Anda di halaman 1dari 32

1

CHAPTER I
THE PROBLEM AND ITS SETTING
Introduction
According to (britz 2008) over the past two decades,
Cybercrimes

has

emerged

as

salient

area

of

inquiry

for

criminologist and a growing concern for public policy. Although there


are many definition of Cybercrime, the term generally refers to the
crimes committed through the use of computers and computer
networks, but it also includes crimes that do not rely heavily on
computers
Cybercrime is a term used to broadly describe criminal
activity in which computers or computer networks are a tool, a
target, or a place of criminal activity and include everything from
electronic cracking to denial of service attacks. It is also used to
include traditional crimes in which computers or networks are used
to enable the illicit activity. The Cyber crime can halt any railway
where it is, it may misguide the planes on its flight by misguiding
with wrong signals, it may cause any important military data to fall
in the hands of foreign countries, and it may halt e-media and every
system can collapse within a fraction of seconds.
The present study has been undertaken to touch some
aspects, effect and prospects of this cyber-technology with special

reference to threat poses of Cyber crime by India. Efforts have been


made to analyze legal framework available for its control in India. To
start with, it is, therefore, necessary to demarcate the dimensions
of word crime. Thus it is beyond doubt that crime is a relative
phenomenon, universal in nature and essentially all societies from
ancient to modern have been evidently demonstrating its presence.
Each society have been providing its own description of criminal
behavior and conduct made punishable by express will of the
political community ruling over the society and it was always
influence by religious-social-political economical values prevailing in
the given society. Thus from time immemorial the behavior that
attracts Penal liability influenced and characterized by overall
outcome of these standards. Parenthetically, just as concept of
crime [has undergone] change with the growth of Information
Technology so the categories of criminals who engage in such
crimes. So far Indian society is concerned, particularly during
ancient

period,

the

definition

of

crime

flagged

by

religious

interpretation. The period was known for complete ominance of


religion. All political and social activities in general and 'Crime' in
particular, considered to be happened due to the presence of supernatural power. The Demonological theory of crime causation was an
outcome of this period.
The Department of Justice (DOJ) has ordered the filing of the
first case under the controversial Cybercrime Prevention Act of 2012

in connection with a computer-related forgery. The crime of


computer-related forgery under the cybercrime law covers the act
of using computer data for making fraudulent plans or transactions.

Statement of the Problem


This study aims to find out the level of awareness on the
Cybercrime Prevention Act of 2012 and the extent of behavioral
change among students of Polytechnic College of Davao Del Sur,
Inc. S. Y. 2016 2017. Specifically, it seeks to answer the following
questions:
1. What is the profile of respondents when grouped by
course?
2. What is the level of awareness of the respondents about
the Cybercrime Prevention Act of 2012 when analyzed by:
2.1.

Course, and

2.2.

Overall?

3. What is the extent of behavioral change in the use of


internet among the respondents when analyzed according
to:
3.1.

Course , and

3.2.

Overall?

4. Is there a significant relationship between the level of


awareness and extent of behavioral change among the
respondents?
Statement of the hypothesis
Since Criminology has started viewing the emergence of
cybercrime as a new locus of criminal activity, a new theory is
needed to explain why cybercrime occurs.
Transition theory is an explanation for the criminal behavior in
the cyber space. There is a need to test the space transition theory
to see if it explains cyber criminal activity (Jaishancar 2008)
Theoretical Background
This study is anchored on Michael Gottfredson and Travis
Hirschi Theory of low self control, which is defined as the inability by
an individual to exercise personal restraints in the face of tempting
immediate easy gratification both in short and long term (Hirchi
2004). Gottfredson and Hirschi also maintained that an individuals
level of self control is establish early in life, between the ages of 8
to 10, is a product of ineffective child rearing, and has many diverse
manifestation that reverberate through the life cycle (bullying, bad
grades, delinquency, dropping out of school, alcoholism, crime and
unemployment).

Grasmick et al.(1993) Cited To our best knowledge, to the


date there is only one study that has explored the relationship
between levels of self control and cybercrime. Using a sample of
college students enrolled at a southeastern university in the U.S.
and attitudinal measures of self control
Bossler and Holt (2010) Cited and assessed the effect of self
control on the probability of experiencing five forms of cybercrime
victimization: unauthorized access to ones computer without the
knowledge or permission, data loss due to malware infection, and
online harassment.

Conceptual Framework

Independent Variables

Dependent

Variables

Behavioral change among


students of Polytechnic
College of Davao Del Sur,
Inc.

Level of awareness
Cybercrime
Prevention
Act of 2012

Course

S.Y. 2016 - 2017

Figure 1. Schematic Diagram showing the variables of the

study
Over the past two decades, cybercrime has emerged as a
salient area of inquiry for criminologists and a growing concern for
public policy. Although there are many definitions of cybercrime, the
term generally refers to crimes committed through the use of
computers and computer networks, but it also includes crimes that
do not rely heavily on computers (Britz, 2008). Extant research has
explored the nature and extent of cybercrime (Cukier & Levin,

2009; Finley, 2009; Finn, 2004; Geis et al., 2009; Huang etal.,
2009; Jaishankar, Halder, & Ramdoss.

Scope and limitation


This study focus on the level of awareness on the Cybercrime
Prevention Act of 2012 and the extent behavioral change among
students of Polytechnic College of Davao Del Sur. S.Y. 2016 2017.
This was conducted at Polytechnic College of Davao Del Sur. The
data gathered through the hand made questionnaire to identify the
level of awareness of the polytechnic college of Davao Del Sur, Inc.
Students about the Cybercrime Prevention Act of 2012.

Significance of the study


The main purpose of this study was to determine the level of
awareness on the cybercrime prevention act of 2012 and the extent
of behavioral change among students of Polytechnic College of
Davao Del Sur, Inc. S. Y. 2016, 2017.in addition, the study seek to
detect the relationship of two variables. Hence the result of the
study will be a great help to the following beneficiaries:
Deans/ Directors. The output of this study will shed light
among the school heads to conceptualize the cybercrime prevention

Act of 2012 to heighten the level of awareness among students of


polytechnic college of Davao Del Sur, inc.
Faculty. The result of this study will be a great help for the
teachers on how to motivate the students the proper usage of the
computers, internet and social media sites that will heighten their
level of maturation.
Students. The output of this study will provide guidelines to
the students on what type or appropriate words they will post or
sends. it will also increase the level of enhancement and motivation
to achieve their goals .
Future researchers. The output of this study serves to give
information and knowledge to the future researchers about the
cybercrime prevention Act of 2012 so that they will not find it hard
to gather data.

Definition of Terms
In

the

terminologies

desire
used

to
in

have
the

better

study,

the

understanding

in

following

defined

are

the

conceptually and operationally:


Cybercrime - Is a form of illicit criminal activity conducted over the
internet or another computer.

Act - Something that is do ne.


Awareness - Knowing and understanding a lot about what is
happening in the world or around you.
Pornography Sexually explicit videos, photographs, writings, or
the like, whose purpose is to elicit sexual arousal.
Cyber bullying is the use of cell phones, instant messaging,
email,

chat

rooms

or social

networking sites

such

as Facebook and Twitter to harass, threaten or intimidate someone


Cyber trespass A person is guilty of computer trespass if s/he
intentionally and without authorization accesses, alters, deletes,
damages, destroys, or disrupts any computer, computer system,
computer network, computer program, or data.
Cyber Fraud Online theft of credit card number, expiration date,
and other information for criminal use is cyber fraud.
Money laundering is the process of transforming the proceeds
of crime and corruption into ostensibly legitimate assets.
Plagiarism - Is the "wrongful appropriation" and "stealing and
publication" of another author's "language, thoughts, ideas, or
expressions" and the representation of them as one's own original
work.

10

Review of Related Literature


Presented in this portion are the related ideas and information
taken from the books, journals, researches and interviews. The
conclusion of relevant information about the level of awareness of
the students of Polytechnic College of Davao Del Sur. Inc. Students
on the Cybercrime Prevention Act of 2012 which will be discuss
thoroughly below.
Cybercrime
According to Kshetr, (2010). Theorist of the internet agrees
that cyberspace makes possible near and instant interactions
between individuals who are spatially distant, which creates
possibility for new forms of association which in turn gives rise to
cyber crime and cyber deviance. Cyber crime, in simple terms, is a
crime that is facilitated or committed using a computer, network or
hardware device. The computer or device may be the agent of the
crime, the facilitator of the crime, or the target of the crime. It can
take place on the computer alone, or in other virtual or non virtual
locations. It is recognized that current legal definition of cyber crime
varies drastically between jurisdictions. A practical definition of a
cyber crime is offered According to him, Cyber Crime is defined as a
criminal activity in which computers or computer networks are the
principal means of committing an offence or violating laws, rules or
regulations. Examples of cyber crime include denial of service

11

attacks,

cyber-theft,

cyber

trespass,

cyber

obscenity,

critical

infrastructure attacks, online fraud, online money laundering, ID


fraud, cyber terrorism, and cyber extortions. It is evident that
organized criminal organizations use cyber crime extensively to
collaborate and connect with their vast network which is spread
across globe. The synergy between organized crime and the
internet has thus increased the insecurity of the digital world.

Cyber Fraud
Hani Durzy, an eBay spokesperson in USA cited that another
form of cybercrime which has a firm grip on society is cyber fraud
and scams online. But, the problem with this is the lack of
systematic and official data. Internet Crime Complain Centre (ICCC)
is the only source available whose primary role is to receive public
reports of cybercrime and refer them to the relevant criminal justice
agencies for action, claims that frauds ascent for only 0.01% of
transactions undertaken using the site yet this would amount to
3000 frauds per day, given that more than 30 million auctions take
place on eBay daily Cha (2005)17. The fact is that a growing
number of internet auction sites provide thieves a global market
through which they sell stolen items to unsuspecting customers.

Pornography

12

According to Lane (2001) Internet is easily accessed on


computer, pocket PC, wireless, mobile phone, etc. In the late 1970s
and early 1980s, programmers were zealously developing software
enabling images that are transmitted, recomposed and viewed
through Usenet systems. By 1996, of the ten most popular Usenet
groups, five were sexually oriented and one (atl.Sex. Net) attracted
some 5, 00,000 readers every day. To a much surprise pornography
is the first successful e-commerce product. An important mention
here is about a case which was filed in the Juvenile Court, Delhi on
the charge of cyber pornography. Some jurist says this is the first
Indian cyber pornographic case which was charge sheeted in the
juvenile court. A student of a reputed school, New Delhi Was
arrested by Delhi police in year 2001, April because he created a
porn website as revenge of having being teased by classmates and
teachers. He listed the names of his 12 schoolmate girls and
teachers in sexually explicit manner. He was charged under section
67 of the Information Technology Act 2000 and section 292,293,
294 of the Indian penal code and the indecent representation of
Women act.
Cyber Bullying
Cyber bullying is an extension of physical bullying. It has two
forms; Overt and Covert. Overt bullying is physical aggression and
includes beating, kicking and sexual touching. Overt bullying is
often accompanied by covert bullying in which victims are excluded

13

from friends group, stalked, gossiped about, verbally harassed and


threatened. Cyber bullying is carried by adolescents through
Internet. As more and more youth are using the internet for
interpersonal relationships, the risk of being bullied is increasing. It
leads to depression, anger and sometimes even suicide.
According

to

Camarines

Sur

Rep.

Rolando

Andaya

on

Wednesday, May 27 proposed a bill aiming to define and penalize


the crime of cyber bullying. The lawmaker wrote the Anti-Cyber
Bullying Act of 5718 or An act of defining and penalizing the crime
of cyber-bullying in an attempt to encourage people to become
responsible netizens and make them accountable for their cyber
actions.Cyber bullying is o ne such problem that the advancement
in technology and social media has generated. It can potentially
affect not only school-aged children, but also any individual who has
access to a mobile phone or the Internet, Andaya said.
Cyber bullying, according to the bill, are acts of cruelty
committed using the Internet or any form of electronic media or
technology that has the effect of stripping ones dignity or causing
reasonable fear or physical or emotional harm.
Among other offenses included in the bill that defines the scope of
cyber bullying are:
Repeated sending of offensive, rude and insulting message,
distributing and belittling information about the victim;

14

Posting or sending of offensive photos of the victim, whether


digitally altered or not, or were taken with or without consent, as
long as it has intention to humiliate and embarrass the victim;
Breaking into an e-mail, social networking or any electronic
account and using the victims virtual identity to send, upload or
distribute embarrassing materials to or about others, sharing the
victims personal or embarrassing information and sharing it to
others and repeated sending of messages such as threats or harm
or engaging in online activities causing fear on victims safety. If
passed, netizens convicted of cyber bullying would be fined a
penalty of P50, 000 but not more than P100,000 and imprisonment
of not less than six months, but not more than six years, or both.
Because of the anonymity that the Internet gives, social and moral
norms are easily switched off and users are emboldened to just say
or post anything online without accountability, Andaya explained.
The Camarines Sur Representative noted that Internet bashing has
become a culture among Internet users and even initiates problems
that

involve

Philstar.com)

Plagiarism

hostility

and

aggression. (With

reports

from

15

Is the intentional or unintentional use of the work of another


without

proper

acknowledgment.

You

may

be

aware

that

reproducing the published words of another without acknowledging


the source of the words is plagiarism; however, you might be
unaware

of

the

scope

of

the

concept

of

plagiarism.

The

term plagiarism applies not only to the published word, but also to
unpublished

materials,

the

spoken

word,

opinions,

theories,

pictures, graphs, and statistics. In fact, plagiarism might occur at


any time when the material of another is being used, regardless of
the source or format of the material. An example of a situation in
which unintentional plagiarism can easily occur is when students
work together, formally or informally, on a class assignment. If you
do collaborative work with other students and then use their ideas
or material in the work you submit, you must credit the work of the
other students. If you do not properly acknowledge that you have
incorporated the work of other students into your materials, you are
guilty of plagiarism.
In addition, you might not appreciate that plagiarism is not
limited to copying verbatim from a source but also occurs when you
paraphrase the work of another.
The sole exception to the rule that all materials being used must be
properly acknowledged is if the material being used is common
knowledge. Information and ideas that appear in many places or

16

that are readily available to anyone would be regarded as common


knowledge. You may not know what a common knowledge in your
discipline is. When in doubt, err on the side of citing your source.
The appropriate method of acknowledging source materials
varies from discipline to discipline and from instructor to instructor.
References to source materials might be given in footnotes,
endnotes, a bibliography together with pointers in the text
indicating where and which bibliographical item was used, or
possibly in the body of your text. You should talk to your instructors
about their requirements for properly acknowledging sources.
Cyber Trespass
According to BizLegis (April 2, 2012). the word trespass in
general means to enter into the others property without seeking
consent. It is considered a civil wrong ordinarily. If the trespass is
committed with criminal intention it is called criminal trespass. To
protect an owners control over the property the trespass actions
are stranded. The websites should also be considered a species of
property. The concept of trespass is applicable in cases of the cyber
world and may be termed as Cyber Trespass. The act of hacking by
the hacker is of civil nature, but if the intention to harm or damage
the system is proved, the liability is of penal nature. The hacking
may also result in other crimes mentioned in the Indian Penal Code
1860 apart from criminal trespass. For example if a hacker hacks

17

into the Information Technology Act tries to the website of a bank


and transfers money into his account this may constitute a crime
under Section 378 of the Indian Penal Code 1860. The act in the
above case can also be termed as Cyber Theft. The Information
Technology Act provides civil and penal consequences for hacking
and other wrongful activities.
The technological development has given rise to gadgets like
computers, laptops, tablets and other instruments which can also be
a cause of rampant tort of Cyber Trespass. The computer is used as
a tool for activities like email spoofing, cyber defamation and also
used as a target like in the cases of unauthorized access, email
bombing, Trojan attacks or sometimes for both. This is called cyber
crimes. It is difficult to eliminate cyber trespass from the cyber
world; however it is quite possible to check them. The computer
data may also contain personal information, so the hacker can also
infringe ones right to privacy guaranteed by Indian Constitution
under Article 21. The global connectivity is facilitated by internet
having impact on few areas of tort. There is trespass to property
and persons in the cyber world like.

Money laundering

Anti-Money Laundering Act of 2001 (RA 9160) an act defining the


crime of money laundering, providing penalties there for and for

18

other purposes Be it enacted by the Senate and House of


Representatives of the Philippines in Congress assembled: SECTION
1. Short Title. This Act shall be known as the "Anti-Money
Laundering Act of 2001." SEC. 2. Declaration of Policy. It is hereby
declared the policy of the State to protect and preserve the integrity
and confidentiality of bank accounts and to ensure that the
Philippines shall not be used as a money laundering site for the
proceeds of any unlawful activity. Consistent with its foreign policy,
the State shall extend cooperation in transnational investigations
and prosecutions of persons involved in money laundering activities
wherever committed. SEC. 3. Definitions. For purposes of this Act,
the following terms are hereby defined as follows: (a) "Covered
institution" refers to: (1) banks, non-banks, quasi-banks, trust
entities, and all other institutions and their subsidiaries and affiliates
supervised or regulated by the Bangko Sentral ng Pilipinas (BSP),
(2) insurance companies and all other institutions supervised or
regulated by the Insurance Commission, and (3) securities dealers,
brokers, salesmen, investment houses and other similar entities
managing securities or rendering services as investment agent,
advisor,

or

consultant,

mutual

funds,

close-end

investment

companies, common trust funds, pre-need companies and other


similar entities,

foreign exchange corporations, money changers,

money payment, remittance, and transfer companies and other


similar entities, and

other entities administering or otherwise

19

dealing in currency, commodities or financial derivatives based


thereon, valuable objects, cash substitutes and other similar
monetary instruments or property supervised or regulated by
Securities and Exchange Commission and Exchange Commission (b)
"Covered transaction" is a single, series, or combination of
transactions involving a total amount in excess of Four million
Philippine pesos (Php4,000,000.00) or an equivalent amount in
foreign currency based on the prevailing exchange rate within five
(5) consecutive banking days except those between a covered
institution and a person who, at the time of the transaction was a
properly identified client and the amount is commensurate with the
business or financial capacity of the client; or those with an
underlying legal or trade obligation, purpose, origin or economic
justification. It likewise refers to a single, series or combination or
pattern of unusually large and complex transactions in excess of
Four million Philippine pesos (Php4,000,000.00) especially cash
deposits and investments having no credible purpose or origin,
underlying trade obligation or contract. (c) "Monetary instrument"
refers to: (1) coins or currency of legal tender of the Philippines, or
of any other country; (2) drafts, checks and notes. (3) securities or
negotiable

instruments,

bonds,

commercial

papers,

deposit

certificates, trust certificates, custodial receipts or deposit substitute


instruments, trading orders, transaction tickets and confirmations of
sale or investments and money market instruments; and (4) other

20

similar instruments where title thereto passes to another by


endorsement, assignment or delivery. (d) "Offender" refers to any
person who commits a money laundering offense. (e) "Person"
refers to any natural or juridical person. (f) "Proceeds" refers to an
amount

derived

or

realized

from

an

unlawful

activity.

(g)

"Supervising Authority" refers to the appropriate supervisory or


regulatory agency, department or office supervising or regulating
the

covered

institutions

enumerated

in

Section

3(a).

(h)

"Transaction" refers to any act establishing any right or obligation or


giving rise to any contractual or legal relationship between the
parties thereto. It also includes any movement of funds by any
means with a covered institution. (i) "Unlawful activity" refers to
any act or omission or series or combination thereof involving or
having relation to the following: (1) Kidnapping for ransom under
Article 267 of Act No. 3815, otherwise known as the Revised Penal
Code, as amended; (2) Sections 3, 4, 5, 7, 8 and 9 of Article Two of
Republic Act No. 6425, as amended, otherwise known as the
Dangerous Drugs Act of 1972; (3) Section 3 paragraphs B, C, E, G,
H and I of Republic Act No. 3019, as amended; otherwise known as
the Anti-Graft and Corrupt Practices Act; (4) Plunder under Republic
Act No. 7080, as amended; (5) Robbery and extortion under Articles
294, 295, 296, 299, 300, 301 and 302 of the Revised Penal Code,
as amended; (6) Jueteng and Masiao punished as illegal gambling
under Presidential Decree No. 1602; (7) Piracy on the high seas

21

under the Revised Penal Code, as amended and Presidential Decree


No. 532; (8) Qualified theft under Article 310 of the Revised Penal
Code, as amended; (9) Swindling under Article 315 of the Revised
Penal Code, as amended; (10) Smuggling under Republic Act Nos.
455 and 1937; (11) Violations under Republic Act No. 8792,
otherwise known as the Electronic Commerce Act of 2000.
Cyber Trespass
According to BizLegis (April 2, 2012 ) the word trespass in
general means to enter into the others property without seeking
consent. It is considered a civil wrong ordinarily. If the trespass is
committed with criminal intention it is called criminal trespass. To
protect an owners control over the property the trespass actions
are stranded. The websites should also be considered a species of
property. The concept of trespass is applicable in cases of the cyber
world and may be termed as Cyber Trespass. The act of hacking by
the hacker is of civil nature, but if the intention to harm or damage
the system is proved, the liability is of penal nature. the hacking
may also result in other crimes mentioned in the Indian Penal Code
1860 apart from criminal trespass. For example if a hacker hacks
into the Information Technology Act tries to the website of a bank
and transfers money into his account this may constitute a crime
under Section 378 of the Indian Penal Code 1860. The act in the
above case can also be termed as Cyber Theft. The Information

22

Technology Act provides civil and penal consequences for hacking


and other wrongful activities.
The technological development has given rise to gadgets like
computers, laptops, tablets and other instruments which can also be
a cause of rampant tort of Cyber Trespass. The computer is used as
a tool for activities like email spoofing, cyber defamation and also
used as a target like in the cases of unauthorized access, email
bombing, Trojan attacks or sometimes for both. This is called cyber
crimes. It is difficult to eliminate cyber trespass from the cyber
world; however it is quite possible to check them. The computer
data may also contain personal information, so the hacker can also
infringe ones right to privacy guaranteed by Indian Constitution
under Article 21. The global connectivity is facilitated by internet
having impact on few areas of tort. There is trespass to property
and persons in the cyber world like.
CHAPTER 3
METHODOLOGY
This chapter is about the research method and procedures
that were use in the completion of this study. These include
research

design,

research

locale,

respondents,

research

instrument/s, sources of data and methods of collecting data, and


treatment of data.
Research Design

23

This study employs the descriptive research method to


determine the following: the level of awareness of the Polytechnic
College of Davao del Sur, Inc. students on the Cybercrime
prevention act of 2012 in terms of Cyber Terrorism, Pornography,
Cyber Bullying, Cyber Prostitution, Cyber Laundering, Plagiarism,
Piracy, Cyber Trespass (hacking),
Research Locale
Polytechnic College of Davao del Sur, Inc. is one of the
pioneer collegiate institutions in Davao del Sur. It offers Bachelor of
Science

in

Criminology

course.

It

has

produced

competitive

professionals both in the public and private sectors. It is located in


McArthur Highway 8002 Digos City, Philippines.
Respondents
The respondents of this study were the 50 randomly selected
students of Polytechnic College of Davao del Sur, Inc.
Research instruments/s
The instrument that was used in this study was the survey
questionnaires that was prepared by the researcher and were
evaluated by the panelists during their defense.
Statistical Treatment
The data was analyzed using descriptive statistics. The data
was treated with the use of the Arithmetic mean and pearson-R

24

1. Percentage
P= f/n x100
Where:
P= Percentage
F= Frequency
N= Number of respondents
100 = Constant to eliminate decimal point

2. Weighted Mean
Wm = fx
N
Where:
X- Weighted mean
fx Sum of the product of f and x scores

3.Pearson r
Rp =dxdy
(N-1)(sdx)(dy)

Where:

25

Rp =Persons coefficient of correlation


dxdy =the sum of the product of the deviation of x and y
variables
Sdx = Standard deviation of x
Dy = Standard deviation of y
N = Number of subject

POLYTECHNIC COLLEGE OF DAVAO DEL SUR,INC


Mc Arthur highway, Brgy Kiagot
Digos City

Name:________________ Year & Course___________


Please mark check () if you answer is YES on the yes box
and mark ( X ) if your answer is NO on the no box.
yes
1. Do you know Internet?
2. Are you using the Internet?
3. Are you using internet on Mobile phone?
4. Do you have your own personal computer
and internet connection?
5. Do you know what cybercrime prevention
act of 2012 is?
6.Are you kind ,of person who likes Searching,
Chatting, e-Mailing, Video games

No

26

7. Do you have an e-mail account?


8. Did you experience getting a mail from
unknown Persons any time?
9. Do you use Facebook / twitter /Blog /
Any other social network site?
10. Do you know what Cyber Bullying is?
11. Do you download Movies, Songs,
Application, and Document from the internet?
12. Do you think downloading
Internet is legal or not?

data

over

13. Do you know what is Cyber Trespass or


hacking?
14. About your opinion what are advantages of
Internet
15. About your opinion what are disadvantages
of Internet
16. Do you know what computer viruses are?
17. Which connection/service do you use to
connect to the Internet? BSNL, VSNL, Cable,
Wi-Fi any other
18. Do you know what computer piracy is?
19. Do you use any antivirus for your computer
system protection?
20. Do you purchase the antivirus software?
21. How regularly you update your antivirus,
daily, weekly, monthly, yearly
22. Do you know what Plagiarism is?
23. Do you use the password for computer
security?
24. How regularly change the computer / mail
password, Daily, weekly, monthly, yearly

27

25 Are you a frequent user of Internet?

Polytechnic College of Davao Del Sur, Inc.


MacArthur Highway, Digos City

APPROVAL SHEET
In fulfillment of the requirements in Criminology Research 1
leading to the Bachelor of Science in Criminology this
undergraduate thesis entitled Level of awareness of the
Cybercrime Prevention Act of 2012 and the extent behavioral
change among Students of Polytechnic College of Davao Del
Sur. Inc. S.Y. 2016 - 2017, prepared and submitted by
Alexander A. Puto, Arjaybrent A Cayawin, Jeverson J. Alcoba, Rey
Anthony B. Apor is hereby to recommended for acceptance and
approval for Oral Examination.
Mr. Rex C. Parame, LET
Thesis Adviser

Panel of Examiners
Approved and accepted during an Oral Examination with a grade
of._______
Mr. Jan Dominic D. Nava, Rcrim, CSP

Member

Mrs. Lorna Q. Escharcha

Member

Ms. Chique M. Nacionales,MsCrim.


Chairperson

Accepted on partial fulfillment of the requirement in Criminology


Research 1 leading to the degree of Bachelor of Science in
Criminology.

28

Mrs. Ruth B. Cubita, RN, RM, MAN


Research Coordinator
APPENDIX D
LETTER TO THE RESPONDENTS
POLYTECHNIC COLLEGE OF DAVAO DEL SUR, INC.
Mac Arthur Highway, Digos City

Dear Respondent,
We, a group of 3rd year student taking Bachelor of Science in
Criminology are conducting a study on the Level of awareness on
the Cybercrime Prevention Act of 2012 and Extent Behavioral
Change Among Students of Polytechnic College of Davao Del Sur,
Inc. S. Y. 2016 - 2017 . We are requesting for your cooperation and
participation in answering the questionnaire attached with this
letter. We can assure you that all of these will be kept confidential.
We hope for your positive response. Thank you!

Sincerely Yours,

Arjaybrent A. Cayawin
Jeverson J.Alcoba Jr.
Rey Anthony B. Apor
Alexander A. Puto

29

LEVEL OF AWARENESS OF THE CYBERCRIME PREVENTION


ACT OF 2012 AND THE EXTENT OF SELF-CONTROL
AMONG THE STUDENTS OF POLYTECHNIC COLLEGE
OF DAVAO DEL SUR.INC
S. Y. 2016 - 2017

POLYTECHNIC COLLEGE OF DAVAO DEL SUR, INC


Criminology Department
Digos City

ARJAYBRENT A. CAYAWIN
JEVERSON J. ALCOBA Jr.
REY ANTHONY B. APOR
ALEXANDER A PUTO
October 2016

30

ACKNOWLEDGEMENT

The researchers gratefully express their sincere appreciation


to many people whose assistance and unselfish help made this
study possible. Heartfelt thanks to our mentors, colleagues, and
friends who pave the way for the realization of this study.
To Mr. Rex C. Parame, LET, Adviser, for his guidance, concern,
supervision and encouragement. Despite his hectic schedule.
To Ms. Chique M. Nacionales, MsCRIM, Dean, Criminology
Department,

for

her

heartfelt

support

and

who

impart

her

knowledge and experience in research work to the researchers.


To the researchers instructor, Ruth B. Cubita, RM, RN, MAN,
for teaching the basics on research and her patience , invaluable
advices, help, corrections and suggestions.
To our Parents who extended their spiritual and financial
support, without them this project could have not made possible
and nevertheless we wouldnt have treasured at school.
Above all to the Almighty and Loving God, the source of all
the blessing and wisdom, for sustaining grace that made this
research a reality.
-The researchersTable of Content

31

Title Page. i
Table of Content.. ii
Approval Sheet..
iii
Acknowledgement... iv
Dedication v
Chapter 1
The problem and its Setting.. 1
The Statement of the Problem. 3
The theoretical background... 4
The conceptual framework.. 6
The Significance of the study 7
Definition of Terms. 8
Chapter 2
Review of Related Literature. 9
Chapter 3
Methodology

32

Anda mungkin juga menyukai