Академический Документы
Профессиональный Документы
Культура Документы
CHAPTER I
Introduction
computers
to enable the illicit activity. The Cyber crime can halt any railway
with wrong signals, it may cause any important military data to fall
in the hands of foreign countries, and it may halt e-media and every
the given society. Thus from time immemorial the behavior that
questions:
course?
2.2. Overall?
to:
3.2. Overall?
respondents?
the cyber space. There is a need to test the space transition theory
Theoretical Background
unemployment).
5
date there is only one study that has explored the relationship
Bossler and Holt (2010) Cited and assessed the effect of self
online harassment.
Conceptual Framework
6
Variables
study
2009; Finley, 2009; Finn, 2004; Geis et al., 2009; Huang etal.,
Davao Del Sur, Inc. S. Y. 2016, 2017.in addition, the study seek to
Faculty. The result of this study will be a great help for the
computers, internet and social media sites that will heighten their
level of maturation.
cybercrime prevention Act of 2012 so that they will not find it hard
to gather data.
Definition of Terms
work.
10
thoroughly below.
Cybercrime
crime, the facilitator of the crime, or the target of the crime. It can
Cyber Fraud
and scams online. But, the problem with this is the lack of
agencies for action, claims that frauds ascent for only 0.01% of
3000 frauds per day, given that more than 30 million auctions take
Pornography
12
computer, pocket PC, wireless, mobile phone, etc. In the late 1970s
groups, five were sexually oriented and one (atl.Sex. Net) attracted
here is about a case which was filed in the Juvenile Court, Delhi on
the charge of cyber pornography. Some jurist says this is the first
Women act.
Cyber Bullying
Internet. As more and more youth are using the internet for
affect not only school-aged children, but also any individual who has
Among other offenses included in the bill that defines the scope of
penalty of P50, 000 but not more than P100,000 and imprisonment
of not less than six months, but not more than six years, or both.
Because of the anonymity that the Internet gives, social and moral
norms are easily switched off and users are emboldened to just say
Philstar.com)
Plagiarism
15
term plagiarism applies not only to the published word, but also to
do collaborative work with other students and then use their ideas
or material in the work you submit, you must credit the work of the
incorporated the work of other students into your materials, you are
guilty of plagiarism.
limited to copying verbatim from a source but also occurs when you
The sole exception to the rule that all materials being used must be
discipline is. When in doubt, err on the side of citing your source.
possibly in the body of your text. You should talk to your instructors
Cyber Trespass
may also result in other crimes mentioned in the Indian Penal Code
and transfers money into his account this may constitute a crime
under Section 378 of the Indian Penal Code 1860. The act in the
a tool for activities like email spoofing, cyber defamation and also
data may also contain personal information, so the hacker can also
Money laundering
declared the policy of the State to protect and preserve the integrity
entities, and all other institutions and their subsidiaries and affiliates
of any other country; (2) drafts, checks and notes. (3) securities or
Article 267 of Act No. 3815, otherwise known as the Revised Penal
the Anti-Graft and Corrupt Practices Act; (4) Plunder under Republic
Act No. 7080, as amended; (5) Robbery and extortion under Articles
294, 295, 296, 299, 300, 301 and 302 of the Revised Penal Code,
under Presidential Decree No. 1602; (7) Piracy on the high seas
21
No. 532; (8) Qualified theft under Article 310 of the Revised Penal
455 and 1937; (11) Violations under Republic Act No. 8792,
Cyber Trespass
may also result in other crimes mentioned in the Indian Penal Code
and transfers money into his account this may constitute a crime
under Section 378 of the Indian Penal Code 1860. The act in the
a tool for activities like email spoofing, cyber defamation and also
data may also contain personal information, so the hacker can also
CHAPTER 3
METHODOLOGY
treatment of data.
Research Design
23
Research Locale
Respondents
Research instruments/s
The instrument that was used in this study was the survey
Statistical Treatment
was treated with the use of the Arithmetic mean and pearson-R
24
1. Percentage
P= f/n x100
Where:
P= Percentage
F= Frequency
N= Number of respondents
2. Weighted Mean
Wm = fx
N
Where:
X- Weighted mean
3.Pearson r
Rp =dxdy
(N-1)(sdx)(dy)
Where:
25
variables
Dy = Standard deviation of y
N = Number of subject
Digos City
yes No
APPROVAL SHEET
Thesis Adviser
Panel of Examiners
Member Member
Chairperson
Research Coordinator
APPENDIX D
Dear Respondent,
Sincerely Yours,
Arjaybrent A. Cayawin
Alexander A. Puto
29
S. Y. 2016 - 2017
Criminology Department
Digos City
ARJAYBRENT A. CAYAWIN
ALEXANDER A PUTO
October 2016
30
ACKNOWLEDGEMENT
friends who pave the way for the realization of this study.
support, without them this project could have not made possible
Above all to the Almighty and Loving God, the source of all
the blessing and wisdom, for sustaining grace that made this
research a reality.
-The researchers-
Table of Content
31
Title Page. i
Table of Content.. ii
Approval Sheet..
iii
Acknowledgement... iv
Dedication v
Chapter 1
Definition of Terms. 8
Chapter 2
Chapter 3
Methodology
32