Beruflich Dokumente
Kultur Dokumente
An Undergraduate Thesis
Enforcement
Lucena City
by
December 2018
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 2 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Approval Sheet
Table of Contents
PAKIPANTAY NA LANG PO NG MGA PAGE #
Title
Page
Page Title ……………………………………………………………………….. 1
Approval Sheet ………………………………………………………………….2
Table of Contents ………………………………………………………………….3
List of Figures and Table ………………………………………………………...4
Acknowledgement ………………………………………………………………...5
Abstract ……………………………………………………………………………..6
Background ……………………………………………………………………...7
a. Rationale of the research ……………………………………………..7
b. Purpose of the research ………………………………………………9
c. Theoretical Framework ………………………………………………15
d. Literature Survey ………………………………………………………17
e. Significance of the Research ………………………………………..29
f. Statement of Desired Outcomes …………………………………….29
g. Major Final Output …………………………………………………….30
h. Target Beneficiaries of Research Results …………………………30
i. Definition of Terms ……………………………………………………30
j. Scope and Limitation of the Study ……………………………………32
Description of Method or Approach …………………………………………..32
a. Research Design/Research Instrument/Data Gathering Procedures …32
b. Respondents/Units of Analysis/Subjects of the Study ……………33
c. Sampling Design and Procedures …………………………………34
d. Data analysis plan ……………………………………………………35
e. Research Paradigm/Conceptual Framework ………………………37
Results and Discussion …………………………………………………………38
Conclusions ……………………………………………………………………….47
Recommendations …………………………………………………………….48
Implication of the Study …………………………………………………………49
References ………………………………………………………………………49
Appendices ……………………………………………………………………..51
A. Curriculum Vitae of the Researcher ……………………………51
B. Research Instruments…………………………………………………54
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 4 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Title
Page
Acknowledgments
The researchers would like to give glory to Almighty God for giving
Concepcion, for sharing the ideas during the oral defense to enhance the
study;
The librarians of Manuel S. Enverga University Foundation for the
The Researchers
1. Abstract
This study aimed to determine how to prevent and control the wide
others when it has earned the trust of many people. While on the other side,
people didn’t know that they have shared information that they are not aware
that it was beyond their privacy. This study also focused on bringing
awareness to the forms and types of cybercrimes for the people to not
gather and accumulate pertinent data. By this study, the researchers have
the prevention and control of cybercrime in our country and to increase their
2. Background
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 8 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
The use of social media can be useful yet destructive. People should
and we must value it because it gives each person the ability to easily come
up to what are trends in the social media. But, some people use it as a tool
for destructive and bad intentions. Having a computer with internet and
different applications is the reason why many people are being entertained
by social media. Social media was being used in many ways that a person
enjoys using computer that will led them in different kind of situations they
surprising considering the fact that the abacus, which is thought to be the
earliest form of a computer, has been around since 3500 B.C. in India,
Japan, and China. The era of modern computers, however, began with the
textile manufacturer in France, produced the loom. This device allowed the
discourage Jacquard from further use of the new technology. This is the first
being careful in using their accounts. They are being victimized by the
Cybercriminals analyzes and think on how they will commit certain crime and
account of a person and using it on everything that may ruin a person’s life.
Cybercrime through social media not only affects individuals, but also
simple reason that without the latter, the former could and would not exist. It
in which cybercrime takes place. Moreover, the Internet should not be viewed
as simply a piece of technology, a kind of “blank state” that exists apart from
the people who use it. Rather, it needs to be seen as a set of social practices
- the Internet that takes the form that it does because people use it in
discussions of the problem. It is clear that the rapid growth of the Internet has
adapt to crimes that no longer take place in the terrestrial world but in the
numbers, as the solution and protection to those people who are being
research will take up about the awareness and prevention of social media
users about cybercrimes. It concerns to those people that are social media
dependent, because they are just using social media because they only
know that they can use it as a fastest way of communicating to others but
they are not aware of those things that may led them to be the victim of
different cybercrimes.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 11 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
objectives:
1. Identify the demographic profile of the respondents in terms of;
1.1. Age
1.2. Sex
1.3. Civil Status
1.4. Educational Attainment
1.5. Type of Gadget Used
1.6. Time Spent on the Social Media
of cybercrimes.
c. Theoretical Framework
is not born with the ability to behave violently. These theories assume that
people are born with no tendency to commit crimes but that they learn to be
People learn to act aggressively when, as children they model their behavior
some people who use social media imitates those acts that they witness
while using it. They tend to learn bad/violent behavior through the acts of
Cohen and Marcus Felson assumes that both the motivation to commit crime
and the supply of offenders are constant. Every society will always have
some people willing to break the law for revenge, greed, or some other
motive. It is the view that victimization results from the interaction of three
commit a crime after weighing the prospective rewards against the potential
risk. Stalking via internet allows the offender to do it from a relatively remote
distance. The offence inflicts the same type of fear and harassment as in the
case of victims who are in direct face-to-face situation with cyber stalkers.
people act in a manner that is rational. It assumes that many of the cyber
criminals are talented and well educated, not necessarily in formal manner
but they have an ability to think rationally. They attack the victims whom they
believe would give them the greatest amount of financial gain with least
caught. The high tech criminals are hardly caught because of the skill to
cover their tracks and move through proxy servers so that they are
online.
This one theory of victimization relates in the study of cybercrimes
community crimes first. In other words, they first come to think of it before
are either illegal or considered illicit by certain parties and which can be
from the versatile capabilities provided by the new ICT’s. The global
connectivity of the Internet, for example, makes it much easier for criminals
laundering, illegal arms trafficking, smuggling and the like. For hackers with
the requisite computer skills, a large market exists for security and trade
incite violence.
d. Literature Survey
and is based on the premise that people are profoundly communal and have
a need to interact using voice, gesture, and written language. Natural human
indications help make social media enticing and fun to use. Social media
forms. Not only do people seek social outlets for daily life, they rely on social
possible to move the inherent social nature of humans onto new digital
attributed for much power on the media and underestimated the importance
mediate the relationship between the state and the individual, and the
explaining crime in terms of its individual, biological roots were giving away
the Chicago School in the 1920s and 1930s. The over-riding concern of
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 16 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
words, it was recognized that where people grow up and who they associate
behavior.
Concepcion (2015) supported this that among the environmental
study is the wide, fast-evolving array of media and technologies that are part
influence of it in the lives of their children. Television, radio, and the press are
development of young people, the values that are being taught by the media;
the images of the adult social roles that the youth sees, and above all, the
works done by the media advertising on our youth who became conspicuous
economic changes, Facebook had, as of the end of 2013, 1.23 billion active
users, was worth $135 billion, and is accessed by 556 million people every
day.
According to Luyun (2013) that the modern society has become more
boomed, making children spend more time on it. They spend more time
listening to music, chatting, and the like. They use the internet in various
that it has become difficult to imagine life without them. As their penetrance
ages, they have particularly revolutionized the ways in which young people
the ‘kidult’, as the media have termed adults who enjoy a prolonged (or
2015).
So profound the changes have been and how rapidly new forms of
(2001), YouTube (2005), Facebook (2006) and Twitter (2007) are among the
25 years ago the Internet was unheard of among the general populace, and
subsequent expansion of the Internet has been exponential (Jewkes & Yar,
2010).
Cybercrimes
According to A. Alvola & J. Alvola (2014) cybercrime is the use of
almost all the people in the Philippines are social media users. As a
dependent of it they just enjoy using their social media accounts, they also
use it as their past time and somewhat they use it as the way of their
communication to others but they are not aware of what they are doing
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 19 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
sometimes. They don’t understand or they are not aware that they can be
victimized of using their social media accounts. Many people are expert in
using social media and many of those people are the criminals that’s why
many accounts are being hacked or they are victimized in a way that they
use it as the transaction of goods and services not knowing if it is true or just
an imitation.
Meanwhile, Broadhurst, (2015) proved and stated that over the past
decade, considerable progress has been made within and between nations
to develop the capacity of police to respond to cyber ‐crime and there is now
growing awareness amongst computer users of the need for basic security
online.
the United Kingdom and the United States (Pinkston, 2011). One parole
the subject of the crime (such causing computer damage) for example, a
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 20 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
the crime. This means that the computer is used to commit “traditional crime”
(such as for record-keeping purpose). The DOJ suggests this would be using
proliferation of cybercrime has created a need for new laws and enforcement
Some websites put you at higher risk for getting your computer
infected with a virus or spyware than others. Pornography and gaming sites
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 21 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
are notorious for this. So the best advice is to avoid them like the plague.
Some major internet companies, including Google, are taking steps to warm
computer users if they are about to visit a webpage that could harm their
programs or files over the Internet. Things are seldom completely free. These
Also be wary of floppy, CD, or DVD discs received in the mail if you don’t
know the sender personally. Buying products online from reputable retailers
Dileone (2014) stated that, we must be mindful that the vast freedom
need to keep our new digital domains secure, and protect ourselves and our
fellow citizens from criminality. After all, as human beings, we each employ
technology for our own chosen ends, so age-old human behaviours (both the
good and bad) are often transposed onto the digital networks. However,
many people are unaware of the reality of the darker side of the internet. But
for cybercrime our reaction of different because it does not come to our
attention until we are affected by the consequences, for instance our bank
this sense it is unfortunate that the evolution of digital technologies has been
so rapid, because the regulations and our ideas about what constitutes anti-
social behaviour have simply been unable to keep pace. Some parts of the
internet are still subject to very little regulation, and in this regard there is still
much to be done. We need to develop new strategies for policing the cyber-
world, with respect to data retention and protection, users’ privacy, and crime
information and then use it for specific decision making and problem solving
Cybercrime Prevention Act of 2012 was the first law specifically penalizing
identity theft, illegal access to data, illegal interception, data and system
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 23 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
which are punishable under this law. This law will greatly help social media
security challenges that may arise from these ever progressing dangers.
Knowing the dangers of cybercrimes and the security threats pose in
our cyberspace, the Philippine National Police (PNP) through the leadership
of Police Director General Allan La Madrid Purisima Chief, PNP, pushed for
the activation of the PNP Anti-Cybercrime Group (ACG) on March 20, 2013
and Public Awareness and; the implementation of strong Laws, Policies and
Regulations. (www.pnpacg.ph)
The PNP-ACG implemented programs that will fight cybercrimes such
bug stuck the world in the early part of the year 2000. It is estimated that the
so-called “Love-Bug” email virus has caused some $10 billion losses in as
main suspect as the author of the “I love you” virus. Six weeks after the
attack of the “I LOVE YOU” virus, the government outlawed some computer
crimes through the E-Commerce Law. The Electronic Commerce Act of 2000
or Republic Act 8792 was signed into law on June 14, 2000. It was a
and this includes the promotion and use of electronic transactions in the
general security concerns in e-commerce are the user authorization and data
sure that only authorized users and programs gain access to information
the victims of such crimes mentioned above. One popular instance is the
case of Senator Tito Sotto who was recently cyber-bullied for plagiarizing in
his speeches on the Senate. In fact, he is the one who inserted libel as a
“content-related” offense in this law. With the newly approved law, violators of
punished with one degree higher than what the Revised Penal Code as
amended, thus, protecting people who are cyber-bullied and lost on how to
fight for their rights online. Likewise, this law ensures every user’s protection
from hackers, identity thieves, cyber-squatters, and from people who practice
principal author of the bill and the Chair of the Senate Committee on Science
focus their attention towards implementing the law because there are a lot of
issues and problems in the society that is more severe like murders and wars
happening within the borders of the country. There are malignant issues that
suppress the crimes on the internet world. It also imposes penalties of any
offense made. The contents of the law include the collaborative IRR of the
cyber squatting, computer forgery, fraud and identity theft, most especially
(www.wordpress.com).
People who are favour of the bill includes the online account owners,
such as facebook, twitter, email, online bank account owners who will be
more worry free from their passwords being hacked. Another is bloggers;
web publishers, software developers and any original computer data owners
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 27 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
will also have a strong ownership with their contents. And most especially are
parents who will not be troubled that their children will now be safe against
Filipino citizens because it helps in maintaining peace for all internet users,
types of cybercrimes.
For the social media users, this served as the basis for the awareness
and how to prevent such cybercrimes. This study will also help the users not
study that will help support their research studies about cybercrimes and also
uses social media or social networking sites for them to have enough
knowledge and to avoid being victimized. This will also help future
of their research.
For long term outcome, this will help in order to develop a program for
the benefit of people who uses different social media websites that can help
them to be kept away from any risk factors and threats in the social media,
The major final output of the research is to increase the awareness among
users using social media applications or social media networking sites to prevent
OBSERVABLE
i. Definition of Terms
years old).
Computer-related Forgery is the input, alteration, or deletion, of any
computer data without right resulting in inauthentic data with the intent that it
sexual messages with people through chat rooms via the internet.
Cybersquatting is the acquisition of a domain name over the internet
in bad faith to profit, mislead, destroy reputation, and deprive others from
viruses.
Identity Theft is the intentional acquisition, use, misuse, transfer,
transmission of viruses.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 31 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
their level of knowledge on different types of cybercrimes and what they can
significant influences of social media in their lives and the level of security
and awareness they have when they are using social networking sites or
sites or application they use and the problems that they have encountered
using social media. It has also focused on the security of their different
specific outcome of social networking sites or application they use and the
problems that they encounter using social media. It has also focused on the
evaluate the level of security and awareness in cybercrimes. The first group
University Foundation.
The second group of respondents have included 50 professionals that
are working in different establishment in Lucena City that also uses different
because they are the one who can utilize and give reliable data regarding
sites.
Respondents were asked to sign the informed consent form to signify
their willingness to be part of study. They were properly oriented about the
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 33 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
objectives of the study and were informed that they can also be given a copy
and other personal information which are not relevant to the study.
Those who refused to answer or decided to terminate the survey was
in the study.
information. That is vital in this study, the researchers provided each of the
in the locality of Lucena City who are fifty (50) professionals and fifty (50)
technique because the instrument gave equal chances for the respondents
and other personal information which are not relevant to the study.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 34 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
analyzed and interpreted in graphs and tables aided with the use of statistical
treatment.
The study utilized simple percentage for sub-problem number one to
where:
P = percentage
F = frequency
The study used weighted mean for sub problem number two which is
which will identify how using social media is use to commit cybercrimes that
are being encountered by the respondents. Weighted mean formula will also
be used in sub-problem four which will determine that in what the users can
x = weighted mean
∑ = summation
F = frequency
The paradigm illustrates that social media was being used in committing
cybercrimes. To prevent and control the existence of these crimes, first you
Age Frequency
15-19 40%
20-24 27%
25-29 7%
30-34 8%
35-39 3%
40-44 4%
45-49 3%
50-54 8%
Sex Frequency
Male 49%
Female 41%
Civil Status Frequency
Single 76%
Married 24%
Widowed/er 0%
Separate 0%
Educational Attainment Frequency
Elementary Graduate 0%
Undergraduate 50%
College Graduate 50%
Gadget Used Frequency
Computers 20%
Mobile Phones 68%
Tablets 6%
Laptops 6%
Time Spent Frequency
1-2 hours 24%
3-4 hours 20%
5-6 hours 28%
7-8 hours 16%
9-10 hours 8%
11-12 hours 4%
The table shows that most of the respondents fell in the age bracket of
15-19 years old which was 40% of the pie. It also shows that 27% of the
respondents belonged to the age bracket of 20-24 years old. 30-34 years old
and 50-54 years old has the same percentage of 8% the graph. While, 7% of
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 38 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
the pie was 25-29 years old, 40-44 years old it has 4%, 35-39 years old and
The majority of the respondents were male which is 55% of the total
the total population. The blue legend on the graph shows the respondents
that are male. While on the other hand, the orange legend shows the
respondents that are female. This indicates that majority of the respondents
Most of the respondents who answer are single with 76% and the rest
are married with 24%. The value of 24% on the table shows the respondents
that are married. While on the other hand, the value of 76% shows the
respondents that are single. This implies that majority of the respondents
were single.
The table above shows the result on what are the type of gadget use
of the respondents. 68% of the respondents are using their Mobile Phones.
them are using Laptops and 4% are using Tablets. This proves that Mobile
any gadget nowadays that's why they are more prone to cybercrimes based
The table shows the survey result of the time spent on the internet of
the respondents. 5-6hrs have the highest percentage which results to 28%.
Thus, 24% of the respondents spent their time on the internet for 1-2hrs and
20% of them for 3-4hrs. On the other hand, 16% of the respondents are
killing their time on the internet for 7-8hrs, 8% of them spent for 9-10hrs and
4% of them spent their time on surfing the net for 11-12hrs. This just proves
that internet is getting most of our time instead of having our time on doing
And since people spent most of their time on the internet, they are more
expose on the virtual world which can lead to a huge possibility that they will
Table 2.
Respondents
Statement
WM VI Rank
1. Cyber-squatting. The practice of inhabiting someone else’s
property without their permission. Domain names are cheap and 4.14 MA 7
are sold on a “first come, first served” basis.
2. Cyberbullying. Use of cell phones, instant messaging, e-mail, chat
rooms or social networking sites such as Facebook and Twitter to 4.54 EA 1
harass, threaten or intimidate someone.
3. Cybersex. Involves using the internet for sexual purposes,
especially by exchanging sexual messages with another person. 4.4 MA 11
4. Child Pornography. Involves images of children and involved in
sex acts. If a man possess videos in which the camera was 4.4 SWA 12
focused on the clothed genital region of young girls.
5. Identity Theft/Stealing One’s Identity. A crime in which an
impostor obtains key pieces of personally identifiable information 4.34 MA 4
in order to impersonate someone else.
6. Illegal Access to Data. Involves the unauthorized or illegal
viewing, access or retrieval of data by an individual, application or 4.18 EA 2
service.
7. System Interference. Disruption of the functioning of a computer
3.95 MA 8
or a computer network without right or authority to do so.
8. Data Interference. Intentional damaging of computer data,
4.03 MA 6
electronic document, or electronic data message, without right.
9. Computer-related Forgery. Forging or counterfeiting the
authenticity of electronic documents, such as birth certificates and 3.89 MA 10
the same to commit any crime.
10. Computer-related Fraud. Any dishonest misinterpretation of fact
intended to let another to do or refrain from doing something
which causes loss. Examples are variety of internet scams, many 4.15 MA 5
based on phishing and social media engineering, target consumers
and businesses.
11. Libel. Saying or writing something about the person that hurts
4.34 EA 3
their reputation.
12. Illegal Interception. The unauthorized interception of a
conversation, communication or digital transmission in real time.
The various forms of communication include phone calls, 3.92 MA 9
emails, instant messages or any other internet services.
General Weighted Mean 4.02 – Moderately Aware
Legend:
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 41 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
access to data or the act that involves the unauthorized or illegal viewing,
the act of saying or writing something about the person that hurts their
Meanwhile, Broadhurst, (2015) proved and stated that over the past
decade, considerable progress has been made within and between nations
to develop the capacity of police to respond to cyber ‐crime and there is now
growing awareness amongst computer users of the need for basic security
online.
weighted mean of 4.02, these results states that the social media users who
Table 3
Respondents
Students Professionals Overall
Statement
Ran Ran
WM VI WM VI WM VI Rank
k k
1. Human errors/accidental
posts or tweets/unknowing 3.78 A 2.5 4.28 SA 7 4.03 A 4
clicks on phishing links.
2. Not paying
attention/leaving your 3.64 A 7 4.22 SA 8 3.93 A 8
account unmonitored.
3. Viruses that send spam
3.7 A 5.5 3.84 A 9 3.77 A 9
messages to others.
4. Links that has viruses that
3.92 A 1 4.44 SA 1 4.18 A 1
can affect your computer.
5.Malicious applications or
softwares and attacks
3.78 A 2.5 4.42 SA 2.5 4.10 A 2
targeting individuals and
computers.
6. Phishing scams that tricks
people into handling over
personal information (such 3.48 A 9 4.4 SA 4 3.94 A 7
as banking details and
passwords).
7. Not implementing privacy
or security settings on 3.7 A 5.5 4.3 SA 6 4.00 A 5.5
accounts.
8. Cyberbullies 3.72 A 4 4.36 SA 5 4.04 A 3
9. Providing information
about their credit or debit
card to use those cards to 1.79 SDA 8 4.42 SA 2.5 4.00 A 5.5
purchase different products,
items, or services.
General Weighted Mean 4.00- Agree
Legend:
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 43 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
The table above shows that the respondents agreed that the ways on
how social media is being used to commit cybercrimes came from human
with a weighted mean of 3.93, links that has viruses that can affect your
4.04, and providing information about their credit or debit card to use those
of 4.00.
information and then use it for specific decision making and problem solving
This study shows that the respondents agreed to all of the statements
that those are the ways on how social media is used to commit cybercrimes
IMPROVE
Table 4
Respondents
Statement Students Professionals Overall
WM VI Rank WM VI Rank WM VI Rank
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 45 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
The table above reveals that the respondents that the social media
users should use strong passwords with a weighted mean of 4.54, do not
applications with a weighted mean of 4.23. Also, results have shown that the
Some websites put you at higher risk for getting your computer
infected with a virus or spyware than others. Pornography and gaming sites
are notorious for this. So the best advice is to avoid them like the plague.
Some major internet companies, including Google, are taking steps to warm
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 47 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
computer users if they are about to visit a webpage that could harm their
programs or files over the Internet. Things are seldom completely free. These
Also be wary of floppy, CD, or DVD discs received in the mail if you don’t
know the sender personally. Buying products online from reputable retailers
all but eliminated the threat of an attack in this manner. IMPROVE THE
INTERPRETATION
5. Conclusions
1. Most of the respondents fell in the age bracket of 15-19 and are male
who got the highest percentage which was 40% and 59% of the entire
phones spending their time on the internet 5-6 hours and above,
2. Cyberbullying got the highest weighted mean which means that the
3. Links that has viruses that can affect your computer are most common
way used in order to commit cybercrimes which has inclined the result
4. The social media users shall use strong passwords, should not give
cybercrimes.
6. Recommendations
1. Users should limit their time in using the Internet considering that it
2. Social media users should increase their awareness and their level of
and applications which are illegally obtained. Do not give out your
become a victim.
aware on the cybercrimes being committed with the used of social media.
Also, this will help social media users to be more safe when accessing
their social media accounts. They will be more educated that it is important
to keep their accounts on private mode to prevent them from being victim of
cybercrimes.
8. References
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 50 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Aas, K. F. (2013). Globalization and crime (2nd Edition). Los Angeles: SAGE.
Bryant, R., & Bryant, S. (2015). Policing digital crime. England: Ashgate
Publishing Limited.
Jewkes, Y. (2015). Media and crime (3rd Edition). Los Angeles: SAGE.
Lehto, M., & Limnéll, J. (2016). Cyber security capability and the case of
finland. Paper presented at the 182-190.
Melgosa, A., & Scott, R. (2013). School internet safety more than 'block it to
stop it'. The Education Digest, 79(3), 46-49
USA.
Rajpurohit, G. S. (2016). Crime and criminal justice in asia. New Delhi India:
Random Publications
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 51 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Sachs, D., & McHaney, R. (2016). Web 2.0 and social media business in a
connected world.
Appendices “A”
Educational Background
Tertiary Bachelor of Science in Criminology
Manuel S. Enverga University Foundation, Lucena City
Secondary Manuel S. Enverga University Foundation, Lucena City
Elementary Lucena East II Elementary School
Seminars Attended
Data Analysis and Interpretation Seminar
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 53 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Educational Background
Tertiary Bachelor of Science in Criminology
Manuel S. Enverga University Foundation , Univesity Site, Lucena
City
Secondary San Isidro National High School
Elementary San Isidro Elementary School
Seminars Attended
Data Analysis and Interpretation Seminar
Educational Background
Tertiary Bachelor of Science in Criminology
Manuel S. Enverga University Foundation, Univesity Site, Lucena
City
Secondary Manuel S. Enverga University Foundation Catanauan, Inc.
Primary Catanauan Central School (CCS), Catanauan, Quezon
Seminars Attended
Data Analysis and Interpretation Seminar
B. Research Instruments
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 55 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
A. Age
___ 15 - 19 ___ 35 - 39
___ 20 - 24 ___ 40 - 44
___ 25 - 29 ___ 45 - 49
___ 30 - 34 ___ 50 - 54
B. Sex
___ Male
___ Female
C. Civil Status
___ Single ___ Separated
___ Married
___ Widowed/Widower
D. Educational Attainment
___ Elementary Graduate ___ Others (Please
specify):
___ Highschool Graduate
______________________
___ College Graduate
Direction: Please read and analyze the following statements, then put a
check mark (/) on the space provided that corresponds to your opinion.
Please use the following scales listed below as your guide.
(5) EA - Extremely Aware (2) SA - Slightly Aware
5 4 3 2 1
STATEMENT (EA) (MA) (SWA) (SA) (NA)
1. Cyber-squatting. The practice of inhabiting
someone else’s property without their permission
domain names are cheap and are sold on a “first
come, first served” basis.
2. Cyberbullying. Use of cell phones, instant
messaging, e-mail, chat rooms or social networking
sites such as Facebook and Twitter to harass,
threaten or intimidate someone.
3. Cybersex. Involves using the internet for sexual
purposes, especially by exchanging sexual messages
with another person.
4. Child Pornography. Involves images of children
and involved in sex acts. If a man possess videos in
which the camera was focused on the clothed genital
region of young girls.
5. Identity Theft/Stealing One’s Identity. A crime in
which an imposter obtains key pieces of personally
identifiable information in order to impersonate
someone else.
6. Illegal Access to Data. Involves the unauthorized
or illegal viewing, access or retrieval of data by an
individual, application or service.
7. System Interference. Disruption of the
functioning of a computer or a computer network
without right or authority to do so.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 57 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Part III. Ways on How Social Media is Use to Commit Cybercrimes. This
part of the research instrument will determine how the social media is use to
commit cybercrimes.
Direction: Please read and analyze the following statements, then put a
check mark (/) on the space provided that corresponds to your opinion.
Please use the following scales listed below as your guide.
SA - Strongly Agree D - Disagree
MA -Moderately Agree
8. Cyberbullies
9. Providing information about their credit or debit card to use
those cards to purchase different products, items, or services.
Part IV. Ways to avoid being victimized of cybercrime. This part of the
research instrument will determine what the users can do to avoid being
victimized, compromised or exploited in using social media accounts, sites or
networks.
Direction: Please read and analyze the following statements, then put a
check mark (/) on the space provided that corresponds to your opinion.
Please use the following scales listed below as your guide.
(5) EA - Extremely Aware (2) SA - Slightly Aware
5 4 3 2 1
STATEMENT
(EA) (MA) (SWA) (SA) (NA)
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 59 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
TITLE
SOCIAL MEDIA AS USED IN COMMITING CYBERCRIMES
CONFLICT OF INTEREST
Declaration
No conflict of interest.
You are being invited to participate in this study because you qualify as one of the respondents
that could help in the advancement of this research. You are fit in the category of respondents: a
student and a professional that uses social media or social networking sites. This consent form
provides you with information to help you make an informed choice. Please read this document
carefully. If you have any questions, they should be answered to your satisfaction before you
decide whether to participate in this research study.
BENEFITS
The study is expected to be beneficial to those persons who uses social media or social
networking sites as it will provide insights with regards to self-awareness, control and prevention
of the existence of cybercrimes. The study will not only benefit the respondents but also those
who plan to use social media or social networking sites on better understanding of the types of
cybercrimes as to increase their knowledge and which they should avoid. The research may help
in increasing knowledge of the different types of cybercrimes that could reduce the number of
victimization.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 62 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
ONE’S PARTICIPATION
Your participation in this study is strictly voluntary. You will be given 48 hours to decide if you
will participate in the study. You have the freedom to withdraw from this study without penalty at
any time. Participation in this study consists of filing out five (5) questionnaires. Completion of
the questionnaire is anticipated between ten to 15 minutes. Please complete the questionnaires by
giving your rating to each question. There are no right or wrong answers.
RISKS
In answering the questionnaires, psycho-emotional and social of the respondents might be
affected because there might be an impact on the emotions for it may resurface unwanted
feelings. The likelihood of the threat is rated moderate.
CONTACT INFO
If you have further questions or concerns about your participation in this study, or if you suffer
any injury related to the study, please contact:
____________________________ _________________________
Name Telephone
SIGNATURES
● I understand that my taking part is voluntary; I can withdraw from the study at any time
and I do not have to give any reasons for why I no longer want to take part.
● All of my questions and concerns have been answered.
● I understand the information indicated this informed consent form.
● I understand that my participation in this study includes answering a survey
questionnaire.
● By signing this form, none of my legal rights have been given up.
___________________________________ _________________
Signature Over Printed Name of Participant/ Date
Substitute Decision-Maker
___________________________________ _________________
Signature Over Printed Name of Date
Person Conducting the Consent Discussion
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 64 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
ONLY IF the participant is unable to read or requiring oral translation, accomplish this sub-
section:
● This form was accurately explained to, and apparently understood by, the
participant/substitute decision-maker, and
● Informed consent was freely given by the participant/substitute decision-maker.
___________________________________ ________________________
TALLY SHEET
Part I. Demographic Profile. This part deals with the demographic profile of the respondents.
A.
Age 15-19 20-24 25-29 30-34 35-39 40-44 45-49 50-54 Total
IIIII-IIIII- IIIII-IIIII- IIIII-II – IIIII-III - III - 3 IIII - 4 III - 3 IIIII-III - 100
IIIII-IIIII- IIIII-IIIII- 7 8 8
IIIII-IIIII- IIIII-II-
IIIII-IIIII- 27
40
Percentage
40% 27% 7% 8% 3% 4% 3% 8% 100%
Students
Age 15-19 20-24 25-29 30-34 35-39 40-44 45-49 50-54 Total
IIIII-IIIII- IIIII-IIIII- 50
IIIII-IIIII- 10
IIIII-IIIII-
IIIII-IIIII-
40
Percentage
80% 20% 0% 0% 0% 0% 0% 0% 100%
Professionals
Age 15-19 20-24 25-29 30-34 35-39 40-44 45-49 50-54 Total
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 67 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
B.
Sex Male Female Total
IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- IIIII-IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- IIIII-IIIII-I – 41 50
IIII - 49
Percentage
49% 41% 100%
Students
Sex Male Female Total
IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- I - 31 IIIII-IIIII- IIIII-IIII - 19 50
Percentage
62% 38% 100%
Professionals
Sex Male Female Total
IIIII-IIIII- IIIII-IIIII- IIIII-III - 28 IIIII-IIIII- IIIII-IIIII- II - 22 50
Percentage
66% 44% 100%
C.
Civil Status Single Married Widowed/er Separated Total
IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- IIIII- 100
IIIII-IIIII- IIIII-IIIII- IIIII- IIII – 24
IIIII-IIIII- IIIII-IIIII-
IIIII-IIIII- IIIII-I - 76
Percentage
76% 24% 0% 0% 100%
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 68 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Students
Civil Status Single Married Widowed/er Separated Total
IIIII-IIIII- IIIII-IIIII- 50
IIIII-IIIII- IIIII-IIIII-
IIIII-IIIII- 50
Percentage
100% 0% 0% 0% 100%
Professionals
Civil Status Single Married Widowed/er Separated Total
IIIII- IIIII-IIIII- IIIII- IIIII- IIIII-IIIII- 50
IIIII- I – 26 IIIII-IIII – 24
Percentage
52% 48% 0% 0% 100%
D.
Educational Elementary Undergraduate College Graduate Total
Attainment Graduate
Students
Educational Elementary Undergraduate College Graduate Total
Attainment Graduate
Percentage
100% 100%
Professionals
Educational Elementary Undergraduate College Graduate Total
Attainment Graduate
E.
Gadget Used Computers Mobile Tablets Laptops Total
Phones
IIIII-IIIII-IIIII-III – 18 IIIII-IIIII- IIIII- IIII- 4 IIIII-IIIII- 10 100
IIIII- IIIII-IIIII-
IIIII-IIIII- IIIII-
IIIII- IIIII-IIIII-
IIIII-III- 68
Percentage
18% 68% 4% 10% 100%
Students
Gadget Used Computers Mobile Tablets Laptops Total
Phones
IIIII-IIIII- 10 IIIII-IIIII- IIIII- III – 3 III- 3 50
IIIII- IIIII-IIIII-
IIII- 34
Percentage
20% 68% 6% 6% 100%
Professionals
Gadget Used Computers Mobile Tablets Laptops Total
Phones
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 70 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
F.
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 71 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Time Spent 1-2 hours 3-4 hours 5-6 hours 7-8 hours 9-10 hours 11-12 hours Total
IIIII-IIIII- IIIII- IIIII-IIIII- IIIII-IIIII- IIIII-IIIII- I - IIII - 4 III - 3 100
IIIII- II – 22 IIIII-IIIII- IIIII-IIIII- IIII 11
IIIII-IIIII- - 24
IIIII-I - 36
Percentage
22% 36% 24% 11% 4% 3% 100%
Time Spent 1-2 hours 3-4 hours 5-6 hours 7-8 hours 9-10 hours 11-12 hours Total
IIIII-IIIII- II – IIIII-IIIII- 10 IIIII-IIIII- IIII IIIII-III - 8 IIII - 4 II - 2 50
12 - 14
Percentage 24% 20% 28% 16% 8% 4% 100%
Students
Professionals
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 72 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
Time Spent 1-2 hours 3-4 hours 5-6 hours 7-8 hours 9-10 hours 11-12 hours Total
IIIII-IIIII- 10 IIIII-IIIII- IIIII-IIIII- 14 III - 3 I -1 50
IIIII-IIIII-
IIIII-I - 26
Percentage
20% 42% 28% 6% 0% 2% 100%
Part II. Level of Awareness of the Respondents on the Different Types of Cybercrimes
9. Computer-related Forgery.
Forging or counterfeiting the
authenticity of electronic
documents, such as birth 27 44 22 5 2 100 389 3.89 10
certificates and the same to
commit any crime.
10. Computer-related Fraud. Any
dishonest misinterpretation of fact
intended to let another to do or Moderately Aware
refrain from doing something
which causes loss. Examples are 32 49 17 4 0 100 415 4.15 5
variety of internet scams, many
based on phishing and social
media engineering, target
consumers and businesses.
Moderately AwareExtremely
Aware
Students
9.Computer-related Forgery.
Forging or counterfeiting the
authenticity of electronic
documents, such as birth 16 22 6 5 1 50 197 3.94 12
certificates and the same to
commit any crime.
10. Computer-related Fraud. Any
dishonest misinterpretation of fact
Extremely Aware
intended to let another to do or
refrain from doing something
which causes loss. Examples are 23 20 6 3 0 50 219 4.38 4
variety of internet scams, many
based on phishing and social
media engineering, target
consumers and businesses.
Moderately Aware AwareExtremely
11. Libel. Saying or writing
something about the person that
hurts their reputation. 22 18 9 1 0 50 211 4.22 7
Professionals
Document Code: DCAVRKMI-F-URFR
MANUEL S. ENVERGA UNIVERSITY FOUNDATION
Lucena City Document Title: Undergraduate Research Final
An Autonomous University Report
Page No.: Page 76 of 85
DR. CESAR A. VILLARIBA RESEARCH AND Revision No.: 0
Effectivity Date: August 2017
KNOWLEDGE MANAGEMENT INSTITUTE
Prepared by: DCAVRKMI
QUALITY FORM Reviewed by: QMR
Approved by: President
AwareModerately AwareModerately
8.Data Interference. Intentional
damaging of computer data,
electronic document, or electronic
data message, without right. 8 25 15 1 1 50 188 3.76 11
9.Computer-related Forgery.
Forging or counterfeiting the
authenticity of electronic
documents, such as birth 11 22 16 0 1 50 192 3.84 8.5
certificates and the same to
commit any crime.
10. Computer-related Fraud. Any
dishonest misinterpretation of fact
Moderately Aware
intended to let another to do or
refrain from doing something
which causes loss. Examples are 9 29 11 1 0 50 196 3.92 6
variety of internet scams, many
based on phishing and social
media engineering, target
consumers and businesses.
1. Human errors/accidental
Agree
Agree
your account unmonitored. 36 39 11 10 4 100 393 3.93 8
Agree
messages to others. 36 37 10 7 5 100 377 3.77 9
Agree
can affect your computer. 51 34 3 6 6 100 418 4.18 1
5.Malicious applications or
softwares and attacks targeting
Agree
individuals and computers. 46 34 9 6 5 100 410 4.10 2
Agree
people into handling over
37 41 9 5 8 100 394 3.94 7
personal information (such as
banking details and passwords).
7. Not implementing privacy or
Agree
security settings on accounts. 39 39 10 7 5 100 400 4.00 5.5
Agree
8. Cyberbullies 46 32 10 4 8 100 404 4.04 3
Students
1. Human errors/accidental
Agree
Agree
can affect your computer. 25 12 2 6 5 50 196 3.92 1
5.Malicious applications or
Agree
softwares and attacks targeting 18 17 5 6 4 50 189 3.78 2.5
individuals and computers.
Agree
personal information (such as 10 23 5 5 7 50 174 3.48 8
banking details and passwords).
Agree
security settings on accounts. 16 18 5 7 4 50 185 3.70 5.5
DisagreeStrongly Agree
8. Cyberbullies 21 12 6 4 7 50 186 3.72 4
Professionals
1. Human errors/accidental
posts or tweets/unknowing
clicks on phishing links. 20 25 4 1 0 50 214 4.28 7
5.Malicious applications or
softwares and attacks targeting
individuals and computers. 28 17 4 0 1 50 221 4.42 2.5
8. Cyberbullies
25 20 4 0 1 50 218 4.36 5
AgreeStrongly AgreeStrongly
3. Use strong passwords. A
strong password is one that
cannot be easily guessed, or 64 28 6 2 0 100 454 4.54 2
broken by a brute force attack
in a reasonable amount of time.
4. Do not give out your
passwords. Keep the passwords
71 23 5 0 1 100 463 4.63 1
of your various accounts to
yourself.
5. Avoid downloading unknown
applications. The Internet is full
of free software from unknown
Strongly Agree
sources. These kinds of
programs normally carry
malicious applications with it 40 47 11 0 2 100 423 4.23 8
and installing it may infect and
cause serious damage to your
computer.
AgreeStrongly
6. Avoid downloading illegal
contents. Purchase media
contents straight from 54 36 10 0 0 100 444 4.44 4
legitimate sources only, like
iTunes or Amazon.
7. Report any site that shares
pirated contents. If you come
Strongly Agree
Strongly Agree
email promising you vast sums
of money, if you’re suddenly
55 38 6 1 0 100 447 4.47 3
getting told by email that an
account has been jeopardized,
or it seems too good to be true,
it’s probably a virus.
Students
Agree
Refrain from connecting to free
20 19 7 4 0 50 205 4.10 9
Wi-Fi networks from coffee
shops or other public places.
2. Avoid using public
computers for sensitive
Strongly Agree
business. If you’re about to do
some personal transactions like 21 22 7 0 0 50 214 4.28 7
banking or online shopping, do
not do it using public
computers.
AgreeStrongly AgreeStrongly
3. Use strong passwords. A
strong password is one that
cannot be easily guessed, or 33 11 4 2 0 50 225 4.50 2
broken by a brute force attack
in a reasonable amount of time.
4. Do not give out your
passwords. Keep the passwords
35 12 2 0 1 50 230 4.60 1
of your various accounts to
yourself.
5. Avoid downloading unknown
applications. The Internet is full
of free software from unknown
sources. These kinds of
Agree
AgreeStrongly
6. Avoid downloading illegal
contents. Purchase media
contents straight from 30 14 6 0 0 50 224 4.48 3
legitimate sources only, like
iTunes or Amazon.
7. Report any site that shares
pirated contents. If you come
Strongly Agree
across websites that shares
illegal contents, contact your
25 17 7 1 0 50 216 4.32 6
ISP or local government units
responsible for handling such
kinds of issues and report these
kinds of illegal activities.
AgreeStrongly
8. Back up your files, regularly.
It won’t prevent you becoming
a victim but it will limit the 26 17 6 1 0 50 218 4.36 5
damage such a cyberattack
could inflict on you.
9. Use common sense. If you
don’t know the sender of an
Strongly Agree
email promising you vast sums
of money, if you’re suddenly
27 18 4 1 0 50 221 4.42 4
getting told by email that an
account has been jeopardized,
or it seems too good to be true,
it’s probably a virus.
Professionals
AgreeStronglyAgree Strongly
3. Use strong passwords. A
strong password is one that
cannot be easily guessed, or 31 17 2 0 0 50 229 4.58 2
broken by a brute force attack
in a reasonable amount of time.
Strongly Agree
of free software from unknown
sources. These kinds of
programs normally carry 19 25 6 0 0 50 213 4.26 9
malicious applications with it
and installing it may infect and
cause serious damage to your
computer.
6. Avoid downloading illegal
Strongly Agree
contents. Purchase media
contents straight from
24 22 4 0 0 50 220 4.40 4.5
legitimate sources only, like
iTunes or Amazon.
Strongly Agree
email promising you vast sums
of money, if you’re suddenly
28 20 2 0 0 50 226 4.52 3
getting told by email that an
account has been jeopardized,
or it seems too good to be true,
it’s probably a virus.