Chapter 1 3
Chapter 1 3
A RESEARCH PROPOSAL
Haciel S. Bautista
Cheleska Q. Martinez
Alexandria S. Pangilinan
January 2022
CHAPTER I
THE PROBLEM AND ITS BACKGROUND
Introduction
In today’s day and age where the majority of our time is spent on browsing the web,
cybercrimes and cyber-attacks have been prevalent. Despite the continuous growth of the
cyber security market and the decrease of social crimes committed, cyber criminals are
becoming more professional in developing new ways to take advantage of the vulnerabilities
in the cyber world (Computer Weekly, 2021). Last June 2021, it was reported that there were
98.41 thousand cyber-attacks report in the Philippines (Statista Research Department, 2021)
In addition to this, last year online news site Rappler wrote in an article that the advertising
firms We Are Social and Hootsuite reported that “Filipinos spend an average of 4 hours and
15 minutes each day on social media”. This statistic put us at the top of the global usage of
social media rankings for the 6th straight year. In the same article it was also reported that the
Philippines gained the highest internet usage around the globe by spending 10 hours and 56
minutes online. Since this trend is most likely to continue in the near future, especially with
the constant use of the internet due to online classes it is important to determine the cyber
weaknesses. As social media platforms become more popular, more students are exposed to
cybersecurity risks.
situations. Being aware of the dangers of browsing the web, checking email and interacting
The researchers have made this study to inform everyone about security safety
awareness. This study will aim to lower the risk of security threats and cyber-attacks. This
study will help to secure information but also our system from virus attack.
The fact that such technology is available in modern computing systems. For today's
online and offline educational processes and interactions, networks and applications are
broaden not only their learning and knowledge ranges, but also to broaden their perspectives.
This study will aim to determine the cyber security awareness of the Junior High
School students of Occidental Mindoro State College. This state college is located in the
town of San Jose a first class municipality in the province of Occidental Mindoro where
social media and internet usage are also prevalent among its populace. This study will use the
quantitative survey method. The survey will contain close-end questions and thus will be
using structured questionnaires. This method was chosen because they are relatively quick
1. What is the demographic information of Junior High School students of OMSC in terms
of:
1.1 Age;
1.2 Sex;
2. What is the level of cyber security awareness of Junior High School students of OMSC in
terms of:
4. What plan of action can be proposed for Junior High school students of OMSC based on
the findings?
To investigate the relationship between the demographic profile of the Junior High
School students and their level of Cybersecurity knowledge. Specifically, it aims to:
1. Determine the demographic information of Junior High school Students of OMSC in terms
of:
1.1 Age;
1.2 Sex;
2. Identify the level of Cybersecurity awareness of Junior High schools Students of OMSC in
terms of:
and level of cybersecurity awareness of Junior High school students of OMSC; and
4. Formulate the plan of action that can be proposed for Junior High school students of
This study is both relevant and timely as it offers benefits to students and teachers. By
knowing the level of awareness of students in OMSC, the institution can provide protection
and practices for the student's well-being. The study also aimed to improve students'
section, the following specifies who will benefit from the results and findings of the study:
Students. This study, with its specifications to provide awareness about cyber safety and
security, aims to protect and help students to be responsible within the Cyberspace.
Community. This research will function as an information system used for spreading
technologies, including the protection of computers, files, networks, and data from viruses,
The Institution. The result of the study will add to the body of knowledge on Information
Technology in junior high school. Specifically, to help Occidental Mindoro State College
administrate a system and program to guide students regarding cyber safety and security.
Future Researchers. The data and information gathered in this research can be used as
The Researchers, themselves. This study will be a factor to the development of skill,
knowledge, and experience of the current researchers who are still studying in the institution.
Scope and Limitations of the Study
This study will focus on the level of awareness of Cyber Security safety among Grade
7 to Grade 10 students. This will include how much time they spend on the internet each day
and forming a plan of action based on the findings. The respondents of the study will be the
selected Grade 7 to Grade 10 students of Occidental Mindoro State College, Academic Year
2021-2022, who will represent the population. The researchers will choose respondents
The demographic information of students in terms of: (a) age; (b) sex; (c) grade
level; (d) social media platforms used, and (e) daily used device. Level of cybersecurity
awareness of Junior High schools students are limited only to the following variables: (a)
knowledge of browser security, and (d) knowledge of social network platforms. The survey
materials will be created by the researchers utilizing relevant and clear questions borrowed
from similar studies as well as their own questions. This study will use a Likert type of
This study will not cover other types of hacking systems such as phishing. The
research would be carried out using a survey and reference questionnaire for the students.
Theoretical Framework
Routine Activities Theory (Navarro and Jasinski, 2013.) This theory was established
in Navaro and Jasinski's research study (2013). The significance of normal functions in
forecasting cybercrime, such as cyberbullying, is emphasized. Their findings show that the
routine activity theory is a feasible explanation for cyberbullying risk among teenagers when
using logistic regression. It is also mentioned that among the various sections of routine
activities theory, characteristics such as suitability and availability have the strongest
General Strain Theory (Paez 2018.) According to Paez (2018), poor school
through socializing agents in schools, as well as stress from school life, such as bad academic
Both theories presented are relevant to the study. The Routine Activities Theory
incorporates factors that show what types of traits are most commonly included in cyber-
crimes and justifications for cyberbullying when using logistic regression. While the General
Strain Theory demonstrates other factors that can also be a cause of cyberbullying that can
Conceptual Framework
Based on our stated objectives and problems, we have two important variables,
namely: the demographic profile of the respondents in terms of: age, gender, and grade level;
and the level of cyber security knowledge of the respondents. In this particular study,
researchers aim to identify the demographic profile of the respondents as well as their level of
there is a significant relationship between the two given variables. Finally, researchers shall
propose a program that deals with the cyber security awareness of the students of the Junior
Definition of Terms
The terms used in this study are defined operationally to facilitate understanding of
the current study. Although they may be used differently in other contexts, the definitions of
Demographic information. It refers to age, sex, grade level, social media platforms used and
Age. It refers to 12 years old and below, 13 years old, 14 years old, 15 years old and 16 years
Daily used device. It refers to Smartphone, Tablet, Desktop, and Laptop that the respondent
consisting of four indicators such as automatic update (no intervention from the user), manual
update (user disables automatic update and updates outdated software when it is needed), no
update (user does not apply required updates), neglect update (user does not care about the
updates at all). Using a 5-point Likert scale from 5-strongly agree to 1-strongly disagree.
virus software consisting of four indicators such as; not installed any antivirus software on
their systems, unaware of the dangers of installing free software from unreliable and
unknown sources, unaware of two-factor authentication and did not know how it added an
extra layer of security, unaware of how to use their emails safely and securely. Using a 5-
consisting of five indicators such as; all my passwords include:12 upper and lower characters,
numbers and symbols, I must change my password periodically, I can use previously used
passwords, I use one strong password for across different websites and accounts, I often share
my passwords with others. Using a 5-point Likert scale from 5-strongly agree to 1-strongly
disagree.
Knowledge of Browser Security. It describes how you protect your browser consisting of
four indicators such as; the web browser should be updated regularly, I should avoid
installing extensions from third-party websites, I must check the security settings and
configurations of the web browser periodically, I must check the browser history and find
suspicious activities. Using a 5-point Likert scale from 5-strongly agree to 1-strongly
disagree.
Knowledge of Social Network Platforms. It describes on how aware you are with your
social network platforms consisting of five indicators such as; it is acceptable to post personal
pictures on social media, It is ok to accept friend request from strangers, there is no problem
with sharing my current location publicly on social media, there is no problem with adding all
personal information like date of birth, current job, etc., I know how to report any threat of
suspicious activity on social media. Using a 5-point Likert scale from 5-strongly agree to 1-
strongly disagree.
CHAPTER II
This chapter presents the related literature after the thorough and in-depth search done
by the researcher. This also presents the theoretical and conceptual framework to truly
understand the research to be done and, lastly, the definition of terms for better
Cybersecurity Awareness
Gross (2018) cited James Lewis, who stated, "Cybercrime is unabated, unabated, and
unlikely to abate." Furthermore, it is simply too easy and profitable, and the risks of getting
found and penalized are thought to be too remote. In fact, he listed four reasons why
cybercrime is still on the rise. It comprises the following points: cybercriminals are using new
attack technologies. A large number of new internet users are from nations with lax
commit online crimes. Cybercriminals are getting more financially skilled, which makes it
easier for them to profit from their misdeeds. In reality, there are numerous technologies that
enable cybercrime, including scalability, encrypting, the deep and dark web, and
cryptocurrency (Desai, 2019). Chandarman and Niekerk (2017) used these to conduct their
cybersecurity skills, real cybersecurity skills and behavior, and cybersecurity attitudes. The
findings highlighted the necessity for focused Cyber Security Awareness (CSA) efforts that
explain how concerns of security can be addressed with risk management methods,"
according to Herrmann and Pridöhl (2020). In reality, Vishik, Matsubara, and Plonk (2016)
stated in their study titled "Core Points in Cyber Security: Toward this Common Regulation
and Technology Framework for Cyber Security Norms" that while international
harmonization of cyber security strategy and visions has not yet been accomplished, a survey
for high-level concepts and evidence of commonality in concepts. Indeed, the ever-increasing
interconnection of the digital environment across national borders has prompted the inclusion
of cybersecurity as a key component of national security strategies 10 in countries all over the
It is insufficient to understand what a countermeasure does, what they detect, and what they
prevent ''. As a matter of fact, in their papers entitled "Toward a Knowledge Graph of Cyber
countermeasures, more precise as a framework for coding the knowledge graph. The graph
consists of semantically exact types and relations that outline both the key concepts in the
(Kaloroumakis & Smith 2018). Ramadan et al. (2021) on the other hand, presented a report
that looked into the cybersecurity threats that occurred during the COVID-19 epidemic.
According to the study, every pandemic has a percentage of spread. It also looked into the
various sorts of cybersecurity that existed prior to the outbreak. Information compromise,
injection flow control, and denial of service are the three types of attacks (DoS). In
connection with these, Johnson (2019) published a paper titled "Countermeasures Against
Coordinated cyber attacks are those in which multiple attackers use multiple attack
techniques to attack multiple targets at the same time (Johansson, 2019). He recommended
three techniques in his paper: discover technical vulnerabilities in the local system ahead of
time, deploy intrusion detection hosts throughout a broader network to better situational
According to Fagan et al. (2017), despite the fact that password managers are
frequently advised by security professionals, many users still do not utilize them.
Understanding why some people prefer to use password managers while others don't is
critical to better understanding why some people do what they do and, as a result, building
motivational aids such as video lessons to encourage more people to use password managers.
In their paper, they examined the differences between people who do and don't use a
password manager. and that they discovered that the differences in emotions between “users”
and “non-users” reveals that participants who never use a password manager are more likely
the tool. Aligned to the current, Tam, Glassman, and Vandenwauver (2010) also conducted a
security and convenience”, wherein it revealed that users know what constitutes a good/bad
password and know which common password-management practices are (in) appropriate, and
are motivated to have interaction in these bad password-management behaviors because they
are doing not see any immediate negative consequences to themselves (negative externalities)
and since of the convenience–security tradeoff. Lyastani et al. (2017) provided the primary
large-scale study of the password managers’ influence on users’ real-life passwords. Through
their research, they quantified for the primary time that password managers indeed benefit the
password strength and uniqueness, however, the results also suggested that those benefits
depend upon the users’ strategies which managers without password generators rather
Dübendorfer and Frei (2009) found that silent updates and limited reliance on the underlying
operating system are the most effective ways to convince users of Web browsers to surf the
Web with the most recent browser version in their study "Web Browser Security Update
Effectiveness." In fact, Shah and Patil (2016) emphasized in their study how inconsistent
browsers are when it comes to triggering security warnings. The majority of modern mobile
web browsers, in particular, are susceptible to these security risks. SSL warnings among web
browsers were found to be inconsistent. According to Nirvilis et al. (2015), most browsers,
particularly those for mobile devices, provide insufficient protection against such threats.
They suggested and analyzed an architecture that may be used to vastly improve the level of
security offered to users, regardless of the web browser or platform they use.
As social networking sites have risen in popularity, they have become a primary target
for cyber-crime and attacks (Das & Patel, 2017). They suggested that authentication be done
at every level of a website to prevent attackers from gaining access to the user's personal
educational attainment, age, and years on the platform. Their research found a substantial
association between social networking security and gender and educational attainment among
users, but no such relationship exists when it comes to age and years on social media. The
findings revealed that most respondents are vulnerable to threats due to a lack of knowledge
about social networking security. With these findings, Bhatnagar and Pry (2020), who
conducted a study titled "Student attitudes, awareness, and perceptions of personal privacy
and cybersecurity in the use of social media: An initial study," arrived to four (4) different
conclusions: (1) Students are aware of the risk of using social media and can provide good
examples of issues that have occurred in the past, such as account compromise and identity
theft. (2) Generation z students are migrating away from traditional social media sites.
Snapchat and Instagram are replacing Twitter and Facebook as the most popular social media
platforms. (3) The most prevalent reason for not using security settings is because they are
difficult to comprehend and implement. According to them, it also reduced their web reach.
(4) Students acknowledge the importance of cybersecurity and privacy training in social
media usage and believe it should begin in the students' freshman year.
CHAPTER III
RESEARCH METHODOLOGY
This chapter presents the research site, research design, unit of analysis or
respondents, research instruments, data gathering procedures and data analysis and
interpretation.
Research Site
This study will be conducted in Occidental Mindoro State College – San Jose
Campus, Quirino Street, San Jose, Occidental Mindoro. Occidental Mindoro State College is
the only state college in the province of Occidental Mindoro located in the heart of the
municipality of San Jose. The chosen research site is formerly the main campus of Occidental
(https://www.google.com/maps/place/Occidental+Mindoro+State+College+-
+San+Jose+Campus/@12.3542993,121.064554,17z/data=!3m1!4b1!4m5!3m4!
1s0x33bb033a48f77457:0xf81605d32df2291e!8m2!3d12.3542993!4d121.0667427)
Research Design
The descriptive-correlational research design will be employed in the study to
describe the variables and its relationships between two or more variables.
snapshot of the current state of affairs. Correlational research is research designed to discover
relationships among variables and to allow the prediction of future events from present
knowledge.
Unit of Analysis/Respondents
The respondents of the study will be Junior high school students who enrolled at
Occidental Mindoro State College, Academic Year 2021-2022. A total of 100 respondents
will be covered in the study both males and females. The researchers chose Occidental
Mindoro State College – Junior High School Department because most of them are spending
their time on social media and are the most vulnerable group to cyberattacks, thus having a
higher risk of being assaulted and bullied. The respondents will be utilized using a simple
random sampling technique, a type of probability sampling which allows the respondents to
Research Instrument
The questionnaire is the major tool that will be used to gather the needed information.
The survey questionnaires are crafted from the study of Senthilkumar. K. & Santhiskumar E.
demographic profile of the respondents in terms of: age, sex, grade level, social media
platforms and daily used device and part 2 has five indicators in the level of cybersecurity
awareness in terms of: (a.) knowledge of main cybersecurity concepts, (b.) knowledge of
indicators.
In order to gather the necessary data from the respondents, the researcher will seek the
approval of the Dean of the College of Teacher Education to conduct the study and the
principal of the Junior High School of Occidental Mindoro State College for the distribution
The researchers will administer the questionnaire to the respondents virtually through
Google Forms. The researchers, together with the class advisers, will orient the students on
how they will answer the given questionnaire. Students will be given 1 to 2 days to finish the
After the researchers distribute the questionnaires, then the respondents will answer it.
The results will be carefully consolidated, encoded, and tabulated and will be submitted to the
statistician or data analyst for the treatment of data and analysis of results.
After the data gathering procedure, the researchers will then analyze, evaluate, and
interpret the data collected. The researchers of this study will use the descriptive-correlation
method. Furthermore, the researchers will use the same tool to gather students’ demographics
and cybersecurity awareness levels to further assess their knowledge of the mentioned
variables. Finally, the results will be combined and tabulated by the statistician selected for
the study.
References:
Ashford, W. (2021, August 27). How the cyber security market is evolving. Computer
Weekly. Retrieved April 19, 2022, from
https://www.computerweekly.com/opinion/How-the-cyber-security-market-is-
evolving
Cybersecurity Awareness: What It Is And How To Start. (2022, March 16). Forbes.
cybersecurity-awareness/
Das, R., & Patel, M. (2017). Cyber Security for Social Networking Sites: Issues, Challenges
and Solutions. Date retrieved: March 7, 2022. Retrieved from:
https://www.researchgate.net/publication/316497540_Cyber_Security_for_Social_Net
working_Sites_Issues_Challenges_and_Solutions
Dübendorfer, T., & Frei, S. (2009). Web Browser Security Update Effectiveness. Date
retrieved: March 6, 2022. Retrieved from:
https://www.researchgate.net/publication/220816476_Web_Browser_Security_Updat
e_Effectiveness
Dun, J (2012). The importance of internet access in schools. Available at
http://www.edudemic.com/2012/12/the-importance-of-internet-access-in-scholls/.
Perspective, Journal of School Violence, 2018. (n.d.). ERIC. Retrieved April 20,
Fagan, M., et al. (2017). An investigation into users’ considerations towards using password
managers. Date retrieved: March 6, 2022. Retrieved from: https://hcis-
journal.springeropen.com/articles/10.1186/s13673-017-0093-6
Gross, G. (2018). The Cost of Cybercrime. Date retrieved: March 6, 2022. Retrieved from:
https://www.internetsociety.org/blog/2018/02/the-cost-of-cybercrime/?
gclid=CjwKCAiA1JGRBhBSEiwAxXblwcO0JRXkq4ezSVDuEu8zaysfPnPyEyhOyv
CDIQ3Qh0oOpZKH3PIoRRoCxtUQAvD_BwE
Herrmann, D. & Pridöhl, H. (2020). Basic Concepts and Models of Cybersecurity. Date
retrieved: March 6, 2022. Retrieved from:
https://www.researchgate.net/publication/339157823_Basic_Concepts_and_Models_o
f_Cybersecurity
Lyastani, S. et al. (2017). Studying the Impact of Managers on Password Strength and Reuse.
Mariani, M., & Wakas, R. (2021). A Study on the Social Networking Sites Security
Awareness
Among Users in Tabuk City. Date retrieved: March 7, 2022. Retrieved from:
https://indjst.org/articles/a-study-on-the-social-networking-sites-security-awareness-
among-users-in-tabuk-city
Navarro, J., & Jasinski, J. (2012). Going Cyber: Using Routine Activities Theory to Predict
Cyberbullying Experiences.
https://www.researchgate.net/publication/
233248877_Going_Cyber_Using_Routine_Activities_Theory_to_Predict_Cyberbully
ing_Experiences
Nirvilis, N. et al. (2015). Security Busters: Web Browser security vs. rogue sites. Date \
retrieved: March 7, 2022. Retrieved from:
https://www.researchgate.net/publication/
275704721_Security_Busters_Web_Browser_security_vs_rogue_sites
of-cyberattacks/
Ramadan, R., et al. (2021). Cybersecurity and Countermeasures at the Time of Pandemic.
Date
retrieved: March 6, 2022. Retrieved from:
https://www.hindawi.com/journals/jat/2021/6627264/
Shah, R., and Patil, K. (2016). Evaluating Effectiveness Of Mobile Browser Security
Warnings.
Date Retrieved: March 7, 2022. Retrieved from:
https://doaj.org/article/368eacea63d64936970b188274dc12cc
Stangor, C., & Walinga, J. (n.d.). 3.2 Psychologists Use Descriptive, Correlational,
Psychology – 1st Canadian Edition. BC Open Textbooks. Retrieved April 21, 2022,
from https://opentextbc.ca/introductiontopsychology/chapter/2-2-psychologists-use-
descriptive-correlational-and-experimental-research-designs-to-understand-behavior
Tam, L., Glassman, M., & Vandenwauver, M. (2010). The psychology of password
management: A tradeoff between security and convenience. Date retrieved: March 6,
2022. Retrieved from:
https://www.researchgate.net/publication/220208616_The_psychology_of_password_
management_A_tradeoff_between_security_and_convenience
Vishik, C., Matsubara, M., & Plonk, A. (2016). Key Concepts in Cyber Security: Towards a
Common Policy and Technology Context for Cyber Security Norms. Date
retrieved: March 6, 2022. Retrieved from:
https://www.semanticscholar.org/paper/Key-Concepts-in-Cyber-Security-%3A-
Towards-a-Common-Vishik-Matsubara/
604339046c838675e483276bbcf968adbbecc099