CHAPTER - 1- Thesis Jr-For Checking-4

November 26, 2017 | Author: Reyryan Apor | Category: Cybercrime, Cyberbullying, Bullying, Trespass, Crimes
Share Embed Donate


Short Description

bjgkjfvkjg...

Description

1

CHAPTER I THE PROBLEM AND ITS SETTING Introduction According to (britz 2008) over the past two decades, Cybercrimes

has

emerged

as

a

salient

area

of

inquiry

for

criminologist and a growing concern for public policy. Although there are many definition of Cybercrime, the term generally refers to the crimes committed through the use of computers and computer networks, but it also includes crimes that do not rely heavily on computers Cybercrime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. The Cyber crime can halt any railway where it is, it may misguide the planes on its flight by misguiding with wrong signals, it may cause any important military data to fall in the hands of foreign countries, and it may halt e-media and every system can collapse within a fraction of seconds. The present study has been undertaken to touch some aspects, effect and prospects of this cyber-technology with special

2

reference to threat poses of Cyber crime by India. Efforts have been made to analyze legal framework available for its control in India. To start with, it is, therefore, necessary to demarcate the dimensions of word ‘crime’. Thus it is beyond doubt that ‘crime’ is a relative phenomenon, universal in nature and essentially all societies from ancient to modern have been evidently demonstrating its presence. Each society have been providing its own description of criminal behavior and conduct made punishable by express will of the political community ruling over the society and it was always influence by religious-social-political economical values prevailing in the given society. Thus from time immemorial the behavior that attracts Penal liability influenced and characterized by overall outcome of these standards. Parenthetically, just as concept of crime [has undergone] change with the growth of Information Technology so the categories of criminals who engage in such crimes. So far Indian society is concerned, particularly during ancient

period,

the

definition

of

crime

flagged

by

religious

interpretation. The period was known for complete ominance of religion. All political and social activities in general and 'Crime' in particular, considered to be happened due to the presence of supernatural power. The Demonological theory of crime causation was an outcome of this period. The Department of Justice (DOJ) has ordered the filing of the first case under the controversial Cybercrime Prevention Act of 2012

3

in connection with a computer-related forgery. The crime of computer-related forgery under the cybercrime law covers the act of using computer data for making fraudulent plans or transactions.

Statement of the Problem This study aims to find out the level of awareness on the Cybercrime Prevention Act of 2012 and the extent of behavioral change among students of Polytechnic College of Davao Del Sur, Inc. S. Y. 2016 – 2017. Specifically, it seeks to answer the following questions: 1. What is the profile of respondents when grouped by course? 2. What is the level of awareness of the respondents about the Cybercrime Prevention Act of 2012 when analyzed by: 2.1.

Course, and

2.2.

Overall?

3. What is the extent of behavioral change in the use of internet among the respondents when analyzed according to: 3.1.

Course , and

4

3.2.

Overall?

4. Is there a significant relationship between the level of awareness and extent of behavioral change among the respondents? Statement of the hypothesis Since Criminology has started viewing the emergence of cybercrime as a new locus of criminal activity, a new theory is needed to explain why cybercrime occurs. Transition theory is an explanation for the criminal behavior in the cyber space. There is a need to test the space transition theory to see if it explains cyber criminal activity (Jaishancar 2008) Theoretical Background This study is anchored on Michael Gottfredson and Travis Hirschi Theory of low self control, which is defined as the inability by an individual to exercise personal restraints in the face of tempting immediate easy gratification both in short and long term (Hirchi 2004). Gottfredson and Hirschi also maintained that an individual’s level of self control is establish early in life, between the ages of 8 to 10, is a product of ineffective child rearing, and has many diverse manifestation that reverberate through the life cycle (bullying, bad grades, delinquency, dropping out of school, alcoholism, crime and unemployment).

5

Grasmick et al.(1993) Cited To our best knowledge, to the date there is only one study that has explored the relationship between levels of self control and cybercrime. Using a sample of college students enrolled at a southeastern university in the U.S. and attitudinal measures of self control Bossler and Holt (2010) Cited and assessed the effect of self control on the probability of experiencing five forms of cybercrime victimization: unauthorized access to one’s computer without the knowledge or permission, data loss due to malware infection, and online harassment.

Conceptual Framework

6

Independent Variables

Dependent

Variables

Behavioral change among students of Polytechnic College of Davao Del Sur, Inc.

Level of awareness Cybercrime Prevention Act of 2012

Course

S.Y. 2016 - 2017

Figure 1. Schematic Diagram showing the variables of the

study Over the past two decades, cybercrime has emerged as a salient area of inquiry for criminologists and a growing concern for public policy. Although there are many definitions of cybercrime, the term generally refers to crimes committed through the use of computers and computer networks, but it also includes crimes that do not rely heavily on computers (Britz, 2008). Extant research has explored the nature and extent of cybercrime (Cukier & Levin,

7

2009; Finley, 2009; Finn, 2004; Geis et al., 2009; Huang etal., 2009; Jaishankar, Halder, & Ramdoss.

Scope and limitation This study focus on the level of awareness on the Cybercrime Prevention Act of 2012 and the extent behavioral change among students of Polytechnic College of Davao Del Sur. S.Y. 2016 – 2017. This was conducted at Polytechnic College of Davao Del Sur. The data gathered through the hand made questionnaire to identify the level of awareness of the polytechnic college of Davao Del Sur, Inc. Students about the Cybercrime Prevention Act of 2012.

Significance of the study The main purpose of this study was to determine the level of awareness on the cybercrime prevention act of 2012 and the extent of behavioral change among students of Polytechnic College of Davao Del Sur, Inc. S. Y. 2016, 2017.in addition, the study seek to detect the relationship of two variables. Hence the result of the study will be a great help to the following beneficiaries: Deans/ Directors. The output of this study will shed light among the school heads to conceptualize the cybercrime prevention

8

Act of 2012 to heighten the level of awareness among students of polytechnic college of Davao Del Sur, inc. Faculty. The result of this study will be a great help for the teachers on how to motivate the students the proper usage of the computers, internet and social media sites that will heighten their level of maturation. Students. The output of this study will provide guidelines to the students on what type or appropriate words they will post or sends. it will also increase the level of enhancement and motivation to achieve their goals . Future researchers. The output of this study serves to give information and knowledge to the future researchers about the cybercrime prevention Act of 2012 so that they will not find it hard to gather data.

Definition of Terms In

the

terminologies

desire used

to in

have the

a

better

study,

the

understanding

in

following

defined

are

the

conceptually and operationally: Cybercrime - Is a form of illicit criminal activity conducted over the internet or another computer.

9

Act - Something that is do ne. Awareness - Knowing and understanding a lot about what is happening in the world or around you. Pornography – Sexually explicit videos, photographs, writings, or the like, whose purpose is to elicit sexual arousal. Cyber bullying – is the use of cell phones, instant messaging, email,

chat

rooms

or social

networking sites

such

as Facebook and Twitter to harass, threaten or intimidate someone Cyber trespass – A person is guilty of computer trespass if s/he intentionally and without authorization accesses, alters, deletes, damages, destroys, or disrupts any computer, computer system, computer network, computer program, or data. Cyber Fraud – Online theft of credit card number, expiration date, and other information for criminal use is cyber fraud. Money laundering – is the process of transforming the proceeds of crime and corruption into ostensibly legitimate assets. Plagiarism - Is the "wrongful appropriation" and "stealing and publication" of another author's "language, thoughts, ideas, or expressions" and the representation of them as one's own original work.

10

Review of Related Literature Presented in this portion are the related ideas and information taken from the books, journals, researches and interviews. The conclusion of relevant information about the level of awareness of the students of Polytechnic College of Davao Del Sur. Inc. Students on the Cybercrime Prevention Act of 2012 which will be discuss thoroughly below. Cybercrime According to Kshetr, (2010). Theorist of the internet agrees that cyberspace makes possible near and instant interactions between individuals who are spatially distant, which creates possibility for new forms of association which in turn gives rise to cyber crime and cyber deviance. Cyber crime, in simple terms, is a crime that is facilitated or committed using a computer, network or hardware device. The computer or device may be the agent of the crime, the facilitator of the crime, or the target of the crime. It can take place on the computer alone, or in other virtual or non virtual locations. It is recognized that current legal definition of cyber crime varies drastically between jurisdictions. A practical definition of a cyber crime is offered According to him, Cyber Crime is defined as a criminal activity in which computers or computer networks are the principal means of committing an offence or violating laws, rules or regulations. Examples of cyber crime include denial of service

11

attacks,

cyber-theft,

cyber

trespass,

cyber

obscenity,

critical

infrastructure attacks, online fraud, online money laundering, ID fraud, cyber terrorism, and cyber extortions. It is evident that organized criminal organizations use cyber crime extensively to collaborate and connect with their vast network which is spread across globe. The synergy between organized crime and the internet has thus increased the insecurity of the digital world.

Cyber Fraud Hani Durzy, an eBay spokesperson in USA cited that another form of cybercrime which has a firm grip on society is cyber fraud and scams online. But, the problem with this is the lack of systematic and official data. Internet Crime Complain Centre (ICCC) is the only source available whose primary role is to receive public reports of cybercrime and refer them to the relevant criminal justice agencies for action, claims that frauds ascent for only 0.01% of transactions undertaken using the site yet this would amount to 3000 frauds per day, given that more than 30 million auctions take place on eBay daily Cha (2005)17. The fact is that a growing number of internet auction sites provide thieves a global market through which they sell stolen items to unsuspecting customers.

Pornography

12

According to Lane (2001) Internet is easily accessed on computer, pocket PC, wireless, mobile phone, etc. In the late 1970s and early 1980s, programmers were zealously developing software enabling images that are transmitted, recomposed and viewed through Usenet systems. By 1996, of the ten most popular Usenet groups, five were sexually oriented and one (atl.Sex. Net) attracted some 5, 00,000 readers every day. To a much surprise pornography is the first successful e-commerce product. An important mention here is about a case which was filed in the Juvenile Court, Delhi on the charge of cyber pornography. Some jurist says this is the first Indian cyber pornographic case which was charge sheeted in the juvenile court. A student of a reputed school, New Delhi Was arrested by Delhi police in year 2001, April because he created a porn website as revenge of having being teased by classmates and teachers. He listed the names of his 12 schoolmate girls and teachers in sexually explicit manner. He was charged under section 67 of the Information Technology Act 2000 and section 292,293, 294 of the Indian penal code and the indecent representation of Women act. Cyber Bullying Cyber bullying is an extension of physical bullying. It has two forms; Overt and Covert. Overt bullying is physical aggression and includes beating, kicking and sexual touching. Overt bullying is often accompanied by covert bullying in which victims are excluded

13

from friends group, stalked, gossiped about, verbally harassed and threatened. Cyber bullying is carried by adolescents through Internet. As more and more youth are using the internet for interpersonal relationships, the risk of being bullied is increasing. It leads to depression, anger and sometimes even suicide. According

to

Camarines

Sur

Rep.

Rolando

Andaya

on

Wednesday, May 27 proposed a bill aiming to define and penalize the crime of cyber bullying. The lawmaker wrote the Anti-Cyber Bullying Act of 5718 or “An act of defining and penalizing the crime of cyber-bullying” in an attempt to encourage people to become responsible netizens and make them accountable for their “cyber actions.”Cyber bullying is o ne such problem that the advancement in technology and social media has generated. It can potentially affect not only school-aged children, but also any individual who has access to a mobile phone or the Internet,” Andaya said. Cyber bullying, according to the bill, are acts of cruelty committed using the Internet or any form of electronic media or technology that has the effect of stripping one’s dignity or causing reasonable fear or physical or emotional harm. Among other offenses included in the bill that defines the scope of cyber bullying are: • Repeated sending of offensive, rude and insulting message, distributing and belittling information about the victim;

14

• Posting or sending of offensive photos of the victim, whether digitally altered or not, or were taken with or without consent, as long as it has intention to humiliate and embarrass the victim; • Breaking into an e-mail, social networking or any electronic account and using the victim’s virtual identity to send, upload or distribute embarrassing materials to or about others, sharing the victim’s personal or embarrassing information and sharing it to others and repeated sending of messages such as threats or harm or engaging in online activities causing fear on victim’s safety. If passed, netizens convicted of cyber bullying would be fined a penalty of P50, 000 but not more than P100,000 and imprisonment of not less than six months, but not more than six years, or both. “Because of the anonymity that the Internet gives, social and moral norms are easily switched off and users are emboldened to just say or post anything online without accountability,” Andaya explained. The Camarines Sur Representative noted that Internet bashing has become a culture among Internet users and even initiates problems that

involve

Philstar.com)

Plagiarism

hostility

and

aggression. (With

reports

from

15

Is the intentional or unintentional use of the work of another without

proper

acknowledgment.

You

may

be

aware

that

reproducing the published words of another without acknowledging the source of the words is plagiarism; however, you might be unaware

of

the

scope

of

the

concept

of

plagiarism.

The

term plagiarism applies not only to the published word, but also to unpublished

materials,

the

spoken

word,

opinions,

theories,

pictures, graphs, and statistics. In fact, plagiarism might occur at any time when the material of another is being used, regardless of the source or format of the material. An example of a situation in which unintentional plagiarism can easily occur is when students work together, formally or informally, on a class assignment. If you do collaborative work with other students and then use their ideas or material in the work you submit, you must credit the work of the other students. If you do not properly acknowledge that you have incorporated the work of other students into your materials, you are guilty of plagiarism. In addition, you might not appreciate that plagiarism is not limited to copying verbatim from a source but also occurs when you paraphrase the work of another. The sole exception to the rule that all materials being used must be properly acknowledged is if the material being used is common knowledge. Information and ideas that appear in many places or

16

that are readily available to anyone would be regarded as common knowledge. You may not know what a common knowledge in your discipline is. When in doubt, err on the side of citing your source. The appropriate method of acknowledging source materials varies from discipline to discipline and from instructor to instructor. References to source materials might be given in footnotes, endnotes, a bibliography together with pointers in the text indicating where and which bibliographical item was used, or possibly in the body of your text. You should talk to your instructors about their requirements for properly acknowledging sources. Cyber Trespass According to BizLegis (April 2, 2012). the word “trespass” in general means to enter into the other’s property without seeking consent. It is considered a civil wrong ordinarily. If the trespass is committed with criminal intention it is called criminal trespass. To protect an owner’s control over the property the trespass actions are stranded. The websites should also be considered a species of property. The concept of trespass is applicable in cases of the cyber world and may be termed as Cyber Trespass. The act of hacking by the hacker is of civil nature, but if the intention to harm or damage the system is proved, the liability is of penal nature. The hacking may also result in other crimes mentioned in the Indian Penal Code 1860 apart from criminal trespass. For example if a hacker hacks

17

into the Information Technology Act tries to the website of a bank and transfers money into his account this may constitute a crime under Section 378 of the Indian Penal Code 1860. The act in the above case can also be termed as Cyber Theft. The Information Technology Act provides civil and penal consequences for hacking and other wrongful activities. The technological development has given rise to gadgets like computers, laptops, tablets and other instruments which can also be a cause of rampant tort of Cyber Trespass. The computer is used as a tool for activities like email spoofing, cyber defamation and also used as a target like in the cases of unauthorized access, email bombing, Trojan attacks or sometimes for both. This is called cyber crimes. It is difficult to eliminate cyber trespass from the cyber world; however it is quite possible to check them. The computer data may also contain personal information, so the hacker can also infringe one’s right to privacy guaranteed by Indian Constitution under Article 21. The global connectivity is facilitated by internet having impact on few areas of tort. There is trespass to property and persons in the cyber world like.

Money laundering

Anti-Money Laundering Act of 2001 (RA 9160) an act defining the crime of money laundering, providing penalties there for and for

18

other purposes Be it enacted by the Senate and House of Representatives of the Philippines in Congress assembled: SECTION 1. Short Title. This Act shall be known as the "Anti-Money Laundering Act of 2001." SEC. 2. Declaration of Policy. It is hereby declared the policy of the State to protect and preserve the integrity and confidentiality of bank accounts and to ensure that the Philippines shall not be used as a money laundering site for the proceeds of any unlawful activity. Consistent with its foreign policy, the State shall extend cooperation in transnational investigations and prosecutions of persons involved in money laundering activities wherever committed. SEC. 3. Definitions. For purposes of this Act, the following terms are hereby defined as follows: (a) "Covered institution" refers to: (1) banks, non-banks, quasi-banks, trust entities, and all other institutions and their subsidiaries and affiliates supervised or regulated by the Bangko Sentral ng Pilipinas (BSP), (2) insurance companies and all other institutions supervised or regulated by the Insurance Commission, and (3) securities dealers, brokers, salesmen, investment houses and other similar entities managing securities or rendering services as investment agent, advisor,

or

consultant,

mutual

funds,

close-end

investment

companies, common trust funds, pre-need companies and other similar entities,

foreign exchange corporations, money changers,

money payment, remittance, and transfer companies and other similar entities, and

other entities administering or otherwise

19

dealing in currency, commodities or financial derivatives based thereon, valuable objects, cash substitutes and other similar monetary instruments or property supervised or regulated by Securities and Exchange Commission and Exchange Commission (b) "Covered transaction" is a single, series, or combination of transactions involving a total amount in excess of Four million Philippine pesos (Php4,000,000.00) or an equivalent amount in foreign currency based on the prevailing exchange rate within five (5) consecutive banking days except those between a covered institution and a person who, at the time of the transaction was a properly identified client and the amount is commensurate with the business or financial capacity of the client; or those with an underlying legal or trade obligation, purpose, origin or economic justification. It likewise refers to a single, series or combination or pattern of unusually large and complex transactions in excess of Four million Philippine pesos (Php4,000,000.00) especially cash deposits and investments having no credible purpose or origin, underlying trade obligation or contract. (c) "Monetary instrument" refers to: (1) coins or currency of legal tender of the Philippines, or of any other country; (2) drafts, checks and notes. (3) securities or negotiable

instruments,

bonds,

commercial

papers,

deposit

certificates, trust certificates, custodial receipts or deposit substitute instruments, trading orders, transaction tickets and confirmations of sale or investments and money market instruments; and (4) other

20

similar instruments where title thereto passes to another by endorsement, assignment or delivery. (d) "Offender" refers to any person who commits a money laundering offense. (e) "Person" refers to any natural or juridical person. (f) "Proceeds" refers to an amount

derived

or

realized

from

an

unlawful

activity.

(g)

"Supervising Authority" refers to the appropriate supervisory or regulatory agency, department or office supervising or regulating the

covered

institutions

enumerated

in

Section

3(a).

(h)

"Transaction" refers to any act establishing any right or obligation or giving rise to any contractual or legal relationship between the parties thereto. It also includes any movement of funds by any means with a covered institution. (i) "Unlawful activity" refers to any act or omission or series or combination thereof involving or having relation to the following: (1) Kidnapping for ransom under Article 267 of Act No. 3815, otherwise known as the Revised Penal Code, as amended; (2) Sections 3, 4, 5, 7, 8 and 9 of Article Two of Republic Act No. 6425, as amended, otherwise known as the Dangerous Drugs Act of 1972; (3) Section 3 paragraphs B, C, E, G, H and I of Republic Act No. 3019, as amended; otherwise known as the Anti-Graft and Corrupt Practices Act; (4) Plunder under Republic Act No. 7080, as amended; (5) Robbery and extortion under Articles 294, 295, 296, 299, 300, 301 and 302 of the Revised Penal Code, as amended; (6) Jueteng and Masiao punished as illegal gambling under Presidential Decree No. 1602; (7) Piracy on the high seas

21

under the Revised Penal Code, as amended and Presidential Decree No. 532; (8) Qualified theft under Article 310 of the Revised Penal Code, as amended; (9) Swindling under Article 315 of the Revised Penal Code, as amended; (10) Smuggling under Republic Act Nos. 455 and 1937; (11) Violations under Republic Act No. 8792, otherwise known as the Electronic Commerce Act of 2000. Cyber Trespass According to BizLegis (April 2, 2012 ) the word “trespass” in general means to enter into the other’s property without seeking consent. It is considered a civil wrong ordinarily. If the trespass is committed with criminal intention it is called criminal trespass. To protect an owner’s control over the property the trespass actions are stranded. The websites should also be considered a species of property. The concept of trespass is applicable in cases of the cyber world and may be termed as Cyber Trespass. The act of hacking by the hacker is of civil nature, but if the intention to harm or damage the system is proved, the liability is of penal nature. the hacking may also result in other crimes mentioned in the Indian Penal Code 1860 apart from criminal trespass. For example if a hacker hacks into the Information Technology Act tries to the website of a bank and transfers money into his account this may constitute a crime under Section 378 of the Indian Penal Code 1860. The act in the above case can also be termed as Cyber Theft. The Information

22

Technology Act provides civil and penal consequences for hacking and other wrongful activities. The technological development has given rise to gadgets like computers, laptops, tablets and other instruments which can also be a cause of rampant tort of Cyber Trespass. The computer is used as a tool for activities like email spoofing, cyber defamation and also used as a target like in the cases of unauthorized access, email bombing, Trojan attacks or sometimes for both. This is called cyber crimes. It is difficult to eliminate cyber trespass from the cyber world; however it is quite possible to check them. The computer data may also contain personal information, so the hacker can also infringe one’s right to privacy guaranteed by Indian Constitution under Article 21. The global connectivity is facilitated by internet having impact on few areas of tort. There is trespass to property and persons in the cyber world like. CHAPTER 3 METHODOLOGY This chapter is about the research method and procedures that were use in the completion of this study. These include research

design,

research

locale,

respondents,

research

instrument/s, sources of data and methods of collecting data, and treatment of data. Research Design

23

This study employs the descriptive research method to determine the following: the level of awareness of the Polytechnic College of Davao del Sur, Inc. students on the Cybercrime prevention act of 2012 in terms of Cyber Terrorism, Pornography, Cyber Bullying, Cyber Prostitution, Cyber Laundering, Plagiarism, Piracy, Cyber Trespass (hacking), Research Locale Polytechnic College of Davao del Sur, Inc. is one of the pioneer collegiate institutions in Davao del Sur. It offers Bachelor of Science

in

Criminology

course.

It

has

produced

competitive

professionals both in the public and private sectors. It is located in McArthur Highway 8002 Digos City, Philippines. Respondents The respondents of this study were the 50 randomly selected students of Polytechnic College of Davao del Sur, Inc. Research instruments/s The instrument that was used in this study was the survey questionnaires that was prepared by the researcher and were evaluated by the panelists during their defense. Statistical Treatment The data was analyzed using descriptive statistics. The data was treated with the use of the Arithmetic mean and pearson-R

24

1. Percentage P= f/n x100 Where: P= Percentage F= Frequency N= Number of respondents 100 = Constant to eliminate decimal point

2. Weighted Mean Wm = Σfx N Where: X- Weighted mean Σfx – Sum of the product of f and x scores

3.Pearson – r Rp =Σdxdy (N-1)(sdx)(dy)

Where:

25

Rp =Person’s coefficient of correlation Σdxdy =the sum of the product of the deviation of x and y variables Sdx = Standard deviation of x Dy = Standard deviation of y N = Number of subject

POLYTECHNIC COLLEGE OF DAVAO DEL SUR,INC Mc Arthur highway, Brgy Kiagot Digos City

Name:________________ Year & Course___________ Please mark check (√) if you answer is YES on the yes box and mark ( X ) if your answer is NO on the no box. yes 1. Do you know Internet? 2. Are you using the Internet? 3. Are you using internet on Mobile phone? 4. Do you have your own personal computer and internet connection? 5. Do you know what cybercrime prevention act of 2012 is? 6.Are you kind ,of person who likes Searching, Chatting, e-Mailing, Video games

No

26

7. Do you have an e-mail account? 8. Did you experience getting a mail from unknown Persons any time? 9. Do you use Facebook / twitter /Blog / Any other social network site? 10. Do you know what Cyber Bullying is? 11. Do you download Movies, Songs, Application, and Document from the internet? 12. Do you think downloading Internet is legal or not?

data

over

13. Do you know what is Cyber Trespass or hacking? 14. About your opinion what are advantages of Internet 15. About your opinion what are disadvantages of Internet 16. Do you know what computer viruses are? 17. Which connection/service do you use to connect to the Internet? BSNL, VSNL, Cable, Wi-Fi any other 18. Do you know what computer piracy is? 19. Do you use any antivirus for your computer system protection? 20. Do you purchase the antivirus software? 21. How regularly you update your antivirus, daily, weekly, monthly, yearly 22. Do you know what Plagiarism is? 23. Do you use the password for computer security? 24. How regularly change the computer / mail password, Daily, weekly, monthly, yearly

27

25 Are you a frequent user of Internet?

Polytechnic College of Davao Del Sur, Inc. MacArthur Highway, Digos City

APPROVAL SHEET In fulfillment of the requirements in Criminology Research 1 leading to the Bachelor of Science in Criminology this undergraduate thesis entitled “Level of awareness of the Cybercrime Prevention Act of 2012 and the extent behavioral change among Students of Polytechnic College of Davao Del Sur. Inc. S.Y. 2016 - 2017”, prepared and submitted by Alexander A. Puto, Arjaybrent A Cayawin, Jeverson J. Alcoba, Rey Anthony B. Apor is hereby to recommended for acceptance and approval for Oral Examination. Mr. Rex C. Parame, LET Thesis Adviser

Panel of Examiners Approved and accepted during an Oral Examination with a grade of._______ Mr. Jan Dominic D. Nava, Rcrim, CSP

Member

Mrs. Lorna Q. Escharcha

Member

Ms. Chique M. Nacionales,MsCrim. Chairperson

Accepted on partial fulfillment of the requirement in Criminology Research 1 leading to the degree of Bachelor of Science in Criminology.

28

Mrs. Ruth B. Cubita, RN, RM, MAN Research Coordinator APPENDIX D LETTER TO THE RESPONDENTS POLYTECHNIC COLLEGE OF DAVAO DEL SUR, INC. Mac Arthur Highway, Digos City

Dear Respondent, We, a group of 3rd year student taking Bachelor of Science in Criminology are conducting a study on the Level of awareness on the Cybercrime Prevention Act of 2012 and Extent Behavioral Change Among Students of Polytechnic College of Davao Del Sur, Inc. S. Y. 2016 - 2017 . We are requesting for your cooperation and participation in answering the questionnaire attached with this letter. We can assure you that all of these will be kept confidential. We hope for your positive response. Thank you!

Sincerely Yours,

Arjaybrent A. Cayawin Jeverson J.Alcoba Jr. Rey Anthony B. Apor Alexander A. Puto

29

LEVEL OF AWARENESS OF THE CYBERCRIME PREVENTION ACT OF 2012 AND THE EXTENT OF SELF-CONTROL AMONG THE STUDENTS OF POLYTECHNIC COLLEGE OF DAVAO DEL SUR.INC S. Y. 2016 - 2017

POLYTECHNIC COLLEGE OF DAVAO DEL SUR, INC Criminology Department Digos City

ARJAYBRENT A. CAYAWIN JEVERSON J. ALCOBA Jr. REY ANTHONY B. APOR ALEXANDER A PUTO October 2016

30

ACKNOWLEDGEMENT

The researchers gratefully express their sincere appreciation to many people whose assistance and unselfish help made this study possible. Heartfelt thanks to our mentors, colleagues, and friends who pave the way for the realization of this study. To Mr. Rex C. Parame, LET, Adviser, for his guidance, concern, supervision and encouragement. Despite his hectic schedule. To Ms. Chique M. Nacionales, MsCRIM, Dean, Criminology Department,

for

her

heartfelt

support

and

who

impart

her

knowledge and experience in research work to the researchers. To the researcher’s instructor, Ruth B. Cubita, RM, RN, MAN, for teaching the basics on research and her patience , invaluable advices, help, corrections and suggestions. To our Parents who extended their spiritual and financial support, without them this project could have not made possible and nevertheless we wouldn’t have treasured at school. Above all to the Almighty and Loving God, the source of all the blessing and wisdom, for sustaining grace that made this research a reality. -The researchersTable of Content

31

Title Page……………………………………………………………………………………………. i Table of Content………..……………………………………………………………………… ii Approval Sheet……………………..…………………………………………………………… iii Acknowledgement………………..…………………………………………………………. iv Dedication………………………………………………………………………………………… v Chapter 1 The problem and its Setting…………………………………………………….. 1 The Statement of the Problem…………………………………………………. 3 The theoretical background…………………………………………….……….. 4 The conceptual framework……………………………………………………….. 6 The Significance of the study…………………………………………………… 7 Definition of Terms……………………………………………………………………. 8 Chapter 2 Review of Related Literature……………………………………………………. 9 Chapter 3 Methodology…………………………………………………………………………………

32

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF