0% found this document useful (0 votes)
736 views25 pages

Chapter 1 3

This document provides an introduction to a research proposal that aims to study the level of cyber security awareness among junior high school students at Occidental Mindoro State College in the Philippines. The study will examine students' demographic information, daily technology use, and knowledge in key cybersecurity areas. It outlines the problem statement, objectives, scope, and significance of the research. The study intends to identify students' current understanding and propose recommendations to improve cyber safety education. It will benefit students, the community, and the institution by enhancing protection and responsible online behavior.

Uploaded by

Haciel Bautista
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
736 views25 pages

Chapter 1 3

This document provides an introduction to a research proposal that aims to study the level of cyber security awareness among junior high school students at Occidental Mindoro State College in the Philippines. The study will examine students' demographic information, daily technology use, and knowledge in key cybersecurity areas. It outlines the problem statement, objectives, scope, and significance of the research. The study intends to identify students' current understanding and propose recommendations to improve cyber safety education. It will benefit students, the community, and the institution by enhancing protection and responsible online behavior.

Uploaded by

Haciel Bautista
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

CSCSA: Cyber Safety and Cyber Security Awareness among Junior High

School Students of Occidental Mindoro State College (OMSC)

A RESEARCH PROPOSAL

Haciel S. Bautista

Cheleska Q. Martinez

Ma. Rosela Janelle Z. de Lemos

Shanley Kim M. Dela Cruz

Alexandria S. Pangilinan

Hannah Grace A. Cosme

Jossell Anjo G. Reguyal

January 2022

CHAPTER I
THE PROBLEM AND ITS BACKGROUND

Introduction

In today’s day and age where the majority of our time is spent on browsing the web,

cybercrimes and cyber-attacks have been prevalent. Despite the continuous growth of the

cyber security market and the decrease of social crimes committed, cyber criminals are

becoming more professional in developing new ways to take advantage of the vulnerabilities

in the cyber world (Computer Weekly, 2021). Last June 2021, it was reported that there were

98.41 thousand cyber-attacks report in the Philippines (Statista Research Department, 2021)

In addition to this, last year online news site Rappler wrote in an article that the advertising

firms We Are Social and Hootsuite reported that “Filipinos spend an average of 4 hours and

15 minutes each day on social media”. This statistic put us at the top of the global usage of

social media rankings for the 6th straight year. In the same article it was also reported that the

Philippines gained the highest internet usage around the globe by spending 10 hours and 56

minutes online. Since this trend is most likely to continue in the near future, especially with

the constant use of the internet due to online classes it is important to determine the cyber

security awareness of Filipinos at some level.

On today's technologies, cyber security is always a possibility due to security

weaknesses. As social media platforms become more popular, more students are exposed to

cybersecurity risks.

According to Forbes magazine (2016):


Cyber security awareness involves being mindful of cyber security in day-to-day

situations. Being aware of the dangers of browsing the web, checking email and interacting

online are all components of cyber security awareness.

The researchers have made this study to inform everyone about security safety

awareness. This study will aim to lower the risk of security threats and cyber-attacks. This

study will help to secure information but also our system from virus attack.

The fact that such technology is available in modern computing systems. For today's

online and offline educational processes and interactions, networks and applications are

essential. Students and teachers have unstoppable access to resources of information to

broaden not only their learning and knowledge ranges, but also to broaden their perspectives.

Adding to their diverse educational experiences is a must. (Dunn, 2012)

This study will aim to determine the cyber security awareness of the Junior High

School students of Occidental Mindoro State College. This state college is located in the

town of San Jose a first class municipality in the province of Occidental Mindoro where

social media and internet usage are also prevalent among its populace. This study will use the

quantitative survey method. The survey will contain close-end questions and thus will be

using structured questionnaires. This method was chosen because they are relatively quick

and easy to administer.

Statement of the Problem

1. What is the demographic information of Junior High School students of OMSC in terms

of:

1.1 Age;
1.2 Sex;

1.3 Grade level;

1.4 Social media platforms used; and

1.5 Daily used device?

2. What is the level of cyber security awareness of Junior High School students of OMSC in

terms of:

2.1 Knowledge of Main Cybersecurity Concepts;

2.2 Knowledge of Cybersecurity Countermeasures;

2.3 Knowledge of Password Management;

2.4 Knowledge of Browser Security; and

2.5 Knowledge of Social Network Platforms?

3. Is there a significant relationship between the demographic information of respondents and

level of cybersecurity awareness of Junior High school students of OMSC?

4. What plan of action can be proposed for Junior High school students of OMSC based on

the findings?

Objectives of the Study

To investigate the relationship between the demographic profile of the Junior High

School students and their level of Cybersecurity knowledge. Specifically, it aims to:
1. Determine the demographic information of Junior High school Students of OMSC in terms

of:

1.1 Age;

1.2 Sex;

1.3 Grade level;

1.4 Social Media platforms used; and

1.5 Daily used device

2. Identify the level of Cybersecurity awareness of Junior High schools Students of OMSC in

terms of:

2.1 Knowledge of Main Cybersecurity Concepts;

2.2 Knowledge of Cybersecurity Countermeasures;

2.3 Knowledge of Password Management;

2.4 Knowledge of Browser Security; and

2.5 Knowledge of Social Network Platforms

3. Determine a significant relationship between the demographic information of respondents

and level of cybersecurity awareness of Junior High school students of OMSC; and

4. Formulate the plan of action that can be proposed for Junior High school students of

OMSC based on the findings.


Hypothesis

There is no significant relationship between the demographics profile of the

respondents and their level of Cybersecurity awareness.

Significance of the Study

This study is both relevant and timely as it offers benefits to students and teachers. By

knowing the level of awareness of students in OMSC, the institution can provide protection

and practices for the student's well-being. The study also aimed to improve students'

knowledge, avoiding unwanted invasion and circulation of private information. In this

section, the following specifies who will benefit from the results and findings of the study:

Students. This study, with its specifications to provide awareness about cyber safety and

security, aims to protect and help students to be responsible within the Cyberspace.

Community. This research will function as an information system used for spreading

awareness concerning safe and responsible handling of information and communication

technologies, including the protection of computers, files, networks, and data from viruses,

and unauthorized access, thus benefiting the community.

The Institution. The result of the study will add to the body of knowledge on Information

Technology in junior high school. Specifically, to help Occidental Mindoro State College

administrate a system and program to guide students regarding cyber safety and security.

Future Researchers. The data and information gathered in this research can be used as

references for future researchers conducting similar areas of study.

The Researchers, themselves. This study will be a factor to the development of skill,

knowledge, and experience of the current researchers who are still studying in the institution.
Scope and Limitations of the Study

This study will focus on the level of awareness of Cyber Security safety among Grade

7 to Grade 10 students. This will include how much time they spend on the internet each day

and forming a plan of action based on the findings. The respondents of the study will be the

selected Grade 7 to Grade 10 students of Occidental Mindoro State College, Academic Year

2021-2022, who will represent the population. The researchers will choose respondents

through a simple random sampling.

The demographic information of students in terms of: (a) age; (b) sex; (c) grade

level; (d) social media platforms used, and (e) daily used device. Level of cybersecurity

awareness of Junior High schools students are limited only to the following variables: (a)

knowledge of cybersecurity countermeasures; (b) knowledge of password management; (c)

knowledge of browser security, and (d) knowledge of social network platforms. The survey

materials will be created by the researchers utilizing relevant and clear questions borrowed

from similar studies as well as their own questions. This study will use a Likert type of

questionnaire to gather all the data needed.

This study will not cover other types of hacking systems such as phishing. The

research would be carried out using a survey and reference questionnaire for the students.

Theoretical Framework

Routine Activities Theory (Navarro and Jasinski, 2013.) This theory was established

in Navaro and Jasinski's research study (2013). The significance of normal functions in

forecasting cybercrime, such as cyberbullying, is emphasized. Their findings show that the

routine activity theory is a feasible explanation for cyberbullying risk among teenagers when

using logistic regression. It is also mentioned that among the various sections of routine
activities theory, characteristics such as suitability and availability have the strongest

correlations and are more prone to experience cyberbullying.

General Strain Theory (Paez 2018.) According to Paez (2018), poor school

monitoring or a lack of relationship with instructors may increase the likelihood of

cyberbullying perpetration. Students, in particular, might learn rule-breaking behaviors

through socializing agents in schools, as well as stress from school life, such as bad academic

performance, which can lead to unpleasant feelings and online deviance.

Both theories presented are relevant to the study. The Routine Activities Theory

incorporates factors that show what types of traits are most commonly included in cyber-

crimes and justifications for cyberbullying when using logistic regression. While the General

Strain Theory demonstrates other factors that can also be a cause of cyberbullying that can

assist us in boosting our cybersecurity awareness.

Conceptual Framework

Independent Variable Dependent Variable

Level of Cyber security


Profile of the Respondents knowledge of the
respondents

Figure 1 Research Paradigm

Based on our stated objectives and problems, we have two important variables,

namely: the demographic profile of the respondents in terms of: age, gender, and grade level;

and the level of cyber security knowledge of the respondents. In this particular study,
researchers aim to identify the demographic profile of the respondents as well as their level of

cyber security knowledge through questionnaires. Besides, researchers desire to determine if

there is a significant relationship between the two given variables. Finally, researchers shall

propose a program that deals with the cyber security awareness of the students of the Junior

High School of OMSC.

Definition of Terms

The terms used in this study are defined operationally to facilitate understanding of

the current study. Although they may be used differently in other contexts, the definitions of

these terms shall only include those mentioned in this section.

Demographic information. It refers to age, sex, grade level, social media platforms used and

daily used device.

Age. It refers to 12 years old and below, 13 years old, 14 years old, 15 years old and 16 years

old and above

Sex. It describes as male and female

Grade level. It refers to grade 7, grade 8, grade 9, and grade 10.

Social Media platforms used. It refers to Whatsapp, Twitter, Snapchat, Instagram,

Facebook, Flickr, and YouTube, Linked In.

Daily used device. It refers to Smartphone, Tablet, Desktop, and Laptop that the respondent

uses on a daily basis.

Level of Cybersecurity awareness. It refers to knowledge of junior highschools students

about Main cybersecurity concepts, cybersecurity countermeasures, password management,


browser security, and social network platforms that measures using 5-point Likert Scale,

indicating 5- strongly agree, 4-agree, 3-neutral, 2-disagree, and 1- strongly disagree.

Knowledge of main cybersecurity concepts. It describes on how to update the device,

consisting of four indicators such as automatic update (no intervention from the user), manual

update (user disables automatic update and updates outdated software when it is needed), no

update (user does not apply required updates), neglect update (user does not care about the

updates at all). Using a 5-point Likert scale from 5-strongly agree to 1-strongly disagree.

Knowledge of Cyber Security Countermeasures. It describes about the knowledge of anti-

virus software consisting of four indicators such as; not installed any antivirus software on

their systems, unaware of the dangers of installing free software from unreliable and

unknown sources, unaware of two-factor authentication and did not know how it added an

extra layer of security, unaware of how to use their emails safely and securely. Using a 5-

point Likert scale from 5-strongly agree to 1-strongly disagree.

Knowledge of Password Management. It describes on how to formulate the password,

consisting of five indicators such as; all my passwords include:12 upper and lower characters,

numbers and symbols, I must change my password periodically, I can use previously used

passwords, I use one strong password for across different websites and accounts, I often share

my passwords with others. Using a 5-point Likert scale from 5-strongly agree to 1-strongly

disagree.

Knowledge of Browser Security. It describes how you protect your browser consisting of

four indicators such as; the web browser should be updated regularly, I should avoid

installing extensions from third-party websites, I must check the security settings and

configurations of the web browser periodically, I must check the browser history and find
suspicious activities. Using a 5-point Likert scale from 5-strongly agree to 1-strongly

disagree.

Knowledge of Social Network Platforms. It describes on how aware you are with your

social network platforms consisting of five indicators such as; it is acceptable to post personal

pictures on social media, It is ok to accept friend request from strangers, there is no problem

with sharing my current location publicly on social media, there is no problem with adding all

personal information like date of birth, current job, etc., I know how to report any threat of

suspicious activity on social media. Using a 5-point Likert scale from 5-strongly agree to 1-

strongly disagree.
CHAPTER II

THE REVIEW OF RELATED LITERATURE

This chapter presents the related literature after the thorough and in-depth search done

by the researcher. This also presents the theoretical and conceptual framework to truly

understand the research to be done and, lastly, the definition of terms for better

comprehension of the study.

Cybersecurity Awareness

Gross (2018) cited James Lewis, who stated, "Cybercrime is unabated, unabated, and

unlikely to abate." Furthermore, it is simply too easy and profitable, and the risks of getting

found and penalized are thought to be too remote. In fact, he listed four reasons why

cybercrime is still on the rise. It comprises the following points: cybercriminals are using new

attack technologies. A large number of new internet users are from nations with lax

cybersecurity. Cybercrime-as-a-service and other business models are making it easier to

commit online crimes. Cybercriminals are getting more financially skilled, which makes it

easier for them to profit from their misdeeds. In reality, there are numerous technologies that

enable cybercrime, including scalability, encrypting, the deep and dark web, and

cryptocurrency (Desai, 2019). Chandarman and Niekerk (2017) used these to conduct their

own study, which examined students' cybersecurity knowledge, consciousness of

cybersecurity skills, real cybersecurity skills and behavior, and cybersecurity attitudes. The

findings highlighted the necessity for focused Cyber Security Awareness (CSA) efforts that

address the vulnerabilities of certain user groups.

Knowledge about Main Concept of Cybersecurity


"Concepts of cybersecurity originate with vulnerabilities to systems and controls to

explain how concerns of security can be addressed with risk management methods,"

according to Herrmann and Pridöhl (2020). In reality, Vishik, Matsubara, and Plonk (2016)

stated in their study titled "Core Points in Cyber Security: Toward this Common Regulation

and Technology Framework for Cyber Security Norms" that while international

harmonization of cyber security strategy and visions has not yet been accomplished, a survey

of varied literature on cyber security and cyberspace demonstrates a degree of cohesiveness

for high-level concepts and evidence of commonality in concepts. Indeed, the ever-increasing

interconnection of the digital environment across national borders has prompted the inclusion

of cybersecurity as a key component of national security strategies 10 in countries all over the

world (Kumar and Mukherjee 2013).

Knowledge about Cybersecurity Countermeasures

According to Kaloroumakis and Smith (2018), "A process is defined as a technology

designed to counter or offset aggressive cyber activity called cybersecurity countermeasures.

It is insufficient to understand what a countermeasure does, what they detect, and what they

prevent ''. As a matter of fact, in their papers entitled "Toward a Knowledge Graph of Cyber

Security Countermeasures", they created the “DEFEND”. A knowledge base for

countermeasures, more precise as a framework for coding the knowledge graph. The graph

consists of semantically exact types and relations that outline both the key concepts in the

cybersecurity countermeasures and the correlation needed to connect these concepts

(Kaloroumakis & Smith 2018). Ramadan et al. (2021) on the other hand, presented a report

that looked into the cybersecurity threats that occurred during the COVID-19 epidemic.

According to the study, every pandemic has a percentage of spread. It also looked into the

various sorts of cybersecurity that existed prior to the outbreak. Information compromise,
injection flow control, and denial of service are the three types of attacks (DoS). In

connection with these, Johnson (2019) published a paper titled "Countermeasures Against

Coordinated Cyber-Attacks Towards Power Grid Systems: A Systematic Literature Study," in

which he emphasized the importance of conducting a study on the implementation of

countermeasures against coordinated cyber-attacks (CCA) on power grid systems.

Coordinated cyber attacks are those in which multiple attackers use multiple attack

techniques to attack multiple targets at the same time (Johansson, 2019). He recommended

three techniques in his paper: discover technical vulnerabilities in the local system ahead of

time, deploy intrusion detection hosts throughout a broader network to better situational

awareness, and implement a "new form of IDS technology."

Knowledge about Password Management

According to Fagan et al. (2017), despite the fact that password managers are

frequently advised by security professionals, many users still do not utilize them.

Understanding why some people prefer to use password managers while others don't is

critical to better understanding why some people do what they do and, as a result, building

motivational aids such as video lessons to encourage more people to use password managers.

In their paper, they examined the differences between people who do and don't use a

password manager. and that they discovered that the differences in emotions between “users”

and “non-users” reveals that participants who never use a password manager are more likely

to feel suspicious compared to “users,” which might be because of misunderstandings about

the tool. Aligned to the current, Tam, Glassman, and Vandenwauver (2010) also conducted a

groundwork entitled, “The psychology of password management: A tradeoff between

security and convenience”, wherein it revealed that users know what constitutes a good/bad

password and know which common password-management practices are (in) appropriate, and
are motivated to have interaction in these bad password-management behaviors because they

are doing not see any immediate negative consequences to themselves (negative externalities)

and since of the convenience–security tradeoff. Lyastani et al. (2017) provided the primary

large-scale study of the password managers’ influence on users’ real-life passwords. Through

their research, they quantified for the primary time that password managers indeed benefit the

password strength and uniqueness, however, the results also suggested that those benefits

depend upon the users’ strategies which managers without password generators rather

aggravate the present problems.

Knowledge about Browser Security

Dübendorfer and Frei (2009) found that silent updates and limited reliance on the underlying

operating system are the most effective ways to convince users of Web browsers to surf the

Web with the most recent browser version in their study "Web Browser Security Update

Effectiveness." In fact, Shah and Patil (2016) emphasized in their study how inconsistent

browsers are when it comes to triggering security warnings. The majority of modern mobile

web browsers, in particular, are susceptible to these security risks. SSL warnings among web

browsers were found to be inconsistent. According to Nirvilis et al. (2015), most browsers,

particularly those for mobile devices, provide insufficient protection against such threats.

They suggested and analyzed an architecture that may be used to vastly improve the level of

security offered to users, regardless of the web browser or platform they use.

Knowledge about Social Network Platforms

As social networking sites have risen in popularity, they have become a primary target

for cyber-crime and attacks (Das & Patel, 2017). They suggested that authentication be done

at every level of a website to prevent attackers from gaining access to the user's personal

information. Mariani and Wakas (2021) conducted researchers to investigate security


awareness among Tabuk City social media users and the relationship between gender,

educational attainment, age, and years on the platform. Their research found a substantial

association between social networking security and gender and educational attainment among

users, but no such relationship exists when it comes to age and years on social media. The

findings revealed that most respondents are vulnerable to threats due to a lack of knowledge

about social networking security. With these findings, Bhatnagar and Pry (2020), who

conducted a study titled "Student attitudes, awareness, and perceptions of personal privacy

and cybersecurity in the use of social media: An initial study," arrived to four (4) different

conclusions: (1) Students are aware of the risk of using social media and can provide good

examples of issues that have occurred in the past, such as account compromise and identity

theft. (2) Generation z students are migrating away from traditional social media sites.

Snapchat and Instagram are replacing Twitter and Facebook as the most popular social media

platforms. (3) The most prevalent reason for not using security settings is because they are

difficult to comprehend and implement. According to them, it also reduced their web reach.

(4) Students acknowledge the importance of cybersecurity and privacy training in social

media usage and believe it should begin in the students' freshman year.
CHAPTER III

RESEARCH METHODOLOGY

This chapter presents the research site, research design, unit of analysis or

respondents, research instruments, data gathering procedures and data analysis and

interpretation.

Research Site

This study will be conducted in Occidental Mindoro State College – San Jose

Campus, Quirino Street, San Jose, Occidental Mindoro. Occidental Mindoro State College is

the only state college in the province of Occidental Mindoro located in the heart of the

municipality of San Jose. The chosen research site is formerly the main campus of Occidental

Mindoro State College.

Figure 3.1 Research Site

(https://www.google.com/maps/place/Occidental+Mindoro+State+College+-

+San+Jose+Campus/@12.3542993,121.064554,17z/data=!3m1!4b1!4m5!3m4!

1s0x33bb033a48f77457:0xf81605d32df2291e!8m2!3d12.3542993!4d121.0667427)

Research Design
The descriptive-correlational research design will be employed in the study to

describe the variables and its relationships between two or more variables.

According to Stangor (2019), descriptive research is research designed to provide a

snapshot of the current state of affairs. Correlational research is research designed to discover

relationships among variables and to allow the prediction of future events from present

knowledge.

Unit of Analysis/Respondents

The respondents of the study will be Junior high school students who enrolled at

Occidental Mindoro State College, Academic Year 2021-2022. A total of 100 respondents

will be covered in the study both males and females. The researchers chose Occidental

Mindoro State College – Junior High School Department because most of them are spending

their time on social media and are the most vulnerable group to cyberattacks, thus having a

higher risk of being assaulted and bullied. The respondents will be utilized using a simple

random sampling technique, a type of probability sampling which allows the respondents to

have an equal chance of being selected.

Research Instrument

The questionnaire is the major tool that will be used to gather the needed information.

The survey questionnaires are crafted from the study of Senthilkumar. K. & Santhiskumar E.

2017. It is structured and validated. It is composed of two parts. Part 1 composed of

demographic profile of the respondents in terms of: age, sex, grade level, social media

platforms and daily used device and part 2 has five indicators in the level of cybersecurity

awareness in terms of: (a.) knowledge of main cybersecurity concepts, (b.) knowledge of

cybersecurity countermeasures, (c.) knowledge of password management, (d.) knowledge of


browser security, and (e.) knowledge of social network platforms and each indicator has sub-

indicators.

Data Gathering Procedure

In order to gather the necessary data from the respondents, the researcher will seek the

approval of the Dean of the College of Teacher Education to conduct the study and the

principal of the Junior High School of Occidental Mindoro State College for the distribution

of the research instruments.

The researchers will administer the questionnaire to the respondents virtually through

Google Forms. The researchers, together with the class advisers, will orient the students on

how they will answer the given questionnaire. Students will be given 1 to 2 days to finish the

provided questionnaires and submit it.

After the researchers distribute the questionnaires, then the respondents will answer it.

The results will be carefully consolidated, encoded, and tabulated and will be submitted to the

statistician or data analyst for the treatment of data and analysis of results.

Data Analysis and Interpretation

After the data gathering procedure, the researchers will then analyze, evaluate, and

interpret the data collected. The researchers of this study will use the descriptive-correlation

method. Furthermore, the researchers will use the same tool to gather students’ demographics

and cybersecurity awareness levels to further assess their knowledge of the mentioned

variables. Finally, the results will be combined and tabulated by the statistician selected for

the study.

References:
Ashford, W. (2021, August 27). How the cyber security market is evolving. Computer
Weekly. Retrieved April 19, 2022, from
https://www.computerweekly.com/opinion/How-the-cyber-security-market-is-
evolving

Chandarman, R. & Niekerk, B. (2017). Students’ Cybersecurity Awareness at a Private


Tertiary
Educational Institution. Date retrieved: March 6, 2022. Retrieved from:
https://www.researchgate.net/publication/322455127_Students'_Cybersecurity_Awar
eness_at_a_Private_Tertiary_Educational_Institution

Cybersecurity Awareness: What It Is And How To Start. (2022, March 16). Forbes.

Retrieved April 19, 2022, from https://www.forbes.com/advisor/business/what-is-

cybersecurity-awareness/

Das, R., & Patel, M. (2017). Cyber Security for Social Networking Sites: Issues, Challenges
and Solutions. Date retrieved: March 7, 2022. Retrieved from:
https://www.researchgate.net/publication/316497540_Cyber_Security_for_Social_Net
working_Sites_Issues_Challenges_and_Solutions

Desai, N. (2019). Tackling Cyber-enabled Crime Will Require Public-Private Leadership.


Date
retrieved: March 6, 2022. Retrieved from:
https://www.cigionline.org/articles/tackling-cyber-enabled-crime-will-require-public-
private-leadership/?
utm_source=google_ads&utm_medium=grant&gclid=CjwKCAiA1JGRBhBSEiwAx
Xblwdz8vqPc_5TZBsQzMJ7Uh1hBToF4xa04XR5C0pZQMCeeKMYoCOEuERoCZ
IoQAvD_BwE

Dübendorfer, T., & Frei, S. (2009). Web Browser Security Update Effectiveness. Date
retrieved: March 6, 2022. Retrieved from:
https://www.researchgate.net/publication/220816476_Web_Browser_Security_Updat
e_Effectiveness
Dun, J (2012). The importance of internet access in schools. Available at

http://www.edudemic.com/2012/12/the-importance-of-internet-access-in-scholls/.

ERIC - EJ1162148 - Cyberbullying among Adolescents: A General Strain Theory

Perspective, Journal of School Violence, 2018. (n.d.). ERIC. Retrieved April 20,

2022, from https://eric.ed.gov/?id=EJ1162148

Fagan, M., et al. (2017). An investigation into users’ considerations towards using password
managers. Date retrieved: March 6, 2022. Retrieved from: https://hcis-
journal.springeropen.com/articles/10.1186/s13673-017-0093-6

Gross, G. (2018). The Cost of Cybercrime. Date retrieved: March 6, 2022. Retrieved from:
https://www.internetsociety.org/blog/2018/02/the-cost-of-cybercrime/?
gclid=CjwKCAiA1JGRBhBSEiwAxXblwcO0JRXkq4ezSVDuEu8zaysfPnPyEyhOyv
CDIQ3Qh0oOpZKH3PIoRRoCxtUQAvD_BwE

Herrmann, D. & Pridöhl, H. (2020). Basic Concepts and Models of Cybersecurity. Date
retrieved: March 6, 2022. Retrieved from:
https://www.researchgate.net/publication/339157823_Basic_Concepts_and_Models_o
f_Cybersecurity

Johnson, J. (2019). Countermeasures Against Coordinated Cyber-Attacks Towards Power


Grid
Systems: A Systematic Literature Study. Date retrieved: March 6, 2022. Retrieved
from: https://www.semanticscholar.org/paper/COUNTERMEASURES-AGAINST-
COORDINATED-CYBER-ATTACKS-Ding/
fbda8040ea7f9dc1d60c82b815d8735145a019cf

Kaloroumakis, P., and Smith, M. (2018). Toward a Knowledge Graph of Cybersecurity


Countermeasures. Date retrieved: March 6, 2022. Retrieved from:
https://docslib.org/doc/10559667/toward-a-knowledge-graph-of-cybersecurity-
countermeasures
Kumar, R. & N. Mukherjee. (2013). Cyber Security in India: A Skill-Development
Perspective.
New Delhi: Communication Multimedia and Infrastructure.

Lyastani, S. et al. (2017). Studying the Impact of Managers on Password Strength and Reuse.

Date retrieved: March 6, 2022. Retrieved from:


https://www.researchgate.net/publication/322075813_Studying_the_Impact_of_Mana
gers_on_Password_Strength_and_Reuse

Mariani, M., & Wakas, R. (2021). A Study on the Social Networking Sites Security
Awareness
Among Users in Tabuk City. Date retrieved: March 7, 2022. Retrieved from:
https://indjst.org/articles/a-study-on-the-social-networking-sites-security-awareness-
among-users-in-tabuk-city

Navarro, J., & Jasinski, J. (2012). Going Cyber: Using Routine Activities Theory to Predict
Cyberbullying Experiences.
https://www.researchgate.net/publication/
233248877_Going_Cyber_Using_Routine_Activities_Theory_to_Predict_Cyberbully
ing_Experiences

Nirvilis, N. et al. (2015). Security Busters: Web Browser security vs. rogue sites. Date \
retrieved: March 7, 2022. Retrieved from:
https://www.researchgate.net/publication/
275704721_Security_Busters_Web_Browser_security_vs_rogue_sites

Philippines: amount of cyberattacks 2021. (2021, December 3). Statista. Retrieved

April 19, 2022, from https://www.statista.com/statistics/1268283/philippines-amount-

of-cyberattacks/

Ramadan, R., et al. (2021). Cybersecurity and Countermeasures at the Time of Pandemic.
Date
retrieved: March 6, 2022. Retrieved from:
https://www.hindawi.com/journals/jat/2021/6627264/

Shah, R., and Patil, K. (2016). Evaluating Effectiveness Of Mobile Browser Security
Warnings.
Date Retrieved: March 7, 2022. Retrieved from:
https://doaj.org/article/368eacea63d64936970b188274dc12cc

Stangor, C., & Walinga, J. (n.d.). 3.2 Psychologists Use Descriptive, Correlational,

and Experimental Research Designs to Understand Behaviour – Introduction to

Psychology – 1st Canadian Edition. BC Open Textbooks. Retrieved April 21, 2022,

from https://opentextbc.ca/introductiontopsychology/chapter/2-2-psychologists-use-

descriptive-correlational-and-experimental-research-designs-to-understand-behavior

Tam, L., Glassman, M., & Vandenwauver, M. (2010). The psychology of password
management: A tradeoff between security and convenience. Date retrieved: March 6,
2022. Retrieved from:
https://www.researchgate.net/publication/220208616_The_psychology_of_password_
management_A_tradeoff_between_security_and_convenience

Vishik, C., Matsubara, M., & Plonk, A. (2016). Key Concepts in Cyber Security: Towards a
Common Policy and Technology Context for Cyber Security Norms. Date
retrieved: March 6, 2022. Retrieved from:
https://www.semanticscholar.org/paper/Key-Concepts-in-Cyber-Security-%3A-
Towards-a-Common-Vishik-Matsubara/
604339046c838675e483276bbcf968adbbecc099

You might also like