Computer Hacking Related To Fraud of Records
Computer Hacking Related To Fraud of Records
A Thesis Submitted In Partial Fulfilment for The Requirements of the course Statistics (MAT 3)
By Ayllon, Steven Charles Cabutaje, Valery Gammad, Milette Lazaro, John Paul Ligsay, Robin Ramos, Cathryn Silva, Ma. Regina -09166363175 -09321629941 -09275673456 -09166399201 -09058168335 -09234517513 -09155428887
to
Title:
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creators original purpose. People who engage in computer hacking activities are often called hackers. Since the word hack has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. Hacking is most common among teenagers and young people, although there are many older hackers too. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking as an form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. Its a chance to demonstrate their abilities, not an opportunity to harm others. Since a large number of hackers are self-taught prodigies, but there are some organizations who actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the companys security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.
Background of the Study Computer hackers have existed almost as long as computers. In fact, "hackers" have been in existence for more than a century. In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off a telephone system in New York. The BOYS were more interested in knowing how the phone system worked than IN making proper connections and directing calls to the correct place. In essence, they were trying to "hack" the system to see how it worked. One might not suspect that the art, computer hacking was created at one of the havens for technological excellence. Students developed the technique and borrowed their name from the "hackers" of the late 1800s who found amusement in pranking the emerging telephone companies. Getting their laughs and skills from hacking and cracking into primitive computers and exploiting the Arpanet (predecessor to the internet), they created a novelty that would become the target of federal crackdown in years to come. To define hacking in short, we can say that an artistic criminal offense of breaking into another remote system without the owner's consent for the purpose of stealing information is what is hacking. However, the act of hacking started out innocently, and was basically a method of trying to figure out how computer systems worked. The 1970s saw the rise in "phreaking," or phone hacking, headed by John Draper. This method allowed the user of a "blue box,", when used with a Captain Crunch whistle of 2600 hertz which accessed the AT&T long distance
system, to make free long distance calls. Hackers initiated with accessing the free phone calls through a varied range of sources, thereby managing to circumvent into the nation's radio system and the phoning system resulting in a tremendous phone fraud nationwide. After the age of "phreaking," computers became not only the target, but also the forum, for a growing hacker population to communicate. The creation of bulletin board systems (BBS) allowed this communication and the technological possibility of more serious government and credit card hacking became possible. At this time in the early 80's, hacking groups such as the Legion of Doom began to emerge in the United States, giving organization, and thus more power to hackers across the country. Once this happened, breaking into the computers became a legitimate activity, with its own groups and soon its own voice with the 2600 magazine, launched in 1984. The effects of computer hacking were serious. Two years later, inevitably, Congress launched the Computer Fraud and Abuse Act that outlawed hacking. Over the years, there was a series of noticeable occurrences as the worst consequential effect of computer hacking on more high profile cases, such as the Morris Worm, responsible for infecting government and university systems, and the Mitnick case in 1995, which captured Kevin Mitnick, steeling as many as 20,000 credit card members.
Scope and Limitation of the Study The study aims to help computer users from being hacked by unauthorized people. The data gathered by the researchers will be used to help people from hackers. The result of this study will be a solution to the problem of the society.
Statement of the Problem This study is about the awareness of computer users of Our Lady of Fatima University about hacking of different information. Is it safe to give your account number in the internet? Respondents Profile: Age Course Gender The study will answer the following questions:
1. Do you use computer? 2. Do you have to access to the Internet when you use computer? 3. Do you believe online banking is secure enough to input credit card
details?
4. Does the word Hacking put you off from banking?
poverty?
6. Has your computer ever been hacked? 7. Does the systems security of banks are enough to prevent hackers? 8. Is computer hacking a crime? 9. Do you think computers are invented for bad things? 10. Do computer hacking also have good effects?
Problem: Is there a significant difference between computer hackers and computer literates? FACTUAL DATA:
Age Course
Gender Alternative Hypothesis: Why computer hackers destroy system and get information?
Significance of the Study The result of this study will help the computer users to be aware and careful on how to prevent hackers. The following will be helpful to our knowledge:
PREVENTING HACKING HACKER TRICKS AND PREVENTION TECHNIQUES In movies or TV series where hackers are involved, we may have seen them apply their computer knowledge in order to perform certain hacker tricks that saved the day. Swordfish", hackers have been able to elevate themselves to the level of heroes with only a keyboard and a mouse. However, hackers attacks and hacker prevention is more difficulty, and complex, in real life. Hollywood has a tendency to oversimplify things so the general public can understand them. After all, only a small percentage of the population has enough skills to perform this kind of demonstrations. So, if you want to prevent hacking there are some basics that need to be learned first.
TRICKS AND TECHNIQUES USED BY HACKERS TO ATTACK The first most common technique used technique used by hackers is scanning. Hackers have created tools that scan computers for weak spots.
It can be an operating system that hasn't been upgraded or a port in the computer that it is open without the knowledge of the user.
Hackers use this "open window" to get inside your computer in order to do whatever they want to do. The interesting thing about this is that these hacker tools are available for free in the Internet. So, with a couple of hours of instructions, almost every computer user can become a hacker. Another way that hackers can access your machine is through malware: programs designed to capture vital information from your computer, like login users and passwords. Malware could be hidden in a PowerPoint presentation sent by email or even in an innocent Instant Messenger message window.
HOW TO PREVENT HACKER ATTACKS Hackers are always looking for a way to get into computers of other persons. It can be something as simple as phishing confidential information (like credit card or bank account numbers) to complex hacking routines that use your computer as a repository for illegal content (like music or movies with copyright). Unfortunately there is no magical software to prevent hackers; and it will never exist. It doesn't matter how much money or resources you invest in designing the perfect system, someone will find the way to crack it. Even the biggest government agencies like NASA, CIA and NSA have been
victims of hackers. And the same thing happens in the private sector with companies like Citigroup or Wal-Mart.
EFFECTIVE WAYS TO STOP HACKERS So, what can you do to protect your tiny machine from hacker tricks? Fortunately, there are some measures that we can take, and it doesn't require us to be a Neo or Hugh Jackman's character from the movie "Swordfish". These hacker protection tips are simple and effective and will defined you from most of the attacks.
OS UPDATES The first thing to do in computer hacking prevention is to assure yourself that all your software is up to date; especially your operating system and your web browser. Why? Because they are the two things that hackers will try to attack first if they want to get into your computer.
FIREWALL The second thing that you need to do is to install a firewall. As a matter of fact internet firewall hacker protection has become so necessary that Microsoft now ships it for free as part of their Windows XP operating system. It took them some years to admit it, but the truth is that their software was an easy target for the hackers and crackers that lurked through the World Wide Web.
In case you don't want to use Windows XP firewall, there are many alternatives in the market. Companies like Symantec and Zone Labs have produced software firewalls for some time and have become a necessity for all the computers of corporate America. If you don't know which one you want to buy, use the trial periods. Usually you can use the firewall for 15 to 30 days; that amount of time is more than enough to make your decision. The next step in security is to have an antivirus installed. There are free versions like AVG antivirus, or pay per year licenses, like Norton Antivirus (also from Symantec). As in the case of firewalls, there are many varieties available in the market; use the trial periods for choosing wisely.
ANTI SPYWARE/ADWARE There is the anti-spyware program. As if viruses were not enough, companies from around the world decided to create programs that could pick up data from your computer in order to acquire information for their databases. It may not be as dangerous as a virus, but it is an intrusion to your privacy. Wipe them out with this piece of software. Nowadays hacker prevention has become a task for all of us. No longer is it the responsibility of the system administrator of our company. After all, he can install all the security of the world in the company's network, but if you let a virus in because of your carelessness, he won't be able to stop it. The same goes for your computer at home. You are the only one responsible for it. Remember that new hacker tricks appear as each day goes by, so you need to be prepared.
TYPES OF HACKERS 1. BLACK HAT HACKER They are also called "crackers", are hackers who specialize in unauthorized penetration. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization and hence they should not be confused with ethical hackers. They also may distribute computer viruses, Internet worms, and deliver spam through the use of botnets. The term may also refer to hackers who crack software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, date checks, CD check (NO-CD) or software annoyances like nag screens and adware. 2. WHITE HAT HACKER White hat hackers, also known as "ethical hackers," are computer security experts, who specialize in penetration testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called "sneakers." Groups of these people are often called tiger teams or red teams. These security experts may utilize a variety of methods to carry out their tests, including social engineering tactics, use of hacking tools, and attempts to evade security to gain entry into secured areas. The National Security Agency offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team
management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.
Co relational Variables Independent Variable Poverty Computer Literature Fraud of Records Number of Hacker Security Cost Hack Dependent Variable Crime Hacking Bankruptcy System Damage System Lost Damage Cost
Chapter 2 Review of Related Literatures Computer hackers have existed almost as long as computers In fact, "hackers" have been in existence for more than a century. In 1878, just two years after the telephone was invented by Alexander Graham Bell, a group of teenage boys hired to run the switchboards were kicked off of a telephone system in New York.
Originally, "hacker" did not carry the negative connotations now associated with the term. In the late 1950s and early 1960s, computers were much different than the
desktop or laptop systems most people are familiar with. In those days, most companies and universities used mainframe computers: giant, slow-moving hunks of metal locked away in temperature-controlled glass cages. It cost thousands of dollars to maintain and operate those machines, and programmers had to fight for access time. Because of the time and money involved, computer programmers began looking for ways to get the most out of the machines. The best and brightest of those programmers created what they called "hacks" - shortcuts that would modify and improve the performance of a computer's operating system or applications and allow more tasks to be completed in a shorter time.
Not until the early 1980s did the word "hacker" earn disdain, when people like Kevin Mitnick, Kevin Poulsen and Vladimir Levin (more on them later) began using computers and the internet for their own questionable gains. Still, for all the negative things hackers have done, I believe they provide a necessary (and even valuable) service, which I'll elaborate on after a brief timeline of some of the high points (or low points, depending on how you look at it) in the history of computer hacking.
A computer hacker is someone who lives and breathes computers, who know all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money. (It's okay to make money, but that can't be the reason for hacking. A hacker is a stereotypical person who breaks into computers and computer networks, either for profit or motivated by the challenge. The subculture that has evolved around
hackers is often referred to as the computer underground but is now an open community. Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an art form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. Its a chance to demonstrate their abilities, not an opportunity to harm others.
Computer Hacking: A Timeline 1971: Computer hobbyist John Draper discovers that a toy whistle included in a box of children's cereal reproduces exactly the 2600-hertz audio tone needed to open a telephone line and begin making free long-distance calls. He adopts the moniker "Captain Crunch," after the cereal and is arrested dozens of times in the next few years for phone tampering. 1975: Two members of the Homebrew Computer Club of California begin making "blue boxes," devices based on Draper's discovery that generate different tones to help people hack into the phone system. Their names? Steve Wozniak and Steve Jobs, who would later go on to found a company called Apple Computers in 1977.
1983: The movie "War Games," starring Matthew Broderick, is released in theatres. Broderick plays a teenage hacker who taps into a Pentagon supercomputer nicknamed "WOPR" and nearly starts World War III. (WOPR is a spoof of NORAD's old central computer processing system, which had the acronym "BURGR.")
In one of the first high-profile cases against computer hackers, the FBI arrests six teenagers from Milwaukee known as the "414s," named after the city's area code. They are accused of breaking into more than 60 computer networks, including those of Memorial Sloan-Kettering Cancer Centre and Los Alamos National Laboratory. One hacker gets immunity for his testimony; the others are given probation.
1984: Eric Corley begins publishing an underground magazine called 2600: The Hacker Quarterly, which quickly becomes a clearinghouse for telephone and computer hacking. The following year, a pair of journalists from St. Louis begins publishing Phrack, an electronic magazine that provides hacking information. The Comprehensive Crime Control Act is passed, which gives the Secret Service jurisdiction over cases of credit card and computer fraud. 1986: Congress passes the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act, which makes it a crime to break into computer systems. In typical congressional fashion, the law doesn't apply to those individuals largely responsible for computer crimes - juveniles.
1987: Herbert Zinn, a 17-year-old high-school dropout who lives with his parents in Chicago and goes by the nickname of "Shadow Hawk," is arrested and admits to breaking into AT&T's computer network after bragging about it on an electronic bulletin board. Federal authorities say the teenager - who did most of his hacking from a computer in his bedroom - was only a few steps away from tapping into the company's central telephone switching system, which could have brought most of the nation's telephone networks and communications systems to a standstill.
Brain, the first known MS-DOS computer virus, is released on the internet. The program itself is mostly harmless; users whose computers are infected with the virus find a small file added to their hard drive containing an unencrypted text message giving contact information for a "Brain Computer Services" in Pakistan.
1988: Robert Morris, a 22-year-old graduate student from Cornell University releases a self-replicating virus on the Internet designed to exploit security holes in UNIX systems. The virus eventually infects more than 6,000 systems - roughly one-tenth of the Internet's computers at the time - and virtually shuts down the entire network for two days. Morris is arrested for releasing the virus and is sentenced to three years probation, 400 hours of community service and a $10,000 fine. Despite the online havoc he wreaks, he's more than absolved by the Internet community; he later forms a start-up internet company, via web, which is bought in 1998 for approximately $49 million. As a result of the Morris virus, the federal government forms the Computer Emergency Response Team. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate attacks on computer networks.
1989: Five West German computer users are arrested on espionage charges after an administrator at UC Berkeley detects and tracks their intrusions into U.S. government and university computer systems. The hackers are charged with selling information and software to the KGB; three are convicted and sentenced to prison terms, but none of the hackers ever spends any time behind bars.
In a separate incident, a hacker who goes by the name of "The Mentor" publishes a now-famous treatise on hacking, The Conscience of a Hacker. The work ends with the line: "You may stop this individual, but you can't stop us all."
1990: Four members of a band of hackers from the South-eastern United States affectionately known as the "Legion of Doom" are arrested for stealing the technical specifications for BellSouth's 911 emergency telephone networks. The hackers are accused of lifting login accounts, passwords and connect addresses for its computer networks, information that could "potentially disrupt or halt 911 service in the United States," according to a subsequent indictment. Three of the hackers are found guilty and given prison sentences ranging from 14 to 21 months; they are also ordered to pay BellSouth nearly a quarter of a million dollars in damages. The Secret Service, in conjunction with Arizona's organized crime unit, unveils Operation Sun devil, a nationwide project designed to hunt down computer hackers. They eventually seize computer equipment in 14 cities, including Tucson, Miami and Los Angeles. The Electronic Frontier Foundation is created, with the primary goal of defending the rights of people accused of computer hacking. 1991: The General Accounting Office reveals that during the Gulf War, a group of Dutch teenagers broke into a Defense Department computer network and gained access to "sensitive" information on war operations, including data on military personnel, the amount of military equipment being sent to the Persian Gulf, and the development of certain weapons systems.
1993: After hackers break into AT&T's computer networks and bring long-distance telephone service to a halt on Martin Luther King Jr. Day, the Secret Service initiates a national crackdown on computer hackers, arresting members of a group titled "Masters of Deception" in New York, and other hackers in St. Louis and Austin, Texas. The members all plead guilty of computer crimes and conspiracy. Twenty-eight-year-old Kevin Poulsen, who was already facing charges for stealing military documents and disrupting telecommunications services, is charged along with two other hackers, of using computers to rig promotional contests at three Los Angeles radio stations. In a rather ingenious scheme, Poulsen and his cohorts use computers to seize control of incoming phone lines at the radio stations and make sure that only their calls get through. The three hackers wind up "winning" two Porsches, $20,000 in cash and two trips to Hawaii before being caught.
1994: Two hackers (known as "Data Stream" and "Kuji") break into several hundred computer systems, including NASA and the Korean Atomic Research Institute. After a lengthy manhunt, detectives from Scotland Yard finally corral "Data Stream," a 16-yearold boy who curls up in the fetal position and cries when captured. A temporary worker at British Telecom breaks into a computer network that contains a number of highly sensitive telephone numbers, including those of the Queen, Prime Minister John Major, and several top-secret military installations, all of which are then posted live on the internet.
1995: Russian hacker Vladimir Levin is arrested in Britain after allegedly using his laptop computer to break into Citibank's computer network and transfer funds to various accounts around the world. Levin is eventually extradited to the U.S., where he is
sentenced to three years in prison and order to pay Citibank $240,000. The exact amount of money stolen by Levin remains unknown; estimates range between $3.7-$10 million. Legendary computer hacker Kevin Mitnick is arrested in Raleigh, North Carolina and accused of a number of security violations, such as copying computer software, breaking into various networks and stealing private information, including 20,000 valid credit card numbers. He spends four years in jail without a trial, and then pleads guilty to seven counts in March 1999 before finally being released on parole in January 2000. Mitnick had previously been convicted of stealing software and long distance telephone codes from two telecommunications companies in 1989.
1996: The General Accounting Office release a report that states that hackers attempted to break into Defense Department files more than 250,000 times in 1995 alone; about 65 percent of the attempts were successful. In August, hackers defame the U.S. Department of Justice website, adding swastikas, obscenities and a picture of Adolf Hitler to the site and renaming it the "Department of Injustice." The following month, a group called the Swedish Hackers Association breaks into the CIA's website, altering the front page's look and changing the organization's name to the "Central Stupidity Agency." 1997: The hacking program "AOHell" is released, aimed at wreaking havoc for users of America Online. For days, the AOL network is brought to a virtual standstill, as hundreds of thousands of users find their mailboxes flooded with multiple-megabyte email messages and their chat rooms disabled or disrupted with "spam" messages.
1998: The Symantec Antivirus Research Centre, a leader in security and antivirus software, reports that 30,000 computer viruses are circulating "in the wild" on the internet. For the first time, federal prosecutors charge a juvenile with computer hacking after a boy shuts down the Bell Atlantic airport communications system in Worcester, Massachusetts. The boy's attack interrupts communications between airplanes and the control tower at Worcester Airport for more than six hours, but no accidents occur. The boy, whose name and exact age are not released, pleads guilty and is sentenced to two years probation, 250 hours of community service, and is ordered to repay Bell Atlantic $5,000. Members of a hacking group called the Masters of Downloading claim to have broken into a Pentagon network and stolen software that allows them to control a military satellite system. They threaten to sell the software to terrorists. The Pentagon denies that the software is classified or that it would allow the hackers to control their satellites, but later admits that a less-secure network containing "sensitive" information had been compromised. Deputy Defense Secretary John Hamre announces that hackers have carried "the most organized and systematic attack the Pentagon has seen to date" by breaking into unclassified computer networks, then viewing and altering payroll and personnel data at dozens of federal agencies. Two teenagers from Cloverdale, California are originally implicated. Three weeks later, authorities arrest an Israeli teenager known as "The Analyzer," who claims to have taught the two Californians how to conduct the attacks.
Two hackers are sentenced to death by a court in China for breaking into a banks computer network and stealing 260,000 yuan ($31,400). U.S. Attorney General Janet Reno announces the creation of the National Infrastructure Protection Center, an organization designed to protect the nation's telecommunications, technology and transportation systems from hackers. In May, members of "L0pht," a well-known hacker group, testify before Congress. They cite serious security weaknesses in many of the government's computer networks; one member claims that if the group wanted to, it could shut down the entire internet in half an hour. Two "internet terrorists" defame the New York Times website, renaming it "Hackers for Girls" and expressing anger at the arrest of Kevin Mitnick, who was the subject of a book written by a reporter at the Times. The hackers group Legion of the Underground (LoU) breaks into China's human rights website in October and replaces the front page with a message asking consumers and businesses to boycott all Chinese goods and services. A few months later, LoU issues a statement declaring a "cyber war" on Iraq and China calling for "the complete destruction of all computer systems" in those countries.
1999: In March, a hacker by the name of MagicFX breaks into the popular online auction site E-Bay, destroying the site's front page. According to the company, the attack was so severe that MagicFX was able to change auction prices, post fake items for sale, and divert traffic to other sites. Throughout May and June, dozens of government and consumer sites, including those of the U.S. Senate, the White House and the U.S. Army, fall prey to cyber-attacks. In
each case, the hackers defame the site's front page with arcane messages that are quickly erased. In November, a Norwegian hacker group, MoRE (Masters of Reverse Engineering), cracks a key to decoding copy-protected DVDs. The group creates a DVD decoder program, which is widely distributed for free on the internet.
2000: The Symantec AntiVirus Research Center estimates that one new computer virus "enters the wild" every hour of every day. In a 72-hour period in early February, more than a dozen of the internet's most popular websites, including Yahoo, Buy.com, Amazon.com, E-Bay, CNN.com, eTrade and ZDNet, are hacked via "denial of service" attacks that overloaded the sites' servers with an overwhelming number of information requests. The "I Love You" virus debuts on the Internet in May, appearing first in the Philippines, then spreading across the globe in a matter of hours. It causes an estimated $10 billion of damage globally in lost files and computer downtime before a solution is found. The trade publication Computer Economics estimates that computer viruses will cost companies a total of $17 billion worldwide in ruined or lost data and lost production time. A study released by PC Data in the summer reveals an alarming trend: although most people have some type of antivirus software on their personal computer, almost 45 percent of those who log onto the Internet regularly still don't have that software engaged, even if it's installed. In effect, this leaves nearly half of all home computer users exposed and vulnerable to attack from a virus.
In October, in what many people see as a fit of poetic justice, software giant Microsoft admits to having its computer network infiltrated by a hacker (or hackers) from Russia. According to company statements, the hacker(s) used a Trojan horse program to create a surreptitious e-mail account and were able to access the source code of an as-yetunnamed Microsoft product still being developed. Microsoft security experts later admit they were able to track the movements of the hacker(s) throughout their network but were unable to actually catch them in the act.
2001: In early May, groups of Chinese hackers infiltrate several U.S. government sites, including those of the White House, the Central Intelligence Agency, and the Department of Health and Human Services. The attacks are believed to be a form of retaliation for an incident involving a U.S. spy plane earlier in the year.
Chapter 3 RESEARCH METHODOLOGY A research methodology defines what the activity of research is, how to proceed, how to measure progress, and what constitutes success. This chapter presents the research design, respondents of the study, sampling technique, instruments to be used, procedure of the study and the statistical treatment to be used in the study.
Research Design
This study investigated the problem of computer fraud that afflicts students in the school in the contemporary environment. The criminal activity associated with the use of computers is a multifaceted problem. First, the technology involved is so esoteric to many people and organizations that it is difficult for them to recognize a computer related crime when it occurs. Second, many organizations are reluctant to report such crimes, for fear that they will become a target of other computer criminals against which they frequently feel that they have few defenses. Third, many, perhaps most, organizations do not know how to proceed with the establishment of effective computer security systems. Fourth, much of the technical hardware and software required for adequate computer security systems either is too complex or is priced too high for many organizations. Fifth, computer technology and techniques change so rapidly that an adequate security system today is an inadequate one tomorrow. The descriptive strategy is not concerned with relationships between variables but rather with the description of individual variables. The goal is to describe a single variable or to obtain separate descriptions for each variable when several are involved. The descriptive method is designed for the investigation to gather information about present, existing condition. It involves collecting data in order to test the hypothesis or to answer the questions concerning current status of the subject of the study.
Respondents of the Study The respondents play a major role in research. Data gathering procedure will be insufficient without the respondents and instruments to be used in the study. The participants in this study are students in Our Lady of Fatima University from all year level. The researchers will randomly select 100
students of Our Lady of University. The proponents selected randomly different kinds of courses because since their subjects are to more expose in this topic and they know how computer fraud that afflicts students in use of computers.
Sampling Technique For the intensive evaluation of the gathered data, the researchers used the statistical treatment. To assess the profile of the respondents that includes the respondents name, age, gender, civil status. Sampling is the part of statistical practice concerned with the selection of individual observations intended to yield some knowledge about a population of concern, especially for the purposes of statistical inference. The study selected samples that are certain and necessary only for the purpose of this study, thus, non-probability sampling will be used. Furthermore, the kind of non-probability sampling that will be utilized is quota sampling wherein the respondents are only composed of one hundred different courses student in our lady of Fatima university . This is a convenient technique which allows the researchers to choose their sample among the students who are available and willing to cooperate in the process of data gathering of the researchers.
Instrument to Be Used The principal instrument that will be used in this study is the questionnaire designed by the researchers based on the variables presented by the proponents.
The questionnaire is composed of ten (10) questions. The researcher made questionnaire that will used to gather needed information for this study. Because of the distance of most of the researchers, the examiners constructed a group with the use of the latest social networking sites that includes this questionnaire and other documents needed to finish this study. This questionnaire or instrument has four parts: the first part involves the profile of the respondents that includes the respondents name, age, gender, civil status. The second part involves the student answered if they used computer and if they know how computer hacker how affect them.
Procedure of the Study The researchers proposed a topic that is related to their course and their interests. They research about computer hacking ,Computer Hacking discusses computer hackers and hacking and ethics, including both the ethics of hackers who hack for positive reasons (White Hats) and those who hack for what are considered harmful reasons (Black Hats). To gather the necessary data and information needed in the study, the group used developmental type of research. The researcher Interview for purpose of obtaining information about the computer hacking in the different students in Our Lady of Fatima University. The interview is successful tool in advertising research. The researcher used Document Analysis the group gathered the forms how some students relate on the computer hacking. The researcher will start to gather data and information after the questionnaire is done. The researchers will distribute to some student the questionnaires to the appropriate number of respondents. Then, the
questionnaire forms will be retrieved after the respondents are done filling it. The researchers tallying all the records and used the Statistical Package for the Social Sciences (SPSS) software it will be coded accordingly after analyzed and assessed the gathered information. The software will tally the encoded data and finally, the researchers will analyze and interpret the data according to the results.
Statistical Treatment The researchers use SPSS for data analysis and interpretation on the respondents learning preferences and its effect on their academic performance. Researchers will encode their inputs for each variable in SPSS that will compute for them the frequency or ach variable. All responses will be summed up depending on the category of the problem question where they belong to, and then the summed data will be assessed by the researchers afterwards. Computation for Percentage The researcher will start to gather data after the questionnaire is done. The researchers will distribute the questionnaires to the appropriate number of respondents. Then, the questionnaire forms will be retrieved after the respondents are done filling it. The questionnaires will be coded accordingly and will be encoded using the Statistical Package for the Social Sciences (SPSS) software. The software will tally the encoded data and finally, the researchers will analyze and interpret the data according to the results. Statistical Treatment
Throughout
the
introduction
of
high
technology
software,
the
researchers are permitted to use SPSS for data analysis and interpretation on the respondents learning preferences and its effect on their academic performance. Researchers will encode their inputs for each variable in SPSS that will compute for them the frequency or ach variable.
Computation for Percentage The calculation of percentage will be used to compare the proportion of frequencies of the responses to the total number of respondents. This will also illustrate the profile of the respondents. Percentage Formula: n= f x 100 N Where: n= percentage f= frequency of respondents N= total population Descriptive statistics is a method of organizing, summarizing data to describe its important features. Inferential statistics is a method of analyzing and interpreting data to generalize a hypothesis about the population based on the sample. Slovins Formula
n=
1+Ne Where: n = is the sample size N = is the population size e = is the margin of error which is 0.05 1 = is constant
The population size of this research is 600 students and using the Slovins Formula the sample size will be 100 students. The test of significance is a method to establish validity of claim.
Chapter 4 PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA This chapter includes the presentation, analysis and interpretation of the data gathered from the experiment. This data was used to determine the credible answers to the problem cited. Problem1. The Assessment about Computer Hacking Related to Fraud of Records in Our Lady of Fatima University in Terms of Their Age, Gender , Course and Insights related to Fraud of Records.
6 0 4 0 2 0 0 55 4 5
Ag e
The table presents the age of the respondents, the age was sub-divided into 2 parts the first part is 18-20 years old and 21-23 years old. It displays that there are more students uses the computer in the 1st percentile which is 18-20 years old. Most of them are teenagers up until adolescents.
55 50 45 40 Ma le F a em le 53 47
G ender
The table presents the Gender of the respondents. It shows that 53 males out of 100 respondents are uses the computer and more knowledgeable which are more likely higher than females.
Table 3 Do you have to access to the internet when you use computer?
Internet Ac es c s
According to the table, it shows that all of the respondents have to access to the internet in their home when they use the computer.
Table 4 Do you believe online banking is secure enough to input credit card details?
100
50
100
0 Yes
0 Ma be y
0 N o
According to the graph, it shows that 100 respondents believes that online banking is secure enough to input credit card details.
Table 5 Does the word hacking put you off from banking?
100
50
100
0 Yes
0 Ma ybe
0 N o
The table presents that 53 student answered yes from putting them off from banking, 22 students responded No and 15 students answered maybe. Table 6 Do you think people involved in computer hacking is only because of poverty?
40 30 20 10 0 Yes Ma ybe N o 40 37 23
The table shows that 40% of the respondents answered yes that some people involved in computer hacking is only because of poverty, 37% of the respondents answered no and 23% of the respondents are unsure.
100
50
100
0 Yes
Ma ybe
0 N o
E been H c ed ver ak
As you can see in this graph, all of the respondents answered No that their computer never been hacked. Table 8 Does the systems security of banks are enough to prevent hackers?
50 40 30 20 10 0 Yes Ma ybe No 49 26 25
B nk S temS urity a ys ec
The table presents that 49% of the respondents answered yes that the systems security of banks are enough to prevent hackers, while 26% of the respondents answered no, that the systems security of the banks are not enough to prevent hackers and 25& of the respondents are unsure.
80 60 40 20 0 Yes
H c inga ac ak s rime
In this graph, 61 of respondents answered yes that the computer hacking is a crime, 35 respondents No that the computer hacking is not a crime and 4 respondents answered maybe. Table 10 Do you think computers are invented for bad things?
80 60 40 20 0 18 Yes Ma ybe 19 No 63
Wors Invention t
As you see in the table, 63 respondents answered No that computers are not invented for bad things, 18 respondents answered Yes that computers are invented for bad things and 19 respondents are unsure if computers are invented for bad things.
G ood E ts ffec
The respondents in the table showed 78% answered Yes that computer hacking is also have a good effects and 22% answered No.
Question 1: Is there a significant difference between the respondents ages to those respondents have their own computer and their academic course?
Variables Removed Method . Stepwise (Criteria: Probability-of-Fto-enter <= .050, Probability-of-Fto-remove >= . 100).
Owns PC