Manu Basta
Manu Basta
Manu Basta
SEPTEMBER 2021
i
UNIVERSITY OF SOUTHERN MINDANAO
Kabacan, Cotabato Philippines
Name
APPROVAL ALEJANDRO,
OF THESIS JOSE ENRICO P.
OUTLINE
Major N/A
Degree Sought BACHELOR OF SCIENCE IN CRIMINOLOGY
Specialization N/A
Thesis Title AWARENESS AND PREPAREDNESS OF
INTERNET USERS TO DEAL WITH THREATS
OF CYBER CRIME AT BARANGAY KIBUDOC,
MATALAM, COTABATO
Date Date
Date
Date Date
Study No:
Index No:
Recorded
by:
RECORDED:
MA. THEODORA_N. CABASAN, PhD
Director for Research and Development
Date
PRELIMINARY PAGES
LIST OF APPENDICES.................................................................................... v
INTRODUCTION.............................................................................................. 1
Research Questions................................................................................... 6
Theoretical Lens......................................................................................... 7
Concept of Suicide.................................................................................... 13
Motivation to Suicide................................................................................. 16
Suicide Notes........................................................................................... 17
METHODOLOGY........................................................................................... 25
Research Design...................................................................................... 25
Data Collection......................................................................................... 26
Data Analysis............................................................................................ 27
iii
Validity...................................................................................................... 27
Ethical Consideration................................................................................ 29
LITERATURE CITED.................................................................................... 30
APPENDICES................................................................................................ 33
CURRICULUM VITAE................................................................................... 41
iv
LIST OF APPENDICES
INTRODUCTION
of July two thousand eleven. Republic Act No. 10175 an act defining
the imposition of penalties therefor and for other purposes, also known
Finally, an act that is suitable for this modern era. An era where
5
Nowadays, do we know how safe we are while browsing on the
internet. Does it cause harm to us, or are we even aware about the
rampant because of our own ignorance about it. People not being aware
Currently, this law is somehow effective as it lessens the crime rate for
research to learn more about the causes and effects of cybercrime and the
residents using the internet or simply say individual users of the internet.
6
Significance of the study
them and how can they prevent it or not commit the crime.
Parents- The study may help them know if their child is currently
7
Objectives of the study
8
Operational Definition of Terms
transmit, or manipulate
9
Theoretical Framework
Conceptual Framework
Knowledg e on
cybercrimes
Awareness raising Factors in Barangay based
determining the
about cybercrime local based policy policy
Preparedness/ the outcome
ability to respond
Demographic
characteristics
10
and Preparedness of Internet users in dealing with cyber crime threats and
11
REVIEW OF RELATED LITERATURE
Definition of Cybercrime
computer crime, is the use of computers as a tool for other illegal purposes
the meaning and definition of cybercrime in order to gain insight and insight into
Philippines. It aims to address legal issues related to online interaction and the
and defamation.
also called subordinate crime (or" pure "cybercrime) and can only be committed
include the spread, hacking, and distributed denial of service (DDoS) attacks of
is the subject of a crime or is used as a tool for committing a crime. These are
part of the definition of cybercrime to help you adequately address the threat of
13
Types of Cybercrimes
attacks 11. Drive-by attacks 12. Phishing attacks 13. Spear phishing attacks
14. Whale fishing attacks 15. Malware 16. Ransomware 17. Trojan 18.
Teardrop Attack 19. Ping of Death Attack 20. PuP` ( Upadhyay, 2020).
commit phishing scams to trick people into leaking information. You can
This is the most common cybercrime, but the most serious. Crime
other countries.
Reality of Cybercrimes
threats.
reasonable objective for the assault? Will guardians manage the culprits
with the internet, so we should know and be ready. In case we are not
The quantity of 0 days being exploited withinside the wild is “off the
16
charts,” Corellium COO Matt Tait warned at some stage in Black Hat
2021 noted with the aid of using Waldman (2021). According to his
the wild is the best it's been in 8 years. Tait attributed the remarkable
boom to the offense starting off the gloves. In which it way that is each
the factor now in which it is starting to weigh down our capacity to reply
withinside the shielding sector.It is definitely true that the rapid growth in
things faster and made our communication much more easier and
convenient. Thus, all this advancement didn’t only stop there and
discovered. Just think about all the data that we’ve been uploading on the
maintained, and in a few instances left untouched for months, are the
17
to not pose an extreme threat to the real world considering it only
happens virtually through the internet, made the people think that it’s ok
and it doesn’t need to be extra cautious about it. And that’s where it all
happens, neglecting a crime because of that mind set made it even more
lack of understanding with the aid of using the ones net customers of the
risks lurking accessible withinside the cyber area can price a corporation
and gadget directors on the way to keep and display an intrusion detection
gadget that calls for investigation. The first line of protection in cybercrime
those who aren’t aware just because they didn’t know for themselves that
they have committed a crime against another person or anything. The idea
18
of pc crime cognizance on this study is that the person is aware about
boom expertise and higher pc exercise with the aid of using person
threats at the same time as minimizing the fee that is sure to get up from
of the event; being pro- energetic way that they've taken the vital
breaches. They need to have the vital and suitable gear in addition to the
proper system of deploying those gear in place. Thus on this studies what
19
we purpose to discover is whether or not person customers have any
20
METHODOLOGY
Research Design
most appropriate. This is given the fact that the researcher will have no
Research have the ability to give room for finding for more information,
exploring new ideas and at the same time generating discussions and
and because the target respondents are exclusive to the said barangay.
20
Respondents of the Study
Sampling Procedure
Research Instrument
The research instrument that the researcher will be using is adopted from
21
behavior. In this section each item is measured on five-point Likert –
type scale which is aimed at testing the level agreement with the various
indicators used. The scale has two extreme end points of “strongly agree”
internet. The researcher will ask for permission to carry out the study in
house visit to the target respondents as well as a mass call out to the
be given to them. Those who are not willing to take part in the research
are left out. The exercise is expected to be done within three weeks time,
22
Statistical Analysis
and meaning from it. The data collected will be analyzed using Statistical
Package for Social Scientist software version 20.0 and Excel. The data
and percentages and then relevant implication of these values are noted;
23
LITERATURE CITED
24
Sosa, G.C. (2015). Country Report on Cybercrime: The Philippines.
*https://www.unafei.or.jp/publications/pdf/RS_No79/No79_12PA_Sosa.pdf
Waldman, A. (2021). Matt Tait warns of 'stolen' zero-day vulnerabilities: Search Security.
https://searchsecurity.techtarget.com/news/252504895/Matt-Tait-warns-of-stolen-zero-day-
vulnerabilities?
_gl=1*15jlclw*_ga*MTcwNDY5OTY4NS4xNjM2MTY1ODIx*_ga_TQKE4GS5P9*MTYzNjE2
NTc5OS4xLjEuMTYzNjE2NjAwNC4w&_ga=2.86948189.439679449.1636165828-
1704699685.1636165821
https://searchsecurity.techtarget.com/news/252502554/Zscaler-Exposed-servers-open-
ports-jeopardizing-enterprises?
_gl=1*23jm8q*_ga*MTcwNDY5OTY4NS4xNjM2MTY1ODIx*_ga_TQKE4GS5P9*MTYzNjE
2NTc5OS4xLjEuMTYzNjE2NzE2OS4w&_ga=2.118839628.439679449.1636165828-
1704699685.1636165821
25
APPENDICES
26
Appendix A. Application for Research Adviser
Sir / Madam:
I am hoping for your most favorable approval on this request. Thank you very much.
_ Date _ Date
APPROVED
ROWELL P. NITAFAN,MPA
Adviser
_
Date
USM-EDR-F01-Rev.3.2020.02.24
Appendix B. Application for Research Title
SIR/MAAM:
I would like to request your office to allow me to research on the study entitled
“AWARENESS AND PREPAREDNESS OF INTERNET USERS TO DEAL WITH
THREATS OF CYBER CRIME AT BARANGAY KIBUDOC, MATALAM,
COTABATO.”
This research endeavors to find the answer to the following research questions:
1. To determine the socio-demographic profile of the respondents in terms of : Age,
Sex, Educational attainment
2. To determine the perceived awareness of internet users in dealing threats of
Cybercrimes in terms of:
2.4 Knowledge about Computer Crimes (KCC)
2.5 Attitude to risks of Computer Crimes (ACC)
2.6 Exposure to Awareness Raising (EAR)
3. To determine the perceived Preparedness of internet users in dealing threats of
Cybercrimes in terms of:
a. Preparedness to Respond (PR)
b. Online Behavior (OB)
28
RICHARD T. CAMARA, PHD
Department Research Coordinator
Date
NOTED
Title of Study
"AWARENESS AND PREPAREDNESS OF INTERNET USERS TO DEAL WITH THREATS OF
CYBER CRIME AT BARANGAY KIBUDOC, MATALAM, COTABATO”
Adviser 350
Dept. Research Coordinator 125
NOTED
ROWELL P. NITAFAN _
Adviser Date
RECOMMENDING APPROVAL:
31
REPORT ON THE RESULT OF EXAMINATION
APPROVED:
Date
USM-EDR-F07-
Rev.3.2020.02.24
32
UNIVERSITY OF SOUTHERN MINDANAO
Kabacan, Cotabato
Philippines
CURRICULUM VITAE
PERSONAL INFORMATION:
NICKNAME: Rik
AGE: 21
NATIONALITY: Filipino
EDUCATIONAL BACKGROUND:
Bachelor of Science in
Criminology Kabacan, Cotabato
2019-Present
33
UNIVERSITY OF SOUTHERN MINDANAO
CURRICULUM VITAE
Matala
m,
North
Cotabat
o 2012-
2016
Matalam High School-Senior High School
Matalam, North Cotabato
2017-2019
PRIMARY: Kibudoc
Elementar
y School
Matalam,
North
Cotabato
2006-2012
SKILLS:
34