0% found this document useful (1 vote)
2K views

Awareness On Cybercrime Offences Among Students of St. Peters College

This document provides an overview of a study that will assess awareness of cybercrime offenses among students at St. Peter's College. It discusses relevant theories like self-control theory, situational crime prevention theory, and general strain theory. The study will examine the relationship between students' personal profiles (age, gender, year level, marital status) as independent variables and their level of awareness of cybercrime offenses as the dependent variable. The results are intended to form the basis for an intervention program.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
2K views

Awareness On Cybercrime Offences Among Students of St. Peters College

This document provides an overview of a study that will assess awareness of cybercrime offenses among students at St. Peter's College. It discusses relevant theories like self-control theory, situational crime prevention theory, and general strain theory. The study will examine the relationship between students' personal profiles (age, gender, year level, marital status) as independent variables and their level of awareness of cybercrime offenses as the dependent variable. The results are intended to form the basis for an intervention program.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

AWARENESS ON CYBERCRIME OFFENCES AMONG STUDENTS OF ST.

PETERS
COLLEGE

A
Thesis Proposal
Presented to
The College of Criminology
Iligan City, Philippines

In Partial Fulfillment
Of the Requirements in Crime 06
Criminological Research and Statistics
SY 2021-2022

RIZA MAE C. CALISO


JUANITO JR. D. FABULAR
MARIEL A. LACIDA

September 2021
CHAPTER 1
THE PROBLEM
Cybercrime is emerging as a very serious threat in today's world. The internet

brings joy to our lives but at the same time it has some negative sides too. The cyber

criminals are always in a search to find out the new ways to attack the possible internet

victims. Today, everybody is using the computers i.e. from white collar employees to

terrorists and from teenagers to adults. All the conventional crimes like forgery, extortion

kidnapping etc. are being done with the help of computers. New generation is growing

up with computers and most important is that all the monetary transactions are moving

on the internet So, it has become very important for us to be aware of the various

cybercrimes being committed with the help of computers. The paper is an attempt to

provide a glimpse of various types of cybercrimes prevalent in modern technological

society and what steps can be taken to protect ourselves from these cybercrimes.

Crimes is a social and economic phenomenon and is as old as the human

society, it is a legal concept and has the sanction of the law, A crime may be said to be

any conduct accompanied by act or omission prohibited by law and consequential

breach of which is visited by the penal consequences, So crime or offence is "a legal

wrong that can be followed by criminal proceedings which may result into punishment"

The internet as we know has grown rapidly over the last decade, it has given rise to

many avenues in every field we can think of - be it education, entertainment, business,

or sports.

However with every boon there is a curse too, This curse is Cybercrime -

Illegal activities committed over the internet, The internet along with its advantages has
also exposed us to security risks. Computers today are being misused for unlawful

activities like e-mail espionage, credit card fraud, spam, software piracy, spreading of

viruses and so on, which invade our privacy and offend our senses, Criminal activities

over internet are on the rise. The cybercrime today is the latest and perhaps the most

complicated problem in the cyber world. A generalized definition of cybercrime may be

"unlawful acts wherein the computer is either a tool or target or both" The other

definition could be, "Cybercrime is a form of crime where the internet or computers are

used as a medium to commit crime", According to PavanDuggal, Supreme Court

Advocate and Cyber Law Expert, "Any criminal activity that uses a computer either as

an instrumentality, target or a means for perpetuating further crimes comes within the

ambit of cybercrime" (http://ssijmar in/vol2no2/vol2no2.24.pdf)

The motivation of this study arose the researchers observation from some

friends who were the victims of any crime involving social media. In fact, just like any

other victims of cybercrime experienced anxiety, fear, depression, and low self-esteem.
THEORETICAL FRAMEWORK

Self-Control Theory

According to Gottfredson and Hirschi (1990) contended that, ultimately, one

does not develop low self-control. Instead, possessing low self-control is more a matter

of having not developed self-control as a young child. Accordingly, low self-control

manifests itself in the “absence of nurturance, discipline, or training” (p. 95). Stated

otherwise, “The causes of low self-control are negative rather than positive; self-control

is unlikely in the absence of effort, intended or unintended, to create it” (p. 95). Here

Gottfredson and Hirschi are stating that if a person does not develop self-control, the

default is low self-control. Acquiring self-control is a matter of socialization. A child with

low self-control then becomes the product of “ineffective childrearing” (p. 97).

Specifically, the authors stated that consistent supervision and discipline, coupled with

affection, results in the proper development of self-control. They noted that several

things may impede this socialization process, however, including parents who may not

feel affection toward their children or who lack the time or energy to devote to

supervision, and parents who may not see problem behavior for what it is and who may,

having witnessed and processed their child’s inappropriate behavior, not be so inclined

to punish them. Such situations may become exacerbated when parents engage in

behavior indicative of low self-control themselves.

https://criminal-justice.iresearchnet.com/criminology/theories/self-control-theory/3/
As the theory suggests, the researchers believed that the students at St.

Peter’s College differed in terms of the upbringing of the parents to their children. An

individual who are well disciplined, well- supervised and being affectionate towards

others developed self- control. On the other hand, if an individual does not developed

self- control, the default is low- self- control. The low self- control is a psychological trait

that develops during childhood due to ineffective parenting. It can develops the

individual being impulsive, insensitive to others, and self- centered. The individuals with

low self- control are more likely engage in risky behaviors that results to a negative

impact toward themselves.

Situational Crime Prevention Theory

According to Freilich and Newman ( 2017 ) Situational crime prevention (SCP)

is a criminological perspective that calls for expanding the crime-reduction role well

beyond the justice system. SCP sees criminal law in a more restrictive sense, as only

part of the anticrime effort in governance. It calls for minutely analyzing specific crime

types (or problems) to uncover the situational factors that facilitate their commission.

Intervention techniques are then devised to manipulate the related situational factors. In

theory, this approach reduces crime by making it impossible for it to be committed no

matter what the offender’s motivation or intent, deterring the offender from committing

the offense, or by reducing cues that increase a person’s motivation to commit a crime

during specific types of events. SCP has given rise to a retinue of methods that have

been found to reduce crime at local and sometimes national or international levels.

SCP’s focus is thus different than that of other criminological theories because it seeks

to reduce crime opportunities rather than punish or rehabilitate offenders.


https://oxfordre.com/criminology/criminology/view/10.1093/acrefore/9780190264079.00

1.0001/acrefore-9780190264079-e-3#:~:text=Situational%20crime%20prevention

%20(SCP)%20is,well%20beyond%20the%20justice%20system.&text=SCP’s%20focus

%20is%20thus%20different,than%20punish%20or%20rehabilitate%20offenders

General Strain Theory

According to Brezina ( 2017) General strain theory (GST) provides a unique

explanation of crime and delinquency. In contrast to control and learning theories, GST

focuses explicitly on negative treatment by others and is the only major theory of crime

and delinquency to highlight the role of negative emotions in the etiology of offending.

According to GST, the experience of strain or stress tends to generate negative

emotions such as anger, frustration, depression, and despair. These negative emotions,

in turn, are said to create pressures for corrective action, with crime or delinquency

being one possible response.

GST was designed, in part, to address criticisms leveled against previous versions of

strain theory. Earlier versions of strain theory have been criticized for focusing on a

narrow range of possible strains, for their inability to explain why only some strained

individuals resort to crime or delinquency, and for limited empirical support. GST has

been partly successful in overcoming these limitations. Since its inception, the theory

has received a considerable amount of attention from researchers, has enjoyed a fair

amount of empirical support, and has been credited with helping to revitalize the strain

theory tradition. The full potential of GST has yet to be realized, however, as the theory

continues to evolve and further testing is required.


https://oxfordre.com/criminology/view/10.1093/acrefore/9780190264079.001.0001/acref
ore-9780190264079-e-249
CONCEPTUAL FRAMEWORK

This study will assess the awareness of student towards cybercrimes

offenses considered two variables, the independent variables and dependent variables.

The independent variables consisted the personal profile of the student respondents

such as age, gender, year level, and marital status. The dependent variable is the

cybercrime offenses. The significant relationship will established between the

independent variables and the dependent variables of the study of which the result are

the basis for an intervention program.

Independent
Dependent Variable Output
Variables

Students Profile

1. Age Level of Awareness


on Cybercrime Intervention
2. Gender offenses program
3. Year Level
4. Marital Status

Figure 1. The Schematic Diagram of the Study


STATE OF THE PROBLEM
The study aimed to investigate the awareness on Cyber-crime offenses

among students of St. Peter’s College

Specifically, the researchers seek to answer the following questions:

1. What is the demographic profile of the respondents in terms of their:

1.1 age, :

1.2 gender,

1.3 Year level; and

1.4 Marital Status

2. How aware are the students towards cybercrime offense in terms of:

2.1 Cyber-bullying;

2.2 Cyber Extortion;

2.3 Cyber Squatting;

2.4 Cyber Sex;

2.5 Child Pornography;

2.6 identity Theft; and

2.7 Libel?
3. Is there a significant relationship between the demographic profile of the respondent

and their awareness towards cyber bullying cyber extortion cybersquatting, cybersex,

identity theft, Libel, child pornography and illegal access to data?

4. Based on the findings, what intervention program can be proposed?


NULL HYPOTHESIS

There is no significant relationship between profile of the respondents and

their awareness towards cybercrime offenses.

SIGNIFICANCE OF THE STUDY

The Result and finding of this study will provide information to the school

Administrators, Guidance, Counselor, Faculty, Parents, Students and Future

Researcher about the awareness on Cyber-Crime Offenses among the students of St.

Peters College

School Administrators. This Study will provide necessary inputs to the school's

administrators for their information regarding student’s awareness on cybercrime

offenses and be able to provide strategic program for the student’s protection.

Guidance Counselor. The result of this study will be the basis for her to intensify

the individual counseling services specifically to the students who are victims of

cybercrime, including who could be guilty in committing such acts.

Faculty. The findings of this study will help the faculty members in identifying

student in their respective classroom who could be victims of cybercrime or could be the

culprits of cybercrime offenses.

Parents. The findings of this study will make the parents be aware on cybercrime

offenses for them to remind their children not to do such acts which might harm their

future.
Students. This will provide insight for those who could be into it yet they not

know they can be liable to their acts.

Future Researchers. This study will help the future researchers to use as their

guide and reference in conducting the same study with wider scopes and additional

variables.

Scope and limitation of the study

This study will be conducted to determine the Awareness on Cyber-Crime

Offenses among Students of St. Peters College. It considered the students who are

officially enrolled in college during the 1 st semester of S.Y 2020-2021

Definition of Terms

The following herein are defined conceptually and operationally for

clarification and understanding.

Cybercrime. This refers to any type of illegal scheme that uses one or more

components of the internet (chat room, email, message board, website, and auctions) to

conduct fraudulent transactions or transmit the proceeds of frauds to financial

institutions or to others connected with scheme. Cybercrime also applies to generating

spam emails, downloading viruses or spyware to computer, harassing another through

the internet child pornography and solicitation of prostitution online. Perhaps the most

prominent form of Cybercrime is identity theft, in which criminals use the internet to steal

personal information from other users (https://definitions.uslegel.com/c/cybercrimes/)


Cyber Bullying. This is the use of cellphones, instant messaging, email, chat

rooms or social networking sites such as Facebook to harass, threaten or intimidate

someone.

(http://searchsecurity.techtarget.com/definition/cyberbullying)

Child Pornography. This refers to a form of child sexual exploitation or any

visual deception of sexuality explicit conduct involving minor (person less that 18 years

old) (https://www.justice.govicriminal-ceos/child-pornography)

Cyber Extortion. This refers to a crime involving an attack or treat of attack

coupled with demand for money to avert or stop the attack.

(http://searchsecurity,techtarget.com/definition/cyberextortion)

Cyber Squatting. This term refers to illegal domain name registration or use

or claiming a website to be your for the purpose of scamming.

(http://www/techopedia.com/definition/2393/cybersqatting)

Cyber Sex. This refers to an online sex-oriented conversations and

exchanges or sex oriented available on a computer.

(http://www.meriam-webster.com/dictionary/cybersex)

Libel. This refers to defamation by written or printed words, pictures, or in

any form other than by spoken words or gestures.

(http://www.dictionary.com/browse/libel)
Identity Theft. This refers to known as identity fraud, is a crime in which an

imposter obtains key pieces of personally identifiable information, such as social

security or drivers license numbers, in order to impersonate someone else .

(https://searchsecurity.techtarget.com/definitaion/identitytheft)

Internet. This refers to an electronic communications network that

connects computer networks and organizational computer facilities around the world.

(https://www.meriam-webster.com/dictionary/internet)
CHAPTER 2

REVIEW OF RELATED LITERATURE AND STUDIES

In this chapter, the focus is on the Cybercrime Law. It aims to provide

student's information to know and to be aware about cybercrime law.

Related Literature

Cybercrimes are any crime that is committed using a computer, a network, or

hardware device. Attack include keystroke loggers, viruses, root kits or Trojan horses,

phishing, pharming, theft or manipulation of data or services via hacking or viruses,

identity theft and back or e commerce fraud (Merrit 2010:15).

From the viewpoint of the Council of Europe on the Convention on Cybercrime

which is the only binding international instrument on issue, "Cybercrime" is "one of the

most global of all transnational crimes an it poses major challenges for the law

enforcement and criminal justice systems" (Council of Europe 2009). The pervasiveness

of these computer crimes is in fact growing reaching to an annual revenue of "$1.trillion"

(Leyden, 2009.1) and is estimated to exceed to revenues of international drug trafficking

(Council of Europe 2009 and Security (Watch 2009).

Related Studies
The prevalence of cybercrimes worldwide has been considered as a threat to

democracy. "The Growing danger from crimes committed against computers, or against

information on computers, is beginning to claim attention in national capital" (McConnel

2000;1). The information technology revolution has influenced the society in handling

everyday activities. "it has in one way or the other pervaded almost every aspect of

human activities" (Convention on Cybercrime, ETS 185, Explanatory). Cybercrimes are

harmful acts committed from or against a computer or network. According to German

criminologists, cybercrimes are computer crimes that infringe property interests when

electronic information is deliberately modified (computer manipulation). destroy

(computer sabotage) or used to misappropriate computer time. Other popular definitions

are those committed in the sphere of computer information and those perpetrated by

using the computer (Polivanyuk, 2009)

Furthermore, Cybercrimes differ from most terrestrial crimes in four ways. First,

committing these crimes can easily be learned; second. there are few resources relative

to the potential damage caused; third, cybercrimes can be committed in a jurisdiction

without being physically present; and fourth, cybercrimes are often not clearly illegal

(McConnell 2000), The emergence of these crimes can be attributed to information and

Communication Technology (ICT) which is a "set of activities that facilitate by electronic

means the processing, transmission, and display of information" which has become the

center of the society" (Asian Development Bank 2003). "ICT" is also defined as tools

that facilitate the production, transmission, and processing of information.

(https://aboutphilippines.ph/files/policypaper-addressingcybercrimes.pdf).
The crime that is done using internet i.e. cybercrime has been taking place

tremendously. internet is the place where large number of criminal activities can take

place and people that have intelligence can misuse the internet which leads to lasting of

criminal activities in cyber space. So, to control the criminal activities in cyberspace,

cyber law was made. Cyber law is made to help the people if any cybercrime has

happened with them. At some places, there is special team of intelligent officers that

work to arrest the criminals. Cyber law deals with all this online transactions, activities

going on the internet and cyberspace. Every action in cyberspace has cyber legal

perspective. There are various cyber laws issues associated at every point of time.

Form the time of registering domain name for website to the time to promote your

website to the time when you send and receive mails to the time of online transactions,

at every point of the time these cyber law issues are involved. Everyone must

understand the cyber law for their own benefit.

(https:www.ijarcsse.com/docs/papers/Volume_5/8_August2015/V5180156.pdf)

Cyber criminals are no different than traditional criminals in that they want to

make their money as quickly and easily as possible. Cybercrime prevention can be

achieved fairly quickly and in a cost-effective manner. When Armed with a little technical

advice and common sense, many cybercrime attacks can be avoided. Seminar to target

hardening for residence or a business (e.g., lights, locks, and alarms), the more difficult

it is for cybercriminal to successfully attack a target, the more likely he or she is to leave

it alone and move on to an easier target. Most cybercrimes cannot be placed into a

single crime category, which makes statistical recording of this activity limited at best.
The internet Crime Complaint Center (IC3) Compiles and releases annual

reports on the statistics and cybercrimes facts. Using statistics and facts, analysis,

prepare reports on cybercrime trends and growth. Knowing the facts, trends, and growth

is critical to crime prevention efforts on protection personal data

http://www.ncpc.org/resources/files/pdf/internet-safety/13020-Cybercrimes-revSPR.pdf)

Computer crime is a global phenomenon criminal offenses may be committed

from anywhere in the world and may have effects beyond the borders of the offenders

country, across entire continents, or even on a worldwide scale. The prevention and

prosecution of these criminal acts require all affected countries to cooperate and to

develop the necessary legal instruments. Up to now, The Council of Europe’s

"Convention on Cybercrime" of 2001 is the most influential international instrument in

the field. Still, it covers only some computer related criminal offenses and legal issues.

Further problem areas are regulated by other international instrument or they are not

regulated at all. The project takes broad aim at current computer-specific issues of

substantive criminal law and criminal procedure as well as at selected related issues. As

far as the substantive criminal law is concerned, the main focus is on offenses against

the confidentiality, integrity, and availability of the computer data and systems (the so-

called CIA offenses), additional areas of examination include other computer related

offenses, "illegal content," infringements of intellectual property, as well as privacy

offenses and the general principles of criminal liability of internet service provides. In the

area of criminal procedure computer-specific, coercive investigatory powers and the law

of evidence are being analyzed as are questions concerning the obligatory retention of

telecommunication data for evidentiary purposes and the protection of civil liberties
during the criminal process.

(https://www.mpicc.de/en/forschung/forschungsarbeit/strafrencht/computerkriminalitaet.

html)

CHAPTER 3

RESEARCH METHODOLOGY

This Chapter provides a discussion of the research design, locale of the study,

respondents, data gathering procedures, instrument used, statistical treatment of data

and scoring procedure.

Research Design

The study used the descriptive method with the guided response type

questionnaire for the gathering of data about the Awareness on St. Peters College

students towards Cybercrime Offenses. This design was deemed useful in carrying out

the objectives of the Study.

Respondents

The Respondents of this study were the students from the different departments

of St. Peters College. A total population of (100) students representing all departments
were considered but in case of those departments with few students such as College of

Electrical Engineering and College of Computer Studies all were given questionnaires.

Sampling Design

The study utilized the random sampling in getting the awareness of the selected

college students of St. Peters College towards cybercrime offenses.

Data Gathering

The researchers asked permission from the Dean of every department covered in

the study. After the approval, the researchers will distribute the questionnaires. A total of

50 respondents from the different departments will be given ample time to answer

correctly and honestly the questions.

At the end of the session, the respondents were asked to return the questionnaires

immediately. After the retrieval of the questionnaires, the data were tabulated, analyzed

and evaluated.

Instrument Used

The researchers made use of the self-constructed Survey Questionnaires based

from cybercrime law provisions and were validated by their adviser Prof.
Maricar Cabili_________ Kimberly Mae Mirantes_________ The Department Head of

criminology

The Questionnaire contains two (2) parts Part 1 is the respondents profile Variables

used were the ages, gender, year level, and marital status. Part 2 were the awareness

of the student towards the cybercrime offenses.

Statistical Treatment of Data

In this study, the quantitative method was used as the instrument in analyzing

data. The data gathered from the study was analyzed and presented in tabular forms.

With the final result, interpretation of data were done with several recommendations that

generated for enhancement.

To obtain an accurate analysis and interpretation of data the following statistical

tools were

1. Frequency and Percentage. This was used to describe the profile or the

respondents.

P = (f/n) x 100
Where P= Percentage
f = frequency
n = numbers of respondents
100 = constant
2. Weighted Mean. The most common type of average, except that instead of each of

the data points contributing equally to the final average, some data points contribute

more than others

Formula = X = W 1 V 1 + 1 V 2 +
N

Where X = is the weighted mean


W = is the weight given to the response of x
V = is the number of respondents
N = total population

3. Ranking. The relationship between a set of items such that for any two items, the

first either higher than' ranked higher than', ranked equal to the following items. This

was used in the items of part 2 of the questionnaire which is the awareness of the

students towards cybercrime offenses.

4. Pearson Correlation Coefficient - This is a technique for investigation the

relationship between two quantitative, continuous variables, for example, age and blood

pressure.

Formula

r= NΣXY=(ΣX)(ΣY) .
√(NΣX3-(Σx)3)(NΣy2-(ΣY)1)
Where :
r = the Pearson Product Moment Coefficient of Correlation
n = sample size
Σxy = the sum of the product of x and y
ΣxΣy = the product of the sum of Σx and the sum of Σy
Σx2 = sum of squares of x
Scoring Procedure

These are corresponding points gained upon checking the frequency of the

respondents answer in the visual, auditory and kinesthetic questions.

Table 1. Scale for Weighted Mean Interpretations

Scale Weighted Mean Value Interpretation

4 3.26-4.0 Highly Aware

3 2.51-3.25 Aware

2 1.75-2.50 Unaware

1 1.00-1.75 Highly Unaware

You might also like