Research Lang Malakas
Research Lang Malakas
Research Lang Malakas
THE PROBLEM
According to the latest report National Crime Records Bureau (NCRB), a total of
11,592 cases were registered under the cyber-crimes (which includes cases under
Information Technology Act, offences under related sections of IPC and offences under
Special and Local Laws (SLL)) in comparison to 9,622 cases registered during the
previous year (2014) which shows an increase of 20.5% over the previous year. Uttar
Pradesh has reported the highest number of such crimes followed by Maharashtra and
Karnataka.
The growing internet usage rate has created a problem for people who spend long
hours browsing the Cyber World. In 2017, the number of mobile phone internet users
grew 12.49 percent compared to the previous year and 23.93 percent of the population
accessed the internet from their mobile phone. This figure is expected to grow to 34.85
percent in 2022. (statista.com, 2017). Thus, increased internet usage has opened the gate
of cyber-crime to flood in. Lack of awareness on such issues will lead to the damage of
UNICEF estimates that more than four million websites showing juvenile victims,
even children younger than two years, can be found on the Internet (Cehovin, 2010). The
experience of abuse causes long-term effects on a person’s later life, both physical and
psychological. The latter includes feeling of guilt or responsibility for the abuse, low self-
esteem, feelings of inferiority and depression. With Internet pornography, one must also
realize that the child is victimized each time anybody watches material depicting his/her
materials on the web and the impossibility of removing material once it is published, it is
very difficult to stop the circle of abuse (Dimc & Dobovsek, 2012).
prevention, and in the field of cybercrime related to children this issue is even more
important, since the EU Kids Online survey found that only one-third of 9-16 year olds
(33 percent) believed that their parents know more about the Internet than they do
(Ólafsson & Livingstone, 2013). Therefore, we believe that all target groups need to
substantially improve their knowledge regarding Internet safety and issues of illegal
Internet use.
events occur almost instantaneously across large distances, network boundaries do not
align with physical and political boundaries and digital environments are subject to
(Poonia et al., 2012) also discussed the vital role of having cyber ethics in e-
learning environments, understanding the risks of harmful and illegal behavior, and
learning how to protect ourselves and other internet users from such behavior. It also
involves teaching young people who may not realize the potential for harm to themselves
and others online. Previous studies focused on the awareness of students towards
cybercrimes in general and did not explore the connection between cybercrimes and their
impact on e-learning.
technology, it has become crucial to protect ourselves from cybercrimes as this evolution
can be abused by attackers taking advantage of users ‘lack of awareness. Thus, it imposes
4
one of the most significant risks in economic, political, educational, social, and other
sectors in life. From a holistic approach, a cybercrime is any criminal activity in which
computers or computer networks are a tool, a target, or a place of criminal activity, and
traditional physical crimes where computers or networks are used to enable illicit
cybercrimes are assume definitions are relatively narrow on focus (Pete et al., 2010).
The massive and rapid technological development has contributed, with its
technical means, to the emergence of a new type of crime known as cybercrime. At the
beginning of the spread of this type of crime and before the advent of internet networks
and modern means of communication, some jurisprudence used the term computer fraud
(Kunz and Wilson, 2004) to refer to these crimes as it was most common when these
behaviors emerged.
However, the term quickly became unsuitable for the nature of the crime since
fraud is considered a type of crime, not a term that could be used as a whole. Afterward,
the term computer crime (Kunzand Wilson, 2004) came to refer to criminal activities
Nowadays, with the world's current situation, educational institutions shifted from
campus learning into e-learning; hence, the possibility of cyber-attacks has increased.
However, little attention in research was addressed to the issue of awareness in the
According to Raheem and Khan, 2020, have emphasized the importance of being
aware of cybersecurity at schools and the methods that stakeholders use to promote
cybersecurity in addition to the many challenges, such as the lack of expertise, funding,
and resources.
crucial to create a combined effort of key stakeholders to raise awareness. Thus, they
have prepared blended learning courses to promote awareness for such issue
According to Poonia et al., 2012, also discussed the vital role of having cyber
behavior, and learning how to protect ourselves and other internet users from such
behavior. It also involves teaching young people who may not realize the potential for
harm to themselves and others online. Previous studies focused on the awareness of
students towards cybercrimes in general and did not explore the connection between
age groups and educational qualifications; hence, individuals and all internet users owe
examined what causes cybercrimes originating from Vietnam's social situation and
impact on e-learning.
6
The Bankers Association of the Philippines (BAP) recently launched its Anti-
launch coincides with the International Fraud Awareness Week, which emphasises the
importance of cybersecurity and cyber education in individuals’ lives all around the
world.
keep the public informed and educated on the latest trends and scenarios on cybercrime,
considering the growing threats of cybercriminals. They have stepped up their game as
they try to take advantage of the rapid online migration of essential activities amid the
the public on cybercrimes the Philippine National Police Anti-Cybercrime Group (PNP-
ACG, launched last August 2, 2022, its nationwide simultaneous public awareness drive.
dependence of the public on smart technology which was seen by some unscrupulous
individuals as an opportunity to advance their ill motives.ACG said there are studies
claiming that the human aspect has always been the factor that fraudsters capitalize on
since most victims of cybercrimes were not due to the employment of a specialized tool
In line with this, the PNP-ACG has directed all Regional Anti-Cybercrime Units
of ACG and district offices in the National Capital Region simultaneously participated in
contain QR codes which when scanned will lead them to ACG’s Facebook page and
website that will showcase prevention tips on various modus operandi of cybercriminals.
and to private business owners. Likewise, flyers and leaflets were distributed to passers-
The use of technology in the commission of traditional crimes and the new found
ways of committing crime in the country pose an investigative challenge to the Philippine
recorded by the PNP. While the country awaits the implementation of a comprehensive
cybercrime law, cyber criminals continue to use technology both in conducting criminal
activity and preventing its detection. This trend in criminal activity necessitates the need
for a dedicated unit within the PNP to go after these offenders and improve its cyber
security posture.
Inc. at San Isidro, Tarlac city. In this study, we will determine the level of awareness of
Theoretical Framework
& Ronel (2013). Space Transition Theory by Jaishankar & Ronel (2013) is an
explanation about the nature of the behavior of the persons who bring out their
conforming and non-conforming Demeanor in the physical space and cyberspace. Space
Transition postulates the movement of people from one space to another (e.g., from
physical space to cyberspace and the other way around). Space Transition Theory
contends that people act differently when they move from one space to another.
Popular cybercrime includes; phishing, malware, DoS and DDoS attacks, Trojans,
MitM attacks, identity theft, cyber fraud, key and screen loggers, cyber bullying, cyber
laundering, worms, and sniffers. Previous researchers tended to present the concepts
classifications are taxonomies. According to this theory, cybercrime will take place when
three conditions converge, namely: 1) there is a motivated attacker; 2) a target with value;
The figure shown is the study about the Importance of Cybercrime Awareness
Among 2nd year criminology students of USST Colleges, it shows the level of awareness
The research study aims to spread awareness and determine the level of Awareness
among Students of United School of Sciences and Technology, Inc. at San Isidro, Tarlac
city.
Definition of Terms
prevent cybercrimes.
CYBER CRIME - criminal activities carried out by means of computers or the internet.
another person to use their identity to commit fraud, such as making unauthorized
transactions or purchases.
UNICEF- Refers to the driving force that helps build a world where the rights of every
YOUNG PEOPLE – Refers to the people who are related to the study.
CHAPTER 2
RESEARCH METHODOLOGY
In this chapter it will covered the Research Design, Population and Locale of the
Study, Data Gathering Tools, Data Gathering Procedure, and Ethical Considerations
Research Design
This study will use quantitative approach using the Descriptive Research design.
Quantitative Research is the process of collecting and analyzing numerical data. It can be
used to find patterns and averages, make predictions, test causal relationships, and
models, theories, and hypotheses pertaining to phenomena . The Researchers used the
instrument in gathering the data. This method was the most appropriate in study because
The researcher will conduct the study in United School of Sciences and
Technology, Inc. at San Isidro, Tarlac city. Our study would be Criminology students in
USST. The respondents of the study composed of 2nd year criminology students
12
in United School of Sciences and Technology, Inc. at San Isidro, Tarlac city.
the importance of cybercrime awareness among 2nd year criminology students at United
To gather the files needed for this study, the following steps will be done: The
first step, the researchers sent a letter of request to the school registrar office to give the
list of all criminology students. The second step, the letter is sent to the Dean of the CCJE
, as well as the students who participated in the research study entitled Importance of
Cybercrime Awareness among 2nd year criminology students of USST Colleges. The
third step, the researchers distribute and discuss to the respondents what is the content of
the informed consent and also deliberate the possible questions they would encounter in
answering the instrument. Upon the distribution of the instrument. The fourth step, after
floating of the questionnaire, the researcher will collect the instrument, and the data that
is taken from the survey will tally for the data interpretation. The fifth step, after the data
gathered, the result was checked, evaluate, analyze, and interpret with the use of
Ethical Considerations
All participants in research will be given an information sheet and consent form
regarding this research project. The questioners being ask to participants are described
clearly to know what is being asked from them. The researcher must allow participants to
take part in the research at their own free will. The researcher must allow the participants
of any participants. No voice and record private will be conducted. People must be
respected and seen not as passive sources of data but as people whose rights and welfare
must be protected.
Treatment of data
The data to be gathered were analyzed using descriptive techniques and will be
REFERENCES
philippines-promotes-cybersecurity-awareness-for-financial-sector.
B.P. Ariola, E.O. Laure, M.A. Perol, P.T. Talines/ 2018/ Cybercrime Awareness and
from:/https://ejournals.ph.
Himani Verma/ 24 February 2021/ Cuber Security And Its Importance In Digital
https://www.hindawi.com/journals/jcnc/.
Lapuh Bele, M. Dimc, D. Rozman, A.S. Jemec/ 2014 January/ Raising Awareness of
Protection/https://www.researchgate.net/publication/291317388_Raising_awarenes
s_of_cybercrime_The_use_of_education_as_a_means_of_prevention_and_protecti
on.
J.M. Drew/ 22 April 2020/ A study of cybercrime victimization and prevention: exploring
strategies/https://www.emerald.com/insight/content/doi/.
15
Jai Li/ 10 May 2021/ Cybercrime in the Philippines: A case study of National
Securityhttps://turcomat.org/index.php/turkbilmat/article/.
Jordan/https://www.sciencedirect.com/science/article/.
CybercrimeinSaudiArabia/https://l.facebook.com/CyberrimeinSaudiArabia/.
campaign/https://pia.gov.ph/news/2022/08/05/pnp-acg-launches-anti-cybercrime-
awareness-campaign.
https://www.hindawi.com/journals/jcnc/.
16