Вы находитесь на странице: 1из 32

1

CHAPTER I

THE PROBLEM AND ITS SETTING

Introduction

According to (britz 2008) over the past two decades,

Cybercrimes has emerged as a salient area of inquiry for

criminologist and a growing concern for public policy. Although there

are many definition of Cybercrime, the term generally refers to the

crimes committed through the use of computers and computer

networks, but it also includes crimes that do not rely heavily on

computers

Cybercrime is a term used to broadly describe criminal

activity in which computers or computer networks are a tool, a

target, or a place of criminal activity and include everything from

electronic cracking to denial of service attacks. It is also used to

include traditional crimes in which computers or networks are used

to enable the illicit activity. The Cyber crime can halt any railway

where it is, it may misguide the planes on its flight by misguiding

with wrong signals, it may cause any important military data to fall

in the hands of foreign countries, and it may halt e-media and every

system can collapse within a fraction of seconds.

The present study has been undertaken to touch some

aspects, effect and prospects of this cyber-technology with special


2

reference to threat poses of Cyber crime by India. Efforts have been

made to analyze legal framework available for its control in India. To

start with, it is, therefore, necessary to demarcate the dimensions

of word crime. Thus it is beyond doubt that crime is a relative

phenomenon, universal in nature and essentially all societies from

ancient to modern have been evidently demonstrating its presence.

Each society have been providing its own description of criminal

behavior and conduct made punishable by express will of the

political community ruling over the society and it was always

influence by religious-social-political economical values prevailing in

the given society. Thus from time immemorial the behavior that

attracts Penal liability influenced and characterized by overall

outcome of these standards. Parenthetically, just as concept of

crime [has undergone] change with the growth of Information

Technology so the categories of criminals who engage in such

crimes. So far Indian society is concerned, particularly during

ancient period, the definition of crime flagged by religious

interpretation. The period was known for complete ominance of

religion. All political and social activities in general and 'Crime' in

particular, considered to be happened due to the presence of super-

natural power. The Demonological theory of crime causation was an

outcome of this period.

The Department of Justice (DOJ) has ordered the filing of the

first case under the controversial Cybercrime Prevention Act of 2012


3

in connection with a computer-related forgery. The crime of

computer-related forgery under the cybercrime law covers the act

of using computer data for making fraudulent plans or transactions.

Statement of the Problem

This study aims to find out the level of awareness on the

Cybercrime Prevention Act of 2012 and the extent of behavioral

change among students of Polytechnic College of Davao Del Sur,

Inc. S. Y. 2016 2017. Specifically, it seeks to answer the following

questions:

1. What is the profile of respondents when grouped by

course?

2. What is the level of awareness of the respondents about

the Cybercrime Prevention Act of 2012 when analyzed by:

2.1. Course, and

2.2. Overall?

3. What is the extent of behavioral change in the use of

internet among the respondents when analyzed according

to:

3.1. Course , and


4

3.2. Overall?

4. Is there a significant relationship between the level of

awareness and extent of behavioral change among the

respondents?

Statement of the hypothesis

Since Criminology has started viewing the emergence of

cybercrime as a new locus of criminal activity, a new theory is

needed to explain why cybercrime occurs.

Transition theory is an explanation for the criminal behavior in

the cyber space. There is a need to test the space transition theory

to see if it explains cyber criminal activity (Jaishancar 2008)

Theoretical Background

This study is anchored on Michael Gottfredson and Travis

Hirschi Theory of low self control, which is defined as the inability by

an individual to exercise personal restraints in the face of tempting

immediate easy gratification both in short and long term (Hirchi

2004). Gottfredson and Hirschi also maintained that an individuals

level of self control is establish early in life, between the ages of 8

to 10, is a product of ineffective child rearing, and has many diverse

manifestation that reverberate through the life cycle (bullying, bad

grades, delinquency, dropping out of school, alcoholism, crime and

unemployment).
5

Grasmick et al.(1993) Cited To our best knowledge, to the

date there is only one study that has explored the relationship

between levels of self control and cybercrime. Using a sample of

college students enrolled at a southeastern university in the U.S.

and attitudinal measures of self control

Bossler and Holt (2010) Cited and assessed the effect of self

control on the probability of experiencing five forms of cybercrime

victimization: unauthorized access to ones computer without the

knowledge or permission, data loss due to malware infection, and

online harassment.

Conceptual Framework
6

Independent Variables Dependent

Variables

Level of awareness Behavioral change among


students of Polytechnic
Cybercrime College of Davao Del Sur,
Inc.
Prevention
Course S.Y. 2016 - 2017
Act of 2012

Figure 1. Schematic Diagram showing the variables of the

study

Over the past two decades, cybercrime has emerged as a

salient area of inquiry for criminologists and a growing concern for

public policy. Although there are many definitions of cybercrime, the

term generally refers to crimes committed through the use of

computers and computer networks, but it also includes crimes that

do not rely heavily on computers (Britz, 2008). Extant research has

explored the nature and extent of cybercrime (Cukier & Levin,


7

2009; Finley, 2009; Finn, 2004; Geis et al., 2009; Huang etal.,

2009; Jaishankar, Halder, & Ramdoss.

Scope and limitation

This study focus on the level of awareness on the Cybercrime

Prevention Act of 2012 and the extent behavioral change among

students of Polytechnic College of Davao Del Sur. S.Y. 2016 2017.

This was conducted at Polytechnic College of Davao Del Sur. The

data gathered through the hand made questionnaire to identify the

level of awareness of the polytechnic college of Davao Del Sur, Inc.

Students about the Cybercrime Prevention Act of 2012.

Significance of the study

The main purpose of this study was to determine the level of

awareness on the cybercrime prevention act of 2012 and the extent

of behavioral change among students of Polytechnic College of

Davao Del Sur, Inc. S. Y. 2016, 2017.in addition, the study seek to

detect the relationship of two variables. Hence the result of the

study will be a great help to the following beneficiaries:

Deans/ Directors. The output of this study will shed light

among the school heads to conceptualize the cybercrime prevention


8

Act of 2012 to heighten the level of awareness among students of

polytechnic college of Davao Del Sur, inc.

Faculty. The result of this study will be a great help for the

teachers on how to motivate the students the proper usage of the

computers, internet and social media sites that will heighten their

level of maturation.

Students. The output of this study will provide guidelines to

the students on what type or appropriate words they will post or

sends. it will also increase the level of enhancement and motivation

to achieve their goals .

Future researchers. The output of this study serves to give

information and knowledge to the future researchers about the

cybercrime prevention Act of 2012 so that they will not find it hard

to gather data.

Definition of Terms

In the desire to have a better understanding in the

terminologies used in the study, the following are defined

conceptually and operationally:

Cybercrime - Is a form of illicit criminal activity conducted over the

internet or another computer.


9

Act - Something that is do ne.

Awareness - Knowing and understanding a lot about what is

happening in the world or around you.

Pornography Sexually explicit videos, photographs, writings, or

the like, whose purpose is to elicit sexual arousal.

Cyber bullying is the use of cell phones, instant messaging,

email, chat rooms or social networking sites such

as Facebook and Twitter to harass, threaten or intimidate someone

Cyber trespass A person is guilty of computer trespass if s/he

intentionally and without authorization accesses, alters, deletes,

damages, destroys, or disrupts any computer, computer system,

computer network, computer program, or data.

Cyber Fraud Online theft of credit card number, expiration date,

and other information for criminal use is cyber fraud.

Money laundering is the process of transforming the proceeds

of crime and corruption into ostensibly legitimate assets.

Plagiarism - Is the "wrongful appropriation" and "stealing and

publication" of another author's "language, thoughts, ideas, or

expressions" and the representation of them as one's own original

work.
10

Review of Related Literature

Presented in this portion are the related ideas and information

taken from the books, journals, researches and interviews. The

conclusion of relevant information about the level of awareness of

the students of Polytechnic College of Davao Del Sur. Inc. Students

on the Cybercrime Prevention Act of 2012 which will be discuss

thoroughly below.

Cybercrime

According to Kshetr, (2010). Theorist of the internet agrees

that cyberspace makes possible near and instant interactions

between individuals who are spatially distant, which creates

possibility for new forms of association which in turn gives rise to

cyber crime and cyber deviance. Cyber crime, in simple terms, is a

crime that is facilitated or committed using a computer, network or

hardware device. The computer or device may be the agent of the

crime, the facilitator of the crime, or the target of the crime. It can

take place on the computer alone, or in other virtual or non virtual

locations. It is recognized that current legal definition of cyber crime

varies drastically between jurisdictions. A practical definition of a

cyber crime is offered According to him, Cyber Crime is defined as a

criminal activity in which computers or computer networks are the

principal means of committing an offence or violating laws, rules or

regulations. Examples of cyber crime include denial of service


11

attacks, cyber-theft, cyber trespass, cyber obscenity, critical

infrastructure attacks, online fraud, online money laundering, ID

fraud, cyber terrorism, and cyber extortions. It is evident that

organized criminal organizations use cyber crime extensively to

collaborate and connect with their vast network which is spread

across globe. The synergy between organized crime and the

internet has thus increased the insecurity of the digital world.

Cyber Fraud

Hani Durzy, an eBay spokesperson in USA cited that another

form of cybercrime which has a firm grip on society is cyber fraud

and scams online. But, the problem with this is the lack of

systematic and official data. Internet Crime Complain Centre (ICCC)

is the only source available whose primary role is to receive public

reports of cybercrime and refer them to the relevant criminal justice

agencies for action, claims that frauds ascent for only 0.01% of

transactions undertaken using the site yet this would amount to

3000 frauds per day, given that more than 30 million auctions take

place on eBay daily Cha (2005)17. The fact is that a growing

number of internet auction sites provide thieves a global market

through which they sell stolen items to unsuspecting customers.

Pornography
12

According to Lane (2001) Internet is easily accessed on

computer, pocket PC, wireless, mobile phone, etc. In the late 1970s

and early 1980s, programmers were zealously developing software

enabling images that are transmitted, recomposed and viewed

through Usenet systems. By 1996, of the ten most popular Usenet

groups, five were sexually oriented and one (atl.Sex. Net) attracted

some 5, 00,000 readers every day. To a much surprise pornography

is the first successful e-commerce product. An important mention

here is about a case which was filed in the Juvenile Court, Delhi on

the charge of cyber pornography. Some jurist says this is the first

Indian cyber pornographic case which was charge sheeted in the

juvenile court. A student of a reputed school, New Delhi Was

arrested by Delhi police in year 2001, April because he created a

porn website as revenge of having being teased by classmates and

teachers. He listed the names of his 12 schoolmate girls and

teachers in sexually explicit manner. He was charged under section

67 of the Information Technology Act 2000 and section 292,293,

294 of the Indian penal code and the indecent representation of

Women act.

Cyber Bullying

Cyber bullying is an extension of physical bullying. It has two

forms; Overt and Covert. Overt bullying is physical aggression and

includes beating, kicking and sexual touching. Overt bullying is

often accompanied by covert bullying in which victims are excluded


13

from friends group, stalked, gossiped about, verbally harassed and

threatened. Cyber bullying is carried by adolescents through

Internet. As more and more youth are using the internet for

interpersonal relationships, the risk of being bullied is increasing. It

leads to depression, anger and sometimes even suicide.

According to Camarines Sur Rep. Rolando Andaya on

Wednesday, May 27 proposed a bill aiming to define and penalize

the crime of cyber bullying. The lawmaker wrote the Anti-Cyber

Bullying Act of 5718 or An act of defining and penalizing the crime

of cyber-bullying in an attempt to encourage people to become

responsible netizens and make them accountable for their cyber

actions.Cyber bullying is o ne such problem that the advancement

in technology and social media has generated. It can potentially

affect not only school-aged children, but also any individual who has

access to a mobile phone or the Internet, Andaya said.

Cyber bullying, according to the bill, are acts of cruelty

committed using the Internet or any form of electronic media or

technology that has the effect of stripping ones dignity or causing

reasonable fear or physical or emotional harm.

Among other offenses included in the bill that defines the scope of

cyber bullying are:

Repeated sending of offensive, rude and insulting message,

distributing and belittling information about the victim;


14

Posting or sending of offensive photos of the victim, whether

digitally altered or not, or were taken with or without consent, as

long as it has intention to humiliate and embarrass the victim;

Breaking into an e-mail, social networking or any electronic

account and using the victims virtual identity to send, upload or

distribute embarrassing materials to or about others, sharing the

victims personal or embarrassing information and sharing it to

others and repeated sending of messages such as threats or harm

or engaging in online activities causing fear on victims safety. If

passed, netizens convicted of cyber bullying would be fined a

penalty of P50, 000 but not more than P100,000 and imprisonment

of not less than six months, but not more than six years, or both.

Because of the anonymity that the Internet gives, social and moral

norms are easily switched off and users are emboldened to just say

or post anything online without accountability, Andaya explained.

The Camarines Sur Representative noted that Internet bashing has

become a culture among Internet users and even initiates problems

that involve hostility and aggression. (With reports from

Philstar.com)

Plagiarism
15

Is the intentional or unintentional use of the work of another

without proper acknowledgment. You may be aware that

reproducing the published words of another without acknowledging

the source of the words is plagiarism; however, you might be

unaware of the scope of the concept of plagiarism. The

term plagiarism applies not only to the published word, but also to

unpublished materials, the spoken word, opinions, theories,

pictures, graphs, and statistics. In fact, plagiarism might occur at

any time when the material of another is being used, regardless of

the source or format of the material. An example of a situation in

which unintentional plagiarism can easily occur is when students

work together, formally or informally, on a class assignment. If you

do collaborative work with other students and then use their ideas

or material in the work you submit, you must credit the work of the

other students. If you do not properly acknowledge that you have

incorporated the work of other students into your materials, you are

guilty of plagiarism.

In addition, you might not appreciate that plagiarism is not

limited to copying verbatim from a source but also occurs when you

paraphrase the work of another.

The sole exception to the rule that all materials being used must be

properly acknowledged is if the material being used is common

knowledge. Information and ideas that appear in many places or


16

that are readily available to anyone would be regarded as common

knowledge. You may not know what a common knowledge in your

discipline is. When in doubt, err on the side of citing your source.

The appropriate method of acknowledging source materials

varies from discipline to discipline and from instructor to instructor.

References to source materials might be given in footnotes,

endnotes, a bibliography together with pointers in the text

indicating where and which bibliographical item was used, or

possibly in the body of your text. You should talk to your instructors

about their requirements for properly acknowledging sources.

Cyber Trespass

According to BizLegis (April 2, 2012). the word trespass in

general means to enter into the others property without seeking

consent. It is considered a civil wrong ordinarily. If the trespass is

committed with criminal intention it is called criminal trespass. To

protect an owners control over the property the trespass actions

are stranded. The websites should also be considered a species of

property. The concept of trespass is applicable in cases of the cyber

world and may be termed as Cyber Trespass. The act of hacking by

the hacker is of civil nature, but if the intention to harm or damage

the system is proved, the liability is of penal nature. The hacking

may also result in other crimes mentioned in the Indian Penal Code

1860 apart from criminal trespass. For example if a hacker hacks


17

into the Information Technology Act tries to the website of a bank

and transfers money into his account this may constitute a crime

under Section 378 of the Indian Penal Code 1860. The act in the

above case can also be termed as Cyber Theft. The Information

Technology Act provides civil and penal consequences for hacking

and other wrongful activities.

The technological development has given rise to gadgets like

computers, laptops, tablets and other instruments which can also be

a cause of rampant tort of Cyber Trespass. The computer is used as

a tool for activities like email spoofing, cyber defamation and also

used as a target like in the cases of unauthorized access, email

bombing, Trojan attacks or sometimes for both. This is called cyber

crimes. It is difficult to eliminate cyber trespass from the cyber

world; however it is quite possible to check them. The computer

data may also contain personal information, so the hacker can also

infringe ones right to privacy guaranteed by Indian Constitution

under Article 21. The global connectivity is facilitated by internet

having impact on few areas of tort. There is trespass to property

and persons in the cyber world like.

Money laundering

Anti-Money Laundering Act of 2001 (RA 9160) an act defining the

crime of money laundering, providing penalties there for and for


18

other purposes Be it enacted by the Senate and House of

Representatives of the Philippines in Congress assembled: SECTION

1. Short Title. This Act shall be known as the "Anti-Money

Laundering Act of 2001." SEC. 2. Declaration of Policy. It is hereby

declared the policy of the State to protect and preserve the integrity

and confidentiality of bank accounts and to ensure that the

Philippines shall not be used as a money laundering site for the

proceeds of any unlawful activity. Consistent with its foreign policy,

the State shall extend cooperation in transnational investigations

and prosecutions of persons involved in money laundering activities

wherever committed. SEC. 3. Definitions. For purposes of this Act,

the following terms are hereby defined as follows: (a) "Covered

institution" refers to: (1) banks, non-banks, quasi-banks, trust

entities, and all other institutions and their subsidiaries and affiliates

supervised or regulated by the Bangko Sentral ng Pilipinas (BSP),

(2) insurance companies and all other institutions supervised or

regulated by the Insurance Commission, and (3) securities dealers,

brokers, salesmen, investment houses and other similar entities

managing securities or rendering services as investment agent,

advisor, or consultant, mutual funds, close-end investment

companies, common trust funds, pre-need companies and other

similar entities, foreign exchange corporations, money changers,

money payment, remittance, and transfer companies and other

similar entities, and other entities administering or otherwise


19

dealing in currency, commodities or financial derivatives based

thereon, valuable objects, cash substitutes and other similar

monetary instruments or property supervised or regulated by

Securities and Exchange Commission and Exchange Commission (b)

"Covered transaction" is a single, series, or combination of

transactions involving a total amount in excess of Four million

Philippine pesos (Php4,000,000.00) or an equivalent amount in

foreign currency based on the prevailing exchange rate within five

(5) consecutive banking days except those between a covered

institution and a person who, at the time of the transaction was a

properly identified client and the amount is commensurate with the

business or financial capacity of the client; or those with an

underlying legal or trade obligation, purpose, origin or economic

justification. It likewise refers to a single, series or combination or

pattern of unusually large and complex transactions in excess of

Four million Philippine pesos (Php4,000,000.00) especially cash

deposits and investments having no credible purpose or origin,

underlying trade obligation or contract. (c) "Monetary instrument"

refers to: (1) coins or currency of legal tender of the Philippines, or

of any other country; (2) drafts, checks and notes. (3) securities or

negotiable instruments, bonds, commercial papers, deposit

certificates, trust certificates, custodial receipts or deposit substitute

instruments, trading orders, transaction tickets and confirmations of

sale or investments and money market instruments; and (4) other


20

similar instruments where title thereto passes to another by

endorsement, assignment or delivery. (d) "Offender" refers to any

person who commits a money laundering offense. (e) "Person"

refers to any natural or juridical person. (f) "Proceeds" refers to an

amount derived or realized from an unlawful activity. (g)

"Supervising Authority" refers to the appropriate supervisory or

regulatory agency, department or office supervising or regulating

the covered institutions enumerated in Section 3(a). (h)

"Transaction" refers to any act establishing any right or obligation or

giving rise to any contractual or legal relationship between the

parties thereto. It also includes any movement of funds by any

means with a covered institution. (i) "Unlawful activity" refers to

any act or omission or series or combination thereof involving or

having relation to the following: (1) Kidnapping for ransom under

Article 267 of Act No. 3815, otherwise known as the Revised Penal

Code, as amended; (2) Sections 3, 4, 5, 7, 8 and 9 of Article Two of

Republic Act No. 6425, as amended, otherwise known as the

Dangerous Drugs Act of 1972; (3) Section 3 paragraphs B, C, E, G,

H and I of Republic Act No. 3019, as amended; otherwise known as

the Anti-Graft and Corrupt Practices Act; (4) Plunder under Republic

Act No. 7080, as amended; (5) Robbery and extortion under Articles

294, 295, 296, 299, 300, 301 and 302 of the Revised Penal Code,

as amended; (6) Jueteng and Masiao punished as illegal gambling

under Presidential Decree No. 1602; (7) Piracy on the high seas
21

under the Revised Penal Code, as amended and Presidential Decree

No. 532; (8) Qualified theft under Article 310 of the Revised Penal

Code, as amended; (9) Swindling under Article 315 of the Revised

Penal Code, as amended; (10) Smuggling under Republic Act Nos.

455 and 1937; (11) Violations under Republic Act No. 8792,

otherwise known as the Electronic Commerce Act of 2000.

Cyber Trespass

According to BizLegis (April 2, 2012 ) the word trespass in

general means to enter into the others property without seeking

consent. It is considered a civil wrong ordinarily. If the trespass is

committed with criminal intention it is called criminal trespass. To

protect an owners control over the property the trespass actions

are stranded. The websites should also be considered a species of

property. The concept of trespass is applicable in cases of the cyber

world and may be termed as Cyber Trespass. The act of hacking by

the hacker is of civil nature, but if the intention to harm or damage

the system is proved, the liability is of penal nature. the hacking

may also result in other crimes mentioned in the Indian Penal Code

1860 apart from criminal trespass. For example if a hacker hacks

into the Information Technology Act tries to the website of a bank

and transfers money into his account this may constitute a crime

under Section 378 of the Indian Penal Code 1860. The act in the

above case can also be termed as Cyber Theft. The Information


22

Technology Act provides civil and penal consequences for hacking

and other wrongful activities.

The technological development has given rise to gadgets like

computers, laptops, tablets and other instruments which can also be

a cause of rampant tort of Cyber Trespass. The computer is used as

a tool for activities like email spoofing, cyber defamation and also

used as a target like in the cases of unauthorized access, email

bombing, Trojan attacks or sometimes for both. This is called cyber

crimes. It is difficult to eliminate cyber trespass from the cyber

world; however it is quite possible to check them. The computer

data may also contain personal information, so the hacker can also

infringe ones right to privacy guaranteed by Indian Constitution

under Article 21. The global connectivity is facilitated by internet

having impact on few areas of tort. There is trespass to property

and persons in the cyber world like.

CHAPTER 3

METHODOLOGY

This chapter is about the research method and procedures

that were use in the completion of this study. These include

research design, research locale, respondents, research

instrument/s, sources of data and methods of collecting data, and

treatment of data.

Research Design
23

This study employs the descriptive research method to

determine the following: the level of awareness of the Polytechnic

College of Davao del Sur, Inc. students on the Cybercrime

prevention act of 2012 in terms of Cyber Terrorism, Pornography,

Cyber Bullying, Cyber Prostitution, Cyber Laundering, Plagiarism,

Piracy, Cyber Trespass (hacking),

Research Locale

Polytechnic College of Davao del Sur, Inc. is one of the

pioneer collegiate institutions in Davao del Sur. It offers Bachelor of

Science in Criminology course. It has produced competitive

professionals both in the public and private sectors. It is located in

McArthur Highway 8002 Digos City, Philippines.

Respondents

The respondents of this study were the 50 randomly selected

students of Polytechnic College of Davao del Sur, Inc.

Research instruments/s

The instrument that was used in this study was the survey

questionnaires that was prepared by the researcher and were

evaluated by the panelists during their defense.

Statistical Treatment

The data was analyzed using descriptive statistics. The data

was treated with the use of the Arithmetic mean and pearson-R
24

1. Percentage

P= f/n x100

Where:

P= Percentage

F= Frequency

N= Number of respondents

100 = Constant to eliminate decimal point

2. Weighted Mean

Wm = fx
N

Where:

X- Weighted mean

fx Sum of the product of f and x scores

3.Pearson r

Rp =dxdy
(N-1)(sdx)(dy)

Where:
25

Rp =Persons coefficient of correlation

dxdy =the sum of the product of the deviation of x and y

variables

Sdx = Standard deviation of x

Dy = Standard deviation of y

N = Number of subject

POLYTECHNIC COLLEGE OF DAVAO DEL SUR,INC

Mc Arthur highway, Brgy Kiagot

Digos City

Name:________________ Year & Course___________

Please mark check () if you answer is YES on the yes box


and mark ( X ) if your answer is NO on the no box.

yes No

1. Do you know Internet?

2. Are you using the Internet?

3. Are you using internet on Mobile phone?

4. Do you have your own personal computer


and internet connection?

5. Do you know what cybercrime prevention


act of 2012 is?

6.Are you kind ,of person who likes Searching,


Chatting, e-Mailing, Video games
26

7. Do you have an e-mail account?

8. Did you experience getting a mail from


unknown Persons any time?

9. Do you use Facebook / twitter /Blog /

Any other social network site?

10. Do you know what Cyber Bullying is?

11. Do you download Movies, Songs,


Application, and Document from the internet?

12. Do you think downloading data over


Internet is legal or not?

13. Do you know what is Cyber Trespass or


hacking?

14. About your opinion what are advantages of


Internet

15. About your opinion what are disadvantages


of Internet

16. Do you know what computer viruses are?

17. Which connection/service do you use to


connect to the Internet? BSNL, VSNL, Cable,
Wi-Fi any other

18. Do you know what computer piracy is?

19. Do you use any antivirus for your computer


system protection?

20. Do you purchase the antivirus software?

21. How regularly you update your antivirus,


daily, weekly, monthly, yearly

22. Do you know what Plagiarism is?

23. Do you use the password for computer


security?

24. How regularly change the computer / mail


password, Daily, weekly, monthly, yearly
27

25 Are you a frequent user of Internet?

Polytechnic College of Davao Del Sur, Inc.

MacArthur Highway, Digos City

APPROVAL SHEET

In fulfillment of the requirements in Criminology Research 1


leading to the Bachelor of Science in Criminology this
undergraduate thesis entitled Level of awareness of the
Cybercrime Prevention Act of 2012 and the extent behavioral
change among Students of Polytechnic College of Davao Del
Sur. Inc. S.Y. 2016 - 2017, prepared and submitted by
Alexander A. Puto, Arjaybrent A Cayawin, Jeverson J. Alcoba, Rey
Anthony B. Apor is hereby to recommended for acceptance and
approval for Oral Examination.

Mr. Rex C. Parame, LET

Thesis Adviser

Panel of Examiners

Approved and accepted during an Oral Examination with a grade


of._______

Mr. Jan Dominic D. Nava, Rcrim, CSP Mrs. Lorna Q. Escharcha

Member Member

Ms. Chique M. Nacionales,MsCrim.

Chairperson

Accepted on partial fulfillment of the requirement in Criminology


Research 1 leading to the degree of Bachelor of Science in
Criminology.
28

Mrs. Ruth B. Cubita, RN, RM, MAN

Research Coordinator
APPENDIX D

LETTER TO THE RESPONDENTS

POLYTECHNIC COLLEGE OF DAVAO DEL SUR, INC.

Mac Arthur Highway, Digos City

Dear Respondent,

We, a group of 3rd year student taking Bachelor of Science in


Criminology are conducting a study on the Level of awareness on
the Cybercrime Prevention Act of 2012 and Extent Behavioral
Change Among Students of Polytechnic College of Davao Del Sur,
Inc. S. Y. 2016 - 2017 . We are requesting for your cooperation and
participation in answering the questionnaire attached with this
letter. We can assure you that all of these will be kept confidential.

We hope for your positive response. Thank you!

Sincerely Yours,

Arjaybrent A. Cayawin

Jeverson J.Alcoba Jr.

Rey Anthony B. Apor

Alexander A. Puto
29

LEVEL OF AWARENESS OF THE CYBERCRIME PREVENTION

ACT OF 2012 AND THE EXTENT OF SELF-CONTROL

AMONG THE STUDENTS OF POLYTECHNIC COLLEGE

OF DAVAO DEL SUR.INC

S. Y. 2016 - 2017

POLYTECHNIC COLLEGE OF DAVAO DEL SUR, INC

Criminology Department

Digos City

ARJAYBRENT A. CAYAWIN

JEVERSON J. ALCOBA Jr.

REY ANTHONY B. APOR

ALEXANDER A PUTO

October 2016
30

ACKNOWLEDGEMENT

The researchers gratefully express their sincere appreciation

to many people whose assistance and unselfish help made this

study possible. Heartfelt thanks to our mentors, colleagues, and

friends who pave the way for the realization of this study.

To Mr. Rex C. Parame, LET, Adviser, for his guidance, concern,

supervision and encouragement. Despite his hectic schedule.

To Ms. Chique M. Nacionales, MsCRIM, Dean, Criminology

Department, for her heartfelt support and who impart her

knowledge and experience in research work to the researchers.

To the researchers instructor, Ruth B. Cubita, RM, RN, MAN,

for teaching the basics on research and her patience , invaluable

advices, help, corrections and suggestions.

To our Parents who extended their spiritual and financial

support, without them this project could have not made possible

and nevertheless we wouldnt have treasured at school.

Above all to the Almighty and Loving God, the source of all

the blessing and wisdom, for sustaining grace that made this

research a reality.

-The researchers-

Table of Content
31

Title Page. i

Table of Content.. ii

Approval Sheet..

iii

Acknowledgement... iv

Dedication v

Chapter 1

The problem and its Setting.. 1

The Statement of the Problem. 3

The theoretical background... 4

The conceptual framework.. 6

The Significance of the study 7

Definition of Terms. 8

Chapter 2

Review of Related Literature. 9

Chapter 3

Methodology
32

Вам также может понравиться