Awareness On Cybercrime Offences Among Students of St. Peters College
Awareness On Cybercrime Offences Among Students of St. Peters College
PETERS
COLLEGE
A
Thesis Proposal
Presented to
The College of Criminology
Iligan City, Philippines
In Partial Fulfillment
Of the Requirements in Crime 06
Criminological Research and Statistics
SY 2021-2022
September 2021
CHAPTER 1
THE PROBLEM
Cybercrime is emerging as a very serious threat in today's world. The internet
brings joy to our lives but at the same time it has some negative sides too. The cyber
criminals are always in a search to find out the new ways to attack the possible internet
victims. Today, everybody is using the computers i.e. from white collar employees to
terrorists and from teenagers to adults. All the conventional crimes like forgery, extortion
kidnapping etc. are being done with the help of computers. New generation is growing
up with computers and most important is that all the monetary transactions are moving
on the internet So, it has become very important for us to be aware of the various
cybercrimes being committed with the help of computers. The paper is an attempt to
society and what steps can be taken to protect ourselves from these cybercrimes.
society, it is a legal concept and has the sanction of the law, A crime may be said to be
breach of which is visited by the penal consequences, So crime or offence is "a legal
wrong that can be followed by criminal proceedings which may result into punishment"
The internet as we know has grown rapidly over the last decade, it has given rise to
or sports.
However with every boon there is a curse too, This curse is Cybercrime -
Illegal activities committed over the internet, The internet along with its advantages has
also exposed us to security risks. Computers today are being misused for unlawful
activities like e-mail espionage, credit card fraud, spam, software piracy, spreading of
viruses and so on, which invade our privacy and offend our senses, Criminal activities
over internet are on the rise. The cybercrime today is the latest and perhaps the most
"unlawful acts wherein the computer is either a tool or target or both" The other
definition could be, "Cybercrime is a form of crime where the internet or computers are
Advocate and Cyber Law Expert, "Any criminal activity that uses a computer either as
an instrumentality, target or a means for perpetuating further crimes comes within the
The motivation of this study arose the researchers observation from some
friends who were the victims of any crime involving social media. In fact, just like any
other victims of cybercrime experienced anxiety, fear, depression, and low self-esteem.
THEORETICAL FRAMEWORK
Self-Control Theory
does not develop low self-control. Instead, possessing low self-control is more a matter
manifests itself in the “absence of nurturance, discipline, or training” (p. 95). Stated
otherwise, “The causes of low self-control are negative rather than positive; self-control
is unlikely in the absence of effort, intended or unintended, to create it” (p. 95). Here
Gottfredson and Hirschi are stating that if a person does not develop self-control, the
low self-control then becomes the product of “ineffective childrearing” (p. 97).
Specifically, the authors stated that consistent supervision and discipline, coupled with
affection, results in the proper development of self-control. They noted that several
things may impede this socialization process, however, including parents who may not
feel affection toward their children or who lack the time or energy to devote to
supervision, and parents who may not see problem behavior for what it is and who may,
having witnessed and processed their child’s inappropriate behavior, not be so inclined
to punish them. Such situations may become exacerbated when parents engage in
https://criminal-justice.iresearchnet.com/criminology/theories/self-control-theory/3/
As the theory suggests, the researchers believed that the students at St.
Peter’s College differed in terms of the upbringing of the parents to their children. An
individual who are well disciplined, well- supervised and being affectionate towards
others developed self- control. On the other hand, if an individual does not developed
self- control, the default is low- self- control. The low self- control is a psychological trait
that develops during childhood due to ineffective parenting. It can develops the
individual being impulsive, insensitive to others, and self- centered. The individuals with
low self- control are more likely engage in risky behaviors that results to a negative
is a criminological perspective that calls for expanding the crime-reduction role well
beyond the justice system. SCP sees criminal law in a more restrictive sense, as only
part of the anticrime effort in governance. It calls for minutely analyzing specific crime
types (or problems) to uncover the situational factors that facilitate their commission.
Intervention techniques are then devised to manipulate the related situational factors. In
matter what the offender’s motivation or intent, deterring the offender from committing
the offense, or by reducing cues that increase a person’s motivation to commit a crime
during specific types of events. SCP has given rise to a retinue of methods that have
been found to reduce crime at local and sometimes national or international levels.
SCP’s focus is thus different than that of other criminological theories because it seeks
1.0001/acrefore-9780190264079-e-3#:~:text=Situational%20crime%20prevention
%20(SCP)%20is,well%20beyond%20the%20justice%20system.&text=SCP’s%20focus
%20is%20thus%20different,than%20punish%20or%20rehabilitate%20offenders
explanation of crime and delinquency. In contrast to control and learning theories, GST
focuses explicitly on negative treatment by others and is the only major theory of crime
and delinquency to highlight the role of negative emotions in the etiology of offending.
emotions such as anger, frustration, depression, and despair. These negative emotions,
in turn, are said to create pressures for corrective action, with crime or delinquency
GST was designed, in part, to address criticisms leveled against previous versions of
strain theory. Earlier versions of strain theory have been criticized for focusing on a
narrow range of possible strains, for their inability to explain why only some strained
individuals resort to crime or delinquency, and for limited empirical support. GST has
been partly successful in overcoming these limitations. Since its inception, the theory
has received a considerable amount of attention from researchers, has enjoyed a fair
amount of empirical support, and has been credited with helping to revitalize the strain
theory tradition. The full potential of GST has yet to be realized, however, as the theory
offenses considered two variables, the independent variables and dependent variables.
The independent variables consisted the personal profile of the student respondents
such as age, gender, year level, and marital status. The dependent variable is the
independent variables and the dependent variables of the study of which the result are
Independent
Dependent Variable Output
Variables
Students Profile
1.1 age, :
1.2 gender,
2. How aware are the students towards cybercrime offense in terms of:
2.1 Cyber-bullying;
2.7 Libel?
3. Is there a significant relationship between the demographic profile of the respondent
and their awareness towards cyber bullying cyber extortion cybersquatting, cybersex,
The Result and finding of this study will provide information to the school
Researcher about the awareness on Cyber-Crime Offenses among the students of St.
Peters College
School Administrators. This Study will provide necessary inputs to the school's
offenses and be able to provide strategic program for the student’s protection.
Guidance Counselor. The result of this study will be the basis for her to intensify
the individual counseling services specifically to the students who are victims of
Faculty. The findings of this study will help the faculty members in identifying
student in their respective classroom who could be victims of cybercrime or could be the
Parents. The findings of this study will make the parents be aware on cybercrime
offenses for them to remind their children not to do such acts which might harm their
future.
Students. This will provide insight for those who could be into it yet they not
Future Researchers. This study will help the future researchers to use as their
guide and reference in conducting the same study with wider scopes and additional
variables.
Offenses among Students of St. Peters College. It considered the students who are
Definition of Terms
Cybercrime. This refers to any type of illegal scheme that uses one or more
components of the internet (chat room, email, message board, website, and auctions) to
the internet child pornography and solicitation of prostitution online. Perhaps the most
prominent form of Cybercrime is identity theft, in which criminals use the internet to steal
someone.
(http://searchsecurity.techtarget.com/definition/cyberbullying)
visual deception of sexuality explicit conduct involving minor (person less that 18 years
old) (https://www.justice.govicriminal-ceos/child-pornography)
(http://searchsecurity,techtarget.com/definition/cyberextortion)
Cyber Squatting. This term refers to illegal domain name registration or use
(http://www/techopedia.com/definition/2393/cybersqatting)
(http://www.meriam-webster.com/dictionary/cybersex)
(http://www.dictionary.com/browse/libel)
Identity Theft. This refers to known as identity fraud, is a crime in which an
(https://searchsecurity.techtarget.com/definitaion/identitytheft)
connects computer networks and organizational computer facilities around the world.
(https://www.meriam-webster.com/dictionary/internet)
CHAPTER 2
Related Literature
hardware device. Attack include keystroke loggers, viruses, root kits or Trojan horses,
which is the only binding international instrument on issue, "Cybercrime" is "one of the
most global of all transnational crimes an it poses major challenges for the law
enforcement and criminal justice systems" (Council of Europe 2009). The pervasiveness
Related Studies
The prevalence of cybercrimes worldwide has been considered as a threat to
democracy. "The Growing danger from crimes committed against computers, or against
2000;1). The information technology revolution has influenced the society in handling
everyday activities. "it has in one way or the other pervaded almost every aspect of
criminologists, cybercrimes are computer crimes that infringe property interests when
are those committed in the sphere of computer information and those perpetrated by
Furthermore, Cybercrimes differ from most terrestrial crimes in four ways. First,
committing these crimes can easily be learned; second. there are few resources relative
without being physically present; and fourth, cybercrimes are often not clearly illegal
(McConnell 2000), The emergence of these crimes can be attributed to information and
means the processing, transmission, and display of information" which has become the
center of the society" (Asian Development Bank 2003). "ICT" is also defined as tools
(https://aboutphilippines.ph/files/policypaper-addressingcybercrimes.pdf).
The crime that is done using internet i.e. cybercrime has been taking place
tremendously. internet is the place where large number of criminal activities can take
place and people that have intelligence can misuse the internet which leads to lasting of
criminal activities in cyber space. So, to control the criminal activities in cyberspace,
cyber law was made. Cyber law is made to help the people if any cybercrime has
happened with them. At some places, there is special team of intelligent officers that
work to arrest the criminals. Cyber law deals with all this online transactions, activities
going on the internet and cyberspace. Every action in cyberspace has cyber legal
perspective. There are various cyber laws issues associated at every point of time.
Form the time of registering domain name for website to the time to promote your
website to the time when you send and receive mails to the time of online transactions,
at every point of the time these cyber law issues are involved. Everyone must
(https:www.ijarcsse.com/docs/papers/Volume_5/8_August2015/V5180156.pdf)
Cyber criminals are no different than traditional criminals in that they want to
make their money as quickly and easily as possible. Cybercrime prevention can be
achieved fairly quickly and in a cost-effective manner. When Armed with a little technical
advice and common sense, many cybercrime attacks can be avoided. Seminar to target
hardening for residence or a business (e.g., lights, locks, and alarms), the more difficult
it is for cybercriminal to successfully attack a target, the more likely he or she is to leave
it alone and move on to an easier target. Most cybercrimes cannot be placed into a
single crime category, which makes statistical recording of this activity limited at best.
The internet Crime Complaint Center (IC3) Compiles and releases annual
reports on the statistics and cybercrimes facts. Using statistics and facts, analysis,
prepare reports on cybercrime trends and growth. Knowing the facts, trends, and growth
http://www.ncpc.org/resources/files/pdf/internet-safety/13020-Cybercrimes-revSPR.pdf)
from anywhere in the world and may have effects beyond the borders of the offenders
country, across entire continents, or even on a worldwide scale. The prevention and
prosecution of these criminal acts require all affected countries to cooperate and to
the field. Still, it covers only some computer related criminal offenses and legal issues.
Further problem areas are regulated by other international instrument or they are not
regulated at all. The project takes broad aim at current computer-specific issues of
substantive criminal law and criminal procedure as well as at selected related issues. As
far as the substantive criminal law is concerned, the main focus is on offenses against
the confidentiality, integrity, and availability of the computer data and systems (the so-
called CIA offenses), additional areas of examination include other computer related
offenses and the general principles of criminal liability of internet service provides. In the
area of criminal procedure computer-specific, coercive investigatory powers and the law
of evidence are being analyzed as are questions concerning the obligatory retention of
telecommunication data for evidentiary purposes and the protection of civil liberties
during the criminal process.
(https://www.mpicc.de/en/forschung/forschungsarbeit/strafrencht/computerkriminalitaet.
html)
CHAPTER 3
RESEARCH METHODOLOGY
This Chapter provides a discussion of the research design, locale of the study,
Research Design
The study used the descriptive method with the guided response type
questionnaire for the gathering of data about the Awareness on St. Peters College
students towards Cybercrime Offenses. This design was deemed useful in carrying out
Respondents
The Respondents of this study were the students from the different departments
of St. Peters College. A total population of (100) students representing all departments
were considered but in case of those departments with few students such as College of
Electrical Engineering and College of Computer Studies all were given questionnaires.
Sampling Design
The study utilized the random sampling in getting the awareness of the selected
Data Gathering
The researchers asked permission from the Dean of every department covered in
the study. After the approval, the researchers will distribute the questionnaires. A total of
50 respondents from the different departments will be given ample time to answer
At the end of the session, the respondents were asked to return the questionnaires
immediately. After the retrieval of the questionnaires, the data were tabulated, analyzed
and evaluated.
Instrument Used
from cybercrime law provisions and were validated by their adviser Prof.
Maricar Cabili_________ Kimberly Mae Mirantes_________ The Department Head of
criminology
The Questionnaire contains two (2) parts Part 1 is the respondents profile Variables
used were the ages, gender, year level, and marital status. Part 2 were the awareness
In this study, the quantitative method was used as the instrument in analyzing
data. The data gathered from the study was analyzed and presented in tabular forms.
With the final result, interpretation of data were done with several recommendations that
tools were
1. Frequency and Percentage. This was used to describe the profile or the
respondents.
P = (f/n) x 100
Where P= Percentage
f = frequency
n = numbers of respondents
100 = constant
2. Weighted Mean. The most common type of average, except that instead of each of
the data points contributing equally to the final average, some data points contribute
Formula = X = W 1 V 1 + 1 V 2 +
N
3. Ranking. The relationship between a set of items such that for any two items, the
first either higher than' ranked higher than', ranked equal to the following items. This
was used in the items of part 2 of the questionnaire which is the awareness of the
relationship between two quantitative, continuous variables, for example, age and blood
pressure.
Formula
r= NΣXY=(ΣX)(ΣY) .
√(NΣX3-(Σx)3)(NΣy2-(ΣY)1)
Where :
r = the Pearson Product Moment Coefficient of Correlation
n = sample size
Σxy = the sum of the product of x and y
ΣxΣy = the product of the sum of Σx and the sum of Σy
Σx2 = sum of squares of x
Scoring Procedure
These are corresponding points gained upon checking the frequency of the
3 2.51-3.25 Aware
2 1.75-2.50 Unaware