CHAPTER I
THE PROBLEM AND ITS SETTING
Introduction
According to (britz 2008) over the past two decades,
Cybercrimes
has
emerged
as
salient
area
of
inquiry
for
period,
the
definition
of
crime
flagged
by
religious
Course, and
2.2.
Overall?
Course , and
3.2.
Overall?
Conceptual Framework
Independent Variables
Dependent
Variables
Level of awareness
Cybercrime
Prevention
Act of 2012
Course
study
Over the past two decades, cybercrime has emerged as a
salient area of inquiry for criminologists and a growing concern for
public policy. Although there are many definitions of cybercrime, the
term generally refers to crimes committed through the use of
computers and computer networks, but it also includes crimes that
do not rely heavily on computers (Britz, 2008). Extant research has
explored the nature and extent of cybercrime (Cukier & Levin,
2009; Finley, 2009; Finn, 2004; Geis et al., 2009; Huang etal.,
2009; Jaishankar, Halder, & Ramdoss.
Definition of Terms
In
the
terminologies
desire
used
to
in
have
the
better
study,
the
understanding
in
following
defined
are
the
chat
rooms
or social
networking sites
such
10
11
attacks,
cyber-theft,
cyber
trespass,
cyber
obscenity,
critical
Cyber Fraud
Hani Durzy, an eBay spokesperson in USA cited that another
form of cybercrime which has a firm grip on society is cyber fraud
and scams online. But, the problem with this is the lack of
systematic and official data. Internet Crime Complain Centre (ICCC)
is the only source available whose primary role is to receive public
reports of cybercrime and refer them to the relevant criminal justice
agencies for action, claims that frauds ascent for only 0.01% of
transactions undertaken using the site yet this would amount to
3000 frauds per day, given that more than 30 million auctions take
place on eBay daily Cha (2005)17. The fact is that a growing
number of internet auction sites provide thieves a global market
through which they sell stolen items to unsuspecting customers.
Pornography
12
13
to
Camarines
Sur
Rep.
Rolando
Andaya
on
14
involve
Philstar.com)
Plagiarism
hostility
and
aggression. (With
reports
from
15
proper
acknowledgment.
You
may
be
aware
that
of
the
scope
of
the
concept
of
plagiarism.
The
term plagiarism applies not only to the published word, but also to
unpublished
materials,
the
spoken
word,
opinions,
theories,
16
17
Money laundering
18
or
consultant,
mutual
funds,
close-end
investment
19
instruments,
bonds,
commercial
papers,
deposit
20
derived
or
realized
from
an
unlawful
activity.
(g)
covered
institutions
enumerated
in
Section
3(a).
(h)
21
22
design,
research
locale,
respondents,
research
23
in
Criminology
course.
It
has
produced
competitive
24
1. Percentage
P= f/n x100
Where:
P= Percentage
F= Frequency
N= Number of respondents
100 = Constant to eliminate decimal point
2. Weighted Mean
Wm = fx
N
Where:
X- Weighted mean
fx Sum of the product of f and x scores
3.Pearson r
Rp =dxdy
(N-1)(sdx)(dy)
Where:
25
No
26
data
over
27
APPROVAL SHEET
In fulfillment of the requirements in Criminology Research 1
leading to the Bachelor of Science in Criminology this
undergraduate thesis entitled Level of awareness of the
Cybercrime Prevention Act of 2012 and the extent behavioral
change among Students of Polytechnic College of Davao Del
Sur. Inc. S.Y. 2016 - 2017, prepared and submitted by
Alexander A. Puto, Arjaybrent A Cayawin, Jeverson J. Alcoba, Rey
Anthony B. Apor is hereby to recommended for acceptance and
approval for Oral Examination.
Mr. Rex C. Parame, LET
Thesis Adviser
Panel of Examiners
Approved and accepted during an Oral Examination with a grade
of._______
Mr. Jan Dominic D. Nava, Rcrim, CSP
Member
Member
28
Dear Respondent,
We, a group of 3rd year student taking Bachelor of Science in
Criminology are conducting a study on the Level of awareness on
the Cybercrime Prevention Act of 2012 and Extent Behavioral
Change Among Students of Polytechnic College of Davao Del Sur,
Inc. S. Y. 2016 - 2017 . We are requesting for your cooperation and
participation in answering the questionnaire attached with this
letter. We can assure you that all of these will be kept confidential.
We hope for your positive response. Thank you!
Sincerely Yours,
Arjaybrent A. Cayawin
Jeverson J.Alcoba Jr.
Rey Anthony B. Apor
Alexander A. Puto
29
ARJAYBRENT A. CAYAWIN
JEVERSON J. ALCOBA Jr.
REY ANTHONY B. APOR
ALEXANDER A PUTO
October 2016
30
ACKNOWLEDGEMENT
for
her
heartfelt
support
and
who
impart
her
31
Title Page. i
Table of Content.. ii
Approval Sheet..
iii
Acknowledgement... iv
Dedication v
Chapter 1
The problem and its Setting.. 1
The Statement of the Problem. 3
The theoretical background... 4
The conceptual framework.. 6
The Significance of the study 7
Definition of Terms. 8
Chapter 2
Review of Related Literature. 9
Chapter 3
Methodology
32