrimes for the people to not become exploited and victimized. By this study,
the researchers will be able to assess the effectiveness of the programs being conducted by the
PNP in the prevention and control of cybercrime in our country and to increase their level of
knowledge about crimes circulating in the Internet so as to limit the number of victimization,
especially in social media applications.

BENEFITS
The study is expected to be beneficial to those persons who uses social media or social
networking sites as it will provide insights with regards to self-awareness, control and prevention
of the existence of cybercrimes. The study will not only benefit the respondents but also those
who plan to use social media or social networking sites on better understanding of the types of
cybercrimes as to increase their knowledge and which they should avoid. The research may help
in increasing knowledge of the different types of cybercrimes that could reduce the number of
victimization.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 62 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

ALTERNATIVES TO THIS STUDY


If the research subject choose not to participate, one is free to do so. The researcher will then find
a replacement for the particular research subject.

ONE’S PARTICIPATION
Your participation in this study is strictly voluntary. You will be given 48 hours to decide if you
will participate in the study. You have the freedom to withdraw from this study without penalty at
any time. Participation in this study consists of filing out five (5) questionnaires. Completion of
the questionnaire is anticipated between ten to 15 minutes. Please complete the questionnaires by
giving your rating to each question. There are no right or wrong answers.

RISKS
In answering the questionnaires, psycho-emotional and social of the respondents might be
affected because there might be an impact on the emotions for it may resurface unwanted
feelings. The likelihood of the threat is rated moderate.

PRIVACY AND CONFIDENTIALITY


Any information given or shared by the participants will only be used for academic purposes
only. It will not be used for other unnecessary purposes and the respondent’s identity will remain
unknown to others. The information will only be accessed by the researcher alone and will only
be presented to the board of panelist of the final oral defense.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 63 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

CONTACT INFO

If you have further questions or concerns about your participation in this study, or if you suffer
any injury related to the study, please contact:

Hannah Marie Jaime 09569329664


Name Telephone

Kristine Roda R. Capilitan 09952689567


Name Telephone

Reynaldo C. Gonzales Jr. 09995035447


Name Telephone
If you have questions about your rights as a participant or about ethical issues related to this
study, you can talk to someone who is not involved in the study at all. That person is:

____________________________ _________________________
Name Telephone

SIGNATURES

● I understand that my taking part is voluntary; I can withdraw from the study at any time
and I do not have to give any reasons for why I no longer want to take part.
● All of my questions and concerns have been answered.
● I understand the information indicated this informed consent form.
● I understand that my participation in this study includes answering a survey
questionnaire.
● By signing this form, none of my legal rights have been given up.

___________________________________ _________________
Signature Over Printed Name of Participant/ Date
Substitute Decision-Maker

___________________________________ _________________
Signature Over Printed Name of Date
Person Conducting the Consent Discussion
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 64 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

ONLY IF the participant is unable to read or requiring oral translation, accomplish this sub-
section:

● This form was accurately explained to, and apparently understood by, the
participant/substitute decision-maker, and
● Informed consent was freely given by the participant/substitute decision-maker.

___________________________________ ________________________

Signature Over Printed Name Date


of Impartial Witness/Translator
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 65 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 66 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

TALLY SHEET
Part I. Demographic Profile. This part deals with the demographic profile of the respondents.
A.

Age 15-19 20-24 25-29 30-34 35-39 40-44 45-49 50-54 Total
IIIII-IIIII- IIIII-IIIII- IIIII-II – IIIII-III - III - 3 IIII - 4 III - 3 IIIII-III - 100
IIIII-IIIII- IIIII-IIIII- 7 8 8
IIIII-IIIII- IIIII-II-
IIIII-IIIII- 27
40
Percentage
40% 27% 7% 8% 3% 4% 3% 8% 100%

Students
Age 15-19 20-24 25-29 30-34 35-39 40-44 45-49 50-54 Total
IIIII-IIIII- IIIII-IIIII- 50
IIIII-IIIII- 10
IIIII-IIIII-
IIIII-IIIII-
40

Percentage
80% 20% 0% 0% 0% 0% 0% 0% 100%

Professionals
Age 15-19 20-24 25-29 30-34 35-39 40-44 45-49 50-54 Total
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 67 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

IIIII-IIIII- IIIII-II - 7 IIIII-III - 8 III - 3 IIII - 4 III - 3 IIIII-III - 8 50


IIIII-II
-17
Percentage
0% 34% 14% 16% 6% 8% 6% 16% 100%

B.
Sex Male Female Total
IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- IIIII-IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- IIIII-IIIII-I – 41 50
IIII - 49

Percentage
49% 41% 100%

Students
Sex Male Female Total
IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- I - 31 IIIII-IIIII- IIIII-IIII - 19 50

Percentage
62% 38% 100%

Professionals
Sex Male Female Total
IIIII-IIIII- IIIII-IIIII- IIIII-III - 28 IIIII-IIIII- IIIII-IIIII- II - 22 50

Percentage
66% 44% 100%

C.
Civil Status Single Married Widowed/er Separated Total
IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- IIIII- 100
IIIII-IIIII- IIIII-IIIII- IIIII- IIII – 24
IIIII-IIIII- IIIII-IIIII-
IIIII-IIIII- IIIII-I - 76
Percentage
76% 24% 0% 0% 100%
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 68 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Students
Civil Status Single Married Widowed/er Separated Total
IIIII-IIIII- IIIII-IIIII- 50
IIIII-IIIII- IIIII-IIIII-
IIIII-IIIII- 50

Percentage
100% 0% 0% 0% 100%

Professionals
Civil Status Single Married Widowed/er Separated Total
IIIII- IIIII-IIIII- IIIII- IIIII- IIIII-IIIII- 50
IIIII- I – 26 IIIII-IIII – 24

Percentage
52% 48% 0% 0% 100%

D.
Educational Elementary Undergraduate College Graduate Total
Attainment Graduate

IIIII-IIIII- IIIII-IIIII- IIIII- IIIII-IIIII- IIIII-IIIII- IIIII- 100


IIIII- IIIII-IIIII- IIIII-IIIII- IIIII- IIIII-IIIII- IIIII-IIIII-
50 50
Percentage
50% 50% 100%

Students
Educational Elementary Undergraduate College Graduate Total
Attainment Graduate

IIIII-IIIII- IIIII-IIIII- IIIII- 50


IIIII- IIIII-IIIII- IIIII-IIIII-
50
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 69 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Percentage
100% 100%

Professionals
Educational Elementary Undergraduate College Graduate Total
Attainment Graduate

IIIII-IIIII- IIIII-IIIII- IIIII- 50


IIIII- IIIII-IIIII- IIIII-IIIII-
50
Percentage
100% 100%

E.
Gadget Used Computers Mobile Tablets Laptops Total
Phones
IIIII-IIIII-IIIII-III – 18 IIIII-IIIII- IIIII- IIII- 4 IIIII-IIIII- 10 100
IIIII- IIIII-IIIII-
IIIII-IIIII- IIIII-
IIIII- IIIII-IIIII-
IIIII-III- 68
Percentage
18% 68% 4% 10% 100%

Students
Gadget Used Computers Mobile Tablets Laptops Total
Phones
IIIII-IIIII- 10 IIIII-IIIII- IIIII- III – 3 III- 3 50
IIIII- IIIII-IIIII-
IIII- 34
Percentage
20% 68% 6% 6% 100%

Professionals
Gadget Used Computers Mobile Tablets Laptops Total
Phones
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 70 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

IIIII-III – 8 IIIII-IIIII- IIIII- I -1 IIIII-II - 7 50


IIIII- IIIII-IIIII-
IIII- 34
Percentage
16% 68% 2% 14% 100%

F.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 71 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Time Spent 1-2 hours 3-4 hours 5-6 hours 7-8 hours 9-10 hours 11-12 hours Total
IIIII-IIIII- IIIII- IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- I - IIII - 4 III - 3 100
IIIII- II – 22 IIIII-IIIII- IIIII-IIIII- IIII 11
IIIII-IIIII- - 24
IIIII-I - 36
Percentage
22% 36% 24% 11% 4% 3% 100%

Time Spent 1-2 hours 3-4 hours 5-6 hours 7-8 hours 9-10 hours 11-12 hours Total
IIIII-IIIII- II – IIIII-IIIII- 10 IIIII-IIIII- IIII IIIII-III - 8 IIII - 4 II - 2 50
12 - 14
Percentage 24% 20% 28% 16% 8% 4% 100%
Students

Professionals
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 72 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Time Spent 1-2 hours 3-4 hours 5-6 hours 7-8 hours 9-10 hours 11-12 hours Total
IIIII-IIIII- 10 IIIII-IIIII- IIIII-IIIII- 14 III - 3 I -1 50
IIIII-IIIII-
IIIII-I - 26

Percentage
20% 42% 28% 6% 0% 2% 100%

Part II. Level of Awareness of the Respondents on the Different Types of Cybercrimes

Statement 5 4 3 2 1 Total WV WM V Rank

AwareModerately Somewhat Aware AwareModerately AwareExtremely AwareModerately


1. Cyber-squatting. The practice of
inhabiting someone else’s property
without their permission domain
names are cheap and are sold on a 29 45 24 1 1 100 400 4.00 7
“first come, first served” basis.

2. Cyberbullying. Use of cell


phones, instant messaging, e-mail,
chat rooms or social networking
59 36 2 3 0 100 451 4.51 1
sites such as Facebook and Twitter
to harass, threaten or intimidate
someone.
3. Cybersex. Involves using the
internet for sexual purposes,
especially by exchanging sexual
messages with another person. 36 36 8 0 0 100 348 3.48 11

4. Child Pornography. Involves


images of children and involved in
sex acts. If a man possess videos in
which the camera was focused on 35 35 5 2 0 100 334 3.34 12
the clothed genital region of young
girls.
5. Identity Theft/Stealing One’s
Identity. A crime in which an
imposter obtains key pieces of
personally identifiable information 37 45 17 1 0 100 418 4.18 4
in order to impersonate someone
else.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 73 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

AwareModerately Moderately AwareAware Moderately AwareExtremely


6. Illegal Access to Data. Involves
the unauthorized or illegal
viewing, access or retrieval of data 35 49 26 0 1 100 450 4.50 2
by an individual, application or
service.

7. System Interference. Disruption


of the functioning of a computer or
a computer network without right
or authority to do so. 25 51 19 4 1 100 395 3.95 8

8. Data Interference. Intentional


damaging of computer data,
electronic document, or electronic
data message, without right. 28 51 18 2 1 100 403 4.03 6

9. Computer-related Forgery.
Forging or counterfeiting the
authenticity of electronic
documents, such as birth 27 44 22 5 2 100 389 3.89 10
certificates and the same to
commit any crime.
10. Computer-related Fraud. Any
dishonest misinterpretation of fact
intended to let another to do or Moderately Aware
refrain from doing something
which causes loss. Examples are 32 49 17 4 0 100 415 4.15 5
variety of internet scams, many
based on phishing and social
media engineering, target
consumers and businesses.
Moderately AwareExtremely

11. Libel. Saying or writing


something about the person that
hurts their reputation. 49 37 13 1 0 100 434 4.34 3

12. Illegal Interception. The 21 54 22 2 1 100 392 3.92 9


unauthorized interception of a
conversation, communication or
digital transmission in real time.
The various forms of
communication include phone
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 74 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

calls, emails, instant messages or


any other internet services.

Aware
Students

Statement 5 4 3 2 1 Total WV WM V Rank

AwareModerately AwareExtremely AwareExtremely AwareExtremely Extremely Aware AwareModerately


1. Cyber-squatting. The practice of
inhabiting someone else’s property
without their permission domain
names are cheap and are sold on a 21 18 9 1 1 50 207 4.14 10
“first come, first served” basis.

2. Cyberbullying. Use of cell


phones, instant messaging, e-mail,
chat rooms or social networking
34 12 1 3 0 50 227 4.54 1
sites such as Facebook and Twitter
to harass, threaten or intimidate
someone.
3. Cybersex. Involves using the
internet for sexual purposes,
especially by exchanging sexual 26 18 6 0 0 50 220 4.40 2.5
messages with another person.

4. Child Pornography. Involves


images of children and involved in
sex acts. If a man possess videos in
26 20 2 2 0 50 220 4.40 2.5
which the camera was focused on
the clothed genital region of young
girls.
5. Identity Theft/Stealing One’s
Identity. A crime in which an
imposter obtains key pieces of
24 19 7 0 0 50 217 4.34 5
personally identifiable information
in order to impersonate someone
else.
6. Illegal Access to Data. Involves
the unauthorized or illegal
viewing, access or retrieval of data
by an individual, application or 19 21 10 0 0 50 259 4.18 8.5
service.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 75 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

AwareModerately AwareExtremely AwareModerately


7. System Interference. Disruption
of the functioning of a computer or
a computer network without right
or authority to do so. 21 21 4 4 0 50 209 4.18 8.5

8.Data Interference. Intentional


damaging of computer data,
electronic document, or electronic 20 26 3 1 0 50 215 4.30 6
data message, without right.

9.Computer-related Forgery.
Forging or counterfeiting the
authenticity of electronic
documents, such as birth 16 22 6 5 1 50 197 3.94 12
certificates and the same to
commit any crime.
10. Computer-related Fraud. Any
dishonest misinterpretation of fact

Extremely Aware
intended to let another to do or
refrain from doing something
which causes loss. Examples are 23 20 6 3 0 50 219 4.38 4
variety of internet scams, many
based on phishing and social
media engineering, target
consumers and businesses.
Moderately Aware AwareExtremely
11. Libel. Saying or writing
something about the person that
hurts their reputation. 22 18 9 1 0 50 211 4.22 7

12. Illegal Interception. The


unauthorized interception of a
conversation, communication or
digital transmission in real time.
15 22 11 2 0 50 200 4.00 11
The various forms of
communication include phone
calls, emails, instant messages or
any other internet services.

Professionals
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 76 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

Statement 5 4 3 2 1 Total WV WM V Rank

1. Cyber-squatting. The practice of

AwareModerately AwareModerately AwareModerately AwareExtremely AwareExtremely Extremely Aware Moderately Aware


inhabiting someone else’s property
without their permission domain
names are cheap and are sold on a 8 27 15 0 0 50 193 3.86 7
“first come, first served” basis.

2. Cyberbullying. Use of cell


phones, instant messaging, e-mail,
chat rooms or social networking
sites such as Facebook and Twitter 25 24 1 0 0 50 224 4.48 3
to harass, threaten or intimidate
someone.
3. Cybersex. Involves using the
internet for sexual purposes,
especially by exchanging sexual 30 18 2 0 0 50 228 4.56 2
messages with another person.

4. Child Pornography. Involves


images of children and involved in
sex acts. If a man possess videos in
32 15 3 0 0 50 229 4.58 1
which the camera was focused on
the clothed genital region of young
girls.
5. Identity Theft/Stealing One’s
Identity. A crime in which an
imposter obtains key pieces of
personally identifiable information 13 26 10 1 0 50 201 4.02 5
in order to impersonate someone
else.
6. Illegal Access to Data. Involves
the unauthorized or illegal
viewing, access or retrieval of data
by an individual, application or 6 28 16 0 1 50 191 3.82 10
service.

7. System Interference. Disruption


of the functioning of a computer or
a computer network without right
or authority to do so. 4 30 15 0 1 50 186 3.72 12
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 77 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

AwareModerately AwareModerately
8.Data Interference. Intentional
damaging of computer data,
electronic document, or electronic
data message, without right. 8 25 15 1 1 50 188 3.76 11

9.Computer-related Forgery.
Forging or counterfeiting the
authenticity of electronic
documents, such as birth 11 22 16 0 1 50 192 3.84 8.5
certificates and the same to
commit any crime.
10. Computer-related Fraud. Any
dishonest misinterpretation of fact

Moderately Aware
intended to let another to do or
refrain from doing something
which causes loss. Examples are 9 29 11 1 0 50 196 3.92 6
variety of internet scams, many
based on phishing and social
media engineering, target
consumers and businesses.

Moderately Aware AwareExtremely


11. Libel. Saying or writing
something about the person that
hurts their reputation. 27 19 4 0 0 50 223 4.46 4

12. Illegal Interception. The


unauthorized interception of a
conversation, communication or
digital transmission in real time.
6 32 11 0 1 50 192 3.84 8.5
The various forms of
communication include phone
calls, emails, instant messages or
any other internet services.

Part III. Ways on How Social Media is Used to Commit Cybercrimes

Statement 5 4 3 2 1 Total WV WM V Rank

1. Human errors/accidental
Agree

posts or tweets/unknowing 33 48 9 9 1 100 403 4.03 4


clicks on phishing links.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 78 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

2. Not paying attention/leaving

Agree
your account unmonitored. 36 39 11 10 4 100 393 3.93 8

3. Viruses that send spam

Agree
messages to others. 36 37 10 7 5 100 377 3.77 9

4. Links that has viruses that

Agree
can affect your computer. 51 34 3 6 6 100 418 4.18 1

5.Malicious applications or
softwares and attacks targeting

Agree
individuals and computers. 46 34 9 6 5 100 410 4.10 2

6. Phishing scams that tricks

Agree
people into handling over
37 41 9 5 8 100 394 3.94 7
personal information (such as
banking details and passwords).
7. Not implementing privacy or

Agree
security settings on accounts. 39 39 10 7 5 100 400 4.00 5.5

Agree
8. Cyberbullies 46 32 10 4 8 100 404 4.04 3

9. Providing information about


their credit or debit card to use
those cards to purchase 39 41 9 3 8 100 400 4.00 Agree 5.5
different products, items, or
services.

Students

Statement 5 4 3 2 1 Total WV WM V Rank

1. Human errors/accidental
Agree

posts or tweets/unknowing 13 23 5 8 1 50 189 3.78 2.5


clicks on phishing links.
2. Not paying attention/leaving
Agree

your account unmonitored. 16 15 7 9 3 50 182 3.64 7

3. Viruses that send spam


Agree

messages to others. 19 12 8 7 4 50 185 3.70 5.5


Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 79 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

4. Links that has viruses that

Agree
can affect your computer. 25 12 2 6 5 50 196 3.92 1

5.Malicious applications or

Agree
softwares and attacks targeting 18 17 5 6 4 50 189 3.78 2.5
individuals and computers.

6. Phishing scams that tricks


people into handling over

Agree
personal information (such as 10 23 5 5 7 50 174 3.48 8
banking details and passwords).

7. Not implementing privacy or

Agree
security settings on accounts. 16 18 5 7 4 50 185 3.70 5.5

DisagreeStrongly Agree
8. Cyberbullies 21 12 6 4 7 50 186 3.72 4

9. Providing information about


their credit or debit card to use
those cards to purchase
14 18 8 3 7 50 179 1.79 9
different products, items, or
services.

Professionals

Statement 5 4 3 2 1 Total WV WM V Rank


Agree AgreeStrongly AgreeStrongly

1. Human errors/accidental
posts or tweets/unknowing
clicks on phishing links. 20 25 4 1 0 50 214 4.28 7

2. Not paying attention/leaving


your account unmonitored.
20 24 4 1 1 50 211 4.22 8

3. Viruses that send spam


messages to others. 17 25 2 0 1 50 192 3.84 9
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 80 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

AgreeStrongly AgreeStrongly AgreeStrongly AgreeStrongly AgreeStrongly AgreeStrongly


4. Links that has viruses that
can affect your computer.
26 22 1 0 1 50 222 4.44 1

5.Malicious applications or
softwares and attacks targeting
individuals and computers. 28 17 4 0 1 50 221 4.42 2.5

6. Phishing scams that tricks


people into handling over
personal information (such as 27 18 4 0 1 50 220 4.40 4
banking details and passwords).

7. Not implementing privacy or


security settings on accounts.
23 21 5 0 1 50 215 4.30 6

8. Cyberbullies

25 20 4 0 1 50 218 4.36 5

9. Providing information about


their credit or debit card to use
those cards to purchase 25 23 1 0 1 50 221 4.42 2.5
different products, items, or
services.

Part IV. Ways to Avoid Being Victimized of Cybercrimes

Statement 5 4 3 2 1 Total WV WM V Rank


Strongly Agree AgreeStrongly

1. Avoid using public networks.


Refrain from connecting to free
40 46 10 4 0 100 422 4.22 9
Wi-Fi networks from coffee
shops or other public places.
2. Avoid using public 43 48 9 0 0 100 434 4.34 7
computers for sensitive
business. If you’re about to do
some personal transactions like
banking or online shopping, do
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 81 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

not do it using public


computers.

AgreeStrongly AgreeStrongly
3. Use strong passwords. A
strong password is one that
cannot be easily guessed, or 64 28 6 2 0 100 454 4.54 2
broken by a brute force attack
in a reasonable amount of time.
4. Do not give out your
passwords. Keep the passwords
71 23 5 0 1 100 463 4.63 1
of your various accounts to
yourself.
5. Avoid downloading unknown
applications. The Internet is full
of free software from unknown

Strongly Agree
sources. These kinds of
programs normally carry
malicious applications with it 40 47 11 0 2 100 423 4.23 8
and installing it may infect and
cause serious damage to your
computer.

AgreeStrongly
6. Avoid downloading illegal
contents. Purchase media
contents straight from 54 36 10 0 0 100 444 4.44 4
legitimate sources only, like
iTunes or Amazon.
7. Report any site that shares
pirated contents. If you come
Strongly Agree

across websites that shares


illegal contents, contact your
49 39 11 1 0 100 436 4.36 5.5
ISP or local government units
responsible for handling such
kinds of issues and report these
kinds of illegal activities.
AgreeStrongly

8. Back up your files, regularly.


It won’t prevent you becoming
a victim but it will limit the 49 39 11 1 0 100 436 4.36 5.5
damage such a cyberattack
could inflict on you.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 82 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

9. Use common sense. If you


don’t know the sender of an

Strongly Agree
email promising you vast sums
of money, if you’re suddenly
55 38 6 1 0 100 447 4.47 3
getting told by email that an
account has been jeopardized,
or it seems too good to be true,
it’s probably a virus.

Students

Statement 5 4 3 2 1 Total WV WM V Rank

1. Avoid using public networks.

Agree
Refrain from connecting to free
20 19 7 4 0 50 205 4.10 9
Wi-Fi networks from coffee
shops or other public places.
2. Avoid using public
computers for sensitive

Strongly Agree
business. If you’re about to do
some personal transactions like 21 22 7 0 0 50 214 4.28 7
banking or online shopping, do
not do it using public
computers.

AgreeStrongly AgreeStrongly
3. Use strong passwords. A
strong password is one that
cannot be easily guessed, or 33 11 4 2 0 50 225 4.50 2
broken by a brute force attack
in a reasonable amount of time.
4. Do not give out your
passwords. Keep the passwords
35 12 2 0 1 50 230 4.60 1
of your various accounts to
yourself.
5. Avoid downloading unknown
applications. The Internet is full
of free software from unknown
sources. These kinds of
Agree

programs normally carry 21 22 5 0 2 50 210 4.20 8


malicious applications with it
and installing it may infect and
cause serious damage to your
computer.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 83 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

AgreeStrongly
6. Avoid downloading illegal
contents. Purchase media
contents straight from 30 14 6 0 0 50 224 4.48 3
legitimate sources only, like
iTunes or Amazon.
7. Report any site that shares
pirated contents. If you come

Strongly Agree
across websites that shares
illegal contents, contact your
25 17 7 1 0 50 216 4.32 6
ISP or local government units
responsible for handling such
kinds of issues and report these
kinds of illegal activities.

AgreeStrongly
8. Back up your files, regularly.
It won’t prevent you becoming
a victim but it will limit the 26 17 6 1 0 50 218 4.36 5
damage such a cyberattack
could inflict on you.
9. Use common sense. If you
don’t know the sender of an

Strongly Agree
email promising you vast sums
of money, if you’re suddenly
27 18 4 1 0 50 221 4.42 4
getting told by email that an
account has been jeopardized,
or it seems too good to be true,
it’s probably a virus.

Professionals

Statement 5 4 3 2 1 Total WV WM V Rank


Strongly Agree AgreeStrongly

1. Avoid using public networks.


Refrain from connecting to free
20 27 3 0 0 50 217 4.34 8
Wi-Fi networks from coffee
shops or other public places.
2. Avoid using public
computers for sensitive
business. If you’re about to do
some personal transactions like 22 26 2 0 0 50 220 4.40 4.5
banking or online shopping, do
not do it using public
computers.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 84 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

AgreeStronglyAgree Strongly
3. Use strong passwords. A
strong password is one that
cannot be easily guessed, or 31 17 2 0 0 50 229 4.58 2
broken by a brute force attack
in a reasonable amount of time.

4. Do not give out your


passwords. Keep the passwords
36 11 3 0 0 50 233 4.66 1
of your various accounts to
yourself.
5. Avoid downloading unknown
applications. The Internet is full

Strongly Agree
of free software from unknown
sources. These kinds of
programs normally carry 19 25 6 0 0 50 213 4.26 9
malicious applications with it
and installing it may infect and
cause serious damage to your
computer.
6. Avoid downloading illegal

Strongly Agree
contents. Purchase media
contents straight from
24 22 4 0 0 50 220 4.40 4.5
legitimate sources only, like
iTunes or Amazon.

7. Report any site that shares


pirated contents. If you come
across websites that shares Strongly Agree
illegal contents, contact your
24 22 4 0 0 50 220 4.40 4.5
ISP or local government units
responsible for handling such
kinds of issues and report these
kinds of illegal activities.
AgreeStrongly

8. Back up your files, regularly.


It won’t prevent you becoming
a victim but it will limit the 23 22 5 0 0 50 218 4.36 7
damage such a cyberattack
could inflict on you.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 85 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President

9. Use common sense. If you


don’t know the sender of an

Strongly Agree
email promising you vast sums
of money, if you’re suddenly
28 20 2 0 0 50 226 4.52 3
getting told by email that an
account has been jeopardized,
or it seems too good to be true,
it’s probably a virus.

Das könnte Ihnen auch gefallen