Awareness and Preparedness of Internet Users To Deal With Threats of Cyber Crime at Barangay Kibudoc, Matalam, Cotabato
Awareness and Preparedness of Internet Users To Deal With Threats of Cyber Crime at Barangay Kibudoc, Matalam, Cotabato
SEPTEMBER 2021
1
2
TABLE OF CONTENTS
PRELIMINARY PAGE
Title Page 1
Acceptance of Thesis
Biographical Data
Acknowledgement
Table of Contents 2
List of Figures
List of Tables
List of Appendices
Abstract
INTRODUCTION 4
Theoretical Framework 8
Conceptual Framework 8
METHODOLOGY 14
Research Design 14
Sampling Procedure 15
Research Instrument 15
Statistical Analysis 17
LITERATURE CITED 18
APPENDICES 19
Questionnaire 19
3
UNIVERSITY OF SOUTHERN MINDANAO
Kabacan, Cotabato Philippines
Date Date
Date
Date Date
Study No:
Index No:
Recorded by:
RECORDED:
Date
Recorded by:
USM-EDR-F05-Rev.4.2020.11.16 ii
TABLE OF CONTENTS
PAGES
PRELIMINARY
APPROVAL OF THESIS OUTLINE..................................................................ii
LIST OF APPENDICES................................................................................... iv
INTRODUCTION.............................................................................................. 1
Research Questions................................................................................... 6
Theoretical Lens......................................................................................... 7
Concept of Suicide.................................................................................... 13
Motivation to Suicide................................................................................. 16
Suicide Notes........................................................................................... 17
METHODOLOGY........................................................................................... 25
Research Design...................................................................................... 25
Data Collection......................................................................................... 26
Data Analysis............................................................................................ 27
Validity...................................................................................................... 27
Ethical Consideration................................................................................ 29
iii
LITERATURE CITED.................................................................................... 30
APPENDICES................................................................................................ 33
CURRICULUM VITAE................................................................................... 41
iv
LIST OF APPENDICES
INTRODUCTION
Begun and held in Metro Manila, on Monday the Twenty-fifth day of July
two thousand eleven. Republic Act No. 10175 an act defining cybercrime,
penalties therefor and for other purposes, also known as the “Cybercrime
Finally an act that is suitable for this modern era. An era where
smartphones and gadgets are almost used by every citizen. Where everything
internet. Does it cause harm to us, or are we even aware about the harm we
might cause to the others. Right now cybercrime are so rampant because of
our own ignorance about it. People not being aware of what they’ve been
Currently, this law is somehow effective as it lessens the crime rate for
to
learn more about the causes and effects of cybercrime and the level of
Internet/social media users- This study will help them be aware of what is
cybercrime, what causes cybercrime, what will be it’s effects on them and how
Parents- The study may help them know if their child is currently suffering
Future researchers- In case someone will be doing the same research this
transmit, or manipulate
No. 10175, is a law in the Philippines that was approved on September 12,
2012. It aims to address legal issues concerning online interactions and the
the bill are cybersquatting, cybersex, child pornography, identity theft, illegal
Conceptual Framework
CyberAwareness
Crimes
Preparedness Policy
Or
Independent variable Dependent variable
Knowledg e on
cybercrimes
Awareness raising Barangay based
Factors in
about cybercrime
determining the policy
Preparedness/ the local based policy
outcome
ability to respond
Demographic
characteristics
Preparedness of Internet users in dealing with cyber crime threats and it’s
Barangay Kibudoc,Matalam,Cotabato.
REVIEW OF RELATED LITERATURE
Definition of Cybercrime
known as computer crime, is the use of computers as a tool for other illegal
in order to gain insight and insight into the problem. Here are some of the
organization-based definitions:
Philippines. It aims to address legal issues related to online interaction and the
and defamation.
also called subordinate crime (or" pure "cybercrime) and can only be
actions
include the spread, hacking, and distributed denial of service (DDoS) attacks of
These are part of the definition of cybercrime to help you adequately address
ourselves.
Types of Cybercrimes
Jigsaw Academy has classified the types of cybercrime into 20 different types:
by attacks 12. Phishing attacks 13. Spear phishing attacks 14. Whale fishing
attacks 15. Malware 16. Ransomware 17. Trojan 18. Teardrop Attack 19. Ping
human trafficking.
scams to trick people into leaking information. You can also use malicious
This is the most common cybercrime, but the most serious. Crime
countries.
Reality of Cybercrimes
lot of technical know-how and collaboration at home and abroad. This crime
affects different countries to varying degrees, depending on the level of law in
the assault? Will guardians manage the culprits of cybercrime? Are there any
roused culprits? The nation is associated with the internet, so we should know
and be ready. In case we are not the objective of an assault, we really want to
realize that we can have wrongdoing or assault. This is on the grounds that
regardless of whether the assailant isn't close to the PC they are utilizing.
innovation and secrecy advance on the web, the seriousness and number of
cybercrimes will build step by step. In any case, cybercrime is a danger to all
spaces of society all throughout the planet. Privately owned businesses like
dangers.
Karla T. Cabel (2019) reports that cybercriminals positioned in one nation can
The number of zero days being exploited in the wild is “off the charts,” Corellium
COO Matt Tait warned during Black Hat 2021 cited by Waldman (2021).
According to his keynote, the number of zero days being detected and exploited
in the wild is the highest it has been in eight years. Tait attributed the tremendous
increase to the offense taking off the gloves. In which it means this is both in the
government sector, doing espionage, and in the financially motivated crime ware
industry, ransomware. It’s getting to the point now where it’s beginning to
overwhelm our ability to respond in the defensive sector. It is definitely true that
the rapid growth in our technology made great progress making everything faster,
process things faster and made our communication much more easier and
convenient. Thus, all this advancements didn’t only stop there and because of it
we are also constan9 inviting dangers awaiting to be discovered. Just think about
all the data that we’ve been uploading on the internet. Makes it already extremely
beneficial for those who have criminal minds, because it would be much easier for
(2021). Exposed servers that are poorly maintained, and in some cases left
untouched for months, are the best points of entry for hackers. Cyber crimes
although it seems to not pose an extreme threat to the real world considering it
only happens virtually through the internet, made the people think that it’s ok and
it doesn’t need to be extra cautious about it. And that’s where it all happens,
neglecting a crime because of that mind set made it even more dangerous, this
tend to create a false sense of security that makes people to be a bit complacent
when going on line. This ignorance by those internet users of the dangers lurking
out there in the cyber space can cost an organization as well as the individual
dearly.
attacks or commission to become clear. The awareness makes it easier for the
an internet user doesn’t exempt a person safe from being a victim or committing
the crime themselves. Ignorance of the law doesn’t exempt those who aren’t
aware just because they didn’t know for themselves that they have committed a
awareness in this research is that the user is aware of various forms of computer
crimes and their mitigations. An informed internet user will have a greater capacity
better and safer internet browsing free from computer related crimes with
maximize his potential to deal with cyber threats while minimizing the cost that is
bound to arise from a successive attack. Computer users should be pro- active
when dealing with cyber threats rather than being re – active. They should be in a
position to detect the threat before intrusion or occurrence of the event; being pro-
active means that they have taken the necessary measures to safeguard
themselves
prevent the attacks or security breaches. They should have the necessary and
place. Thus in this research what we aim to find out is whether individual users
have any awareness at all about computer crimes as well as whether they are
prepared at all
Chapter III
METHODOLOGY
Research Design
assessing the awareness and preparedness of the internet end user in dealing
with risks of computer crimes; since it is considered the most appropriate. This
is given the fact that the researcher will have no intention of influencing the
various variables in this research. Descriptive Research have the ability to give
room for finding for more information, exploring new ideas and at the same time
observation and interpretation, and this is what this study is intending to do.
15
Respondents of the Study
Sampling Procedure
Research Instrument
The research instrument that the researcher will be using is adopted from
Cybercafé Internet Users to Deal with Threats of Cyber Crime” 2014 study
with the demographic information about the respondent, section B has nine
respondent. Section C have a total of twenty eight questions which were used
computer crimes and online behavior. In this section each item is measured on
The scale has two extreme end points of “strongly agree” (5) to “strongly
randomly selecting the youths or adolescents within Kibudoc that has access to
researcher will ask for permission to carry out the study in the barangay SK
officials. This will be performed through a house to house visit to the target
respondents as well as a mass call out to the youth in our barangay to be done
administered to the who were also selected randomly. Those selected are first
requested to answer the questionnaire and in the process the purpose of the
questionnaire will be given to them. Those who are not willing to take part in the
research are left out. The exercise is expected to be done within three weeks
time, since consents and the presence of the respondents shall be considered
Data coding will be done in order to ease the derivation summaries and
meaning from it. The data collected will be analyzed using Statistical Package
for Social Scientist software version 20.0 and Excel. The data will be presented
Descriptive Statistics generally provide a powerful summary that can allow for
these values are noted; For conclusions to be able to be drawn. The purpose of
using frequency tables, means and percentages is to make the work of drawing
RESEARCH QUESTIONAIRE
3. Age in years: 18 – 22 [ ], 23 – 27 [ ], 28 – 32 [ ],
33 – 37 [ ], Above 38 [ ]
No. Statement SD D A SA
ACC1 I have no problem sharing my password
with someone else.
ACC2 I have no problem if someone is looking
over my shoulder as I key in my
password.
ACC3 I should use the same password for
different accounts.
ACC4 I should have authentication before
accessing information in my computer.
ACC5 I have no problem with unauthorized
copying of data or information.
2.3 Exposure to Awareness Raising (EAR)
No. Statement SD D A SA
EAR 1 I have been getting information on
computer-related threats and crime from
the media
EAR 2 There is need to attend formal training in
computer to be able to avoid computer
crimes
EAR 3 Institutions of learning should make it
mandatory to learn about computer
crimes
EAR 4 I have no problem downloading Free
Software and then copying the same to
a friend.
EAR 5 It is important to control the access of
others to my computer by using different
User Account.
EAR 6 All web sites should block my account
when they see a large number of failed
login attempts.
Part III - Preparedness to Cyber Crime threat
3.1 Preparation to Respond (PR)
No. Statement SD D A SA
PR 1 I should only have Genuine operating
system installed on my computer.
PR 2 Firewalls and antivirus should be
necessary features in my personal
computer (PC) whenever going online.
PR 3 I should update both the antivirus and
operating system installed in my PC at
all times.
PR 4 Apart from the antivirus installed in my
PC, another kind of security program
should be added.
PR 5 I should do a full system anti-virus scan
on my PC at least once in a week.
PR 6 I need to backup my data regularly so as
to avoid data loss in case of a computer
crash.
Types of cybercrime
Identity theft
Phishing
Malware
Security hacker
Cyberstalking
Ransomware
Cyberbullying
Denial-of-service attack
Botnet
Cyberterrorism
Spamming
Computer virus
Logic bomb
Email spoofing