AWARENESS ON CYBERCRIME OFFENCES AMONG STUDENTS OF ST.
PETERS
COLLEGE
A
Thesis Proposal
Presented to
The College of Criminology
Iligan City, Philippines
In Partial Fulfillment
Of the Requirements in Crime 06
Criminological Research and Statistics
SY 2021-2022
RIZA MAE C. CALISO
JUANITO JR. D. FABULAR
MARIEL A. LACIDA
September 2021
CHAPTER 1
THE PROBLEM
Cybercrime is emerging as a very serious threat in today's world. The internet
brings joy to our lives but at the same time it has some negative sides too. The cyber
criminals are always in a search to find out the new ways to attack the possible internet
victims. Today, everybody is using the computers i.e. from white collar employees to
terrorists and from teenagers to adults. All the conventional crimes like forgery, extortion
kidnapping etc. are being done with the help of computers. New generation is growing
up with computers and most important is that all the monetary transactions are moving
on the internet So, it has become very important for us to be aware of the various
cybercrimes being committed with the help of computers. The paper is an attempt to
provide a glimpse of various types of cybercrimes prevalent in modern technological
society and what steps can be taken to protect ourselves from these cybercrimes.
Crimes is a social and economic phenomenon and is as old as the human
society, it is a legal concept and has the sanction of the law, A crime may be said to be
any conduct accompanied by act or omission prohibited by law and consequential
breach of which is visited by the penal consequences, So crime or offence is "a legal
wrong that can be followed by criminal proceedings which may result into punishment"
The internet as we know has grown rapidly over the last decade, it has given rise to
many avenues in every field we can think of - be it education, entertainment, business,
or sports.
However with every boon there is a curse too, This curse is Cybercrime -
Illegal activities committed over the internet, The internet along with its advantages has
also exposed us to security risks. Computers today are being misused for unlawful
activities like e-mail espionage, credit card fraud, spam, software piracy, spreading of
viruses and so on, which invade our privacy and offend our senses, Criminal activities
over internet are on the rise. The cybercrime today is the latest and perhaps the most
complicated problem in the cyber world. A generalized definition of cybercrime may be
"unlawful acts wherein the computer is either a tool or target or both" The other
definition could be, "Cybercrime is a form of crime where the internet or computers are
used as a medium to commit crime", According to PavanDuggal, Supreme Court
Advocate and Cyber Law Expert, "Any criminal activity that uses a computer either as
an instrumentality, target or a means for perpetuating further crimes comes within the
ambit of cybercrime" (http://ssijmar in/vol2no2/vol2no2.24.pdf)
The motivation of this study arose the researchers observation from some
friends who were the victims of any crime involving social media. In fact, just like any
other victims of cybercrime experienced anxiety, fear, depression, and low self-esteem.
THEORETICAL FRAMEWORK
Self-Control Theory
According to Gottfredson and Hirschi (1990) contended that, ultimately, one
does not develop low self-control. Instead, possessing low self-control is more a matter
of having not developed self-control as a young child. Accordingly, low self-control
manifests itself in the “absence of nurturance, discipline, or training” (p. 95). Stated
otherwise, “The causes of low self-control are negative rather than positive; self-control
is unlikely in the absence of effort, intended or unintended, to create it” (p. 95). Here
Gottfredson and Hirschi are stating that if a person does not develop self-control, the
default is low self-control. Acquiring self-control is a matter of socialization. A child with
low self-control then becomes the product of “ineffective childrearing” (p. 97).
Specifically, the authors stated that consistent supervision and discipline, coupled with
affection, results in the proper development of self-control. They noted that several
things may impede this socialization process, however, including parents who may not
feel affection toward their children or who lack the time or energy to devote to
supervision, and parents who may not see problem behavior for what it is and who may,
having witnessed and processed their child’s inappropriate behavior, not be so inclined
to punish them. Such situations may become exacerbated when parents engage in
behavior indicative of low self-control themselves.
https://criminal-justice.iresearchnet.com/criminology/theories/self-control-theory/3/
As the theory suggests, the researchers believed that the students at St.
Peter’s College differed in terms of the upbringing of the parents to their children. An
individual who are well disciplined, well- supervised and being affectionate towards
others developed self- control. On the other hand, if an individual does not developed
self- control, the default is low- self- control. The low self- control is a psychological trait
that develops during childhood due to ineffective parenting. It can develops the
individual being impulsive, insensitive to others, and self- centered. The individuals with
low self- control are more likely engage in risky behaviors that results to a negative
impact toward themselves.
Situational Crime Prevention Theory
According to Freilich and Newman ( 2017 ) Situational crime prevention (SCP)
is a criminological perspective that calls for expanding the crime-reduction role well
beyond the justice system. SCP sees criminal law in a more restrictive sense, as only
part of the anticrime effort in governance. It calls for minutely analyzing specific crime
types (or problems) to uncover the situational factors that facilitate their commission.
Intervention techniques are then devised to manipulate the related situational factors. In
theory, this approach reduces crime by making it impossible for it to be committed no
matter what the offender’s motivation or intent, deterring the offender from committing
the offense, or by reducing cues that increase a person’s motivation to commit a crime
during specific types of events. SCP has given rise to a retinue of methods that have
been found to reduce crime at local and sometimes national or international levels.
SCP’s focus is thus different than that of other criminological theories because it seeks
to reduce crime opportunities rather than punish or rehabilitate offenders.
https://oxfordre.com/criminology/criminology/view/10.1093/acrefore/9780190264079.00
1.0001/acrefore-9780190264079-e-3#:~:text=Situational%20crime%20prevention
%20(SCP)%20is,well%20beyond%20the%20justice%20system.&text=SCP’s%20focus
%20is%20thus%20different,than%20punish%20or%20rehabilitate%20offenders
General Strain Theory
According to Brezina ( 2017) General strain theory (GST) provides a unique
explanation of crime and delinquency. In contrast to control and learning theories, GST
focuses explicitly on negative treatment by others and is the only major theory of crime
and delinquency to highlight the role of negative emotions in the etiology of offending.
According to GST, the experience of strain or stress tends to generate negative
emotions such as anger, frustration, depression, and despair. These negative emotions,
in turn, are said to create pressures for corrective action, with crime or delinquency
being one possible response.
GST was designed, in part, to address criticisms leveled against previous versions of
strain theory. Earlier versions of strain theory have been criticized for focusing on a
narrow range of possible strains, for their inability to explain why only some strained
individuals resort to crime or delinquency, and for limited empirical support. GST has
been partly successful in overcoming these limitations. Since its inception, the theory
has received a considerable amount of attention from researchers, has enjoyed a fair
amount of empirical support, and has been credited with helping to revitalize the strain
theory tradition. The full potential of GST has yet to be realized, however, as the theory
continues to evolve and further testing is required.
https://oxfordre.com/criminology/view/10.1093/acrefore/9780190264079.001.0001/acref
ore-9780190264079-e-249
CONCEPTUAL FRAMEWORK
This study will assess the awareness of student towards cybercrimes
offenses considered two variables, the independent variables and dependent variables.
The independent variables consisted the personal profile of the student respondents
such as age, gender, year level, and marital status. The dependent variable is the
cybercrime offenses. The significant relationship will established between the
independent variables and the dependent variables of the study of which the result are
the basis for an intervention program.
Independent
Dependent Variable Output
Variables
Students Profile
1. Age Level of Awareness
on Cybercrime Intervention
2. Gender offenses program
3. Year Level
4. Marital Status
Figure 1. The Schematic Diagram of the Study
STATE OF THE PROBLEM
The study aimed to investigate the awareness on Cyber-crime offenses
among students of St. Peter’s College
Specifically, the researchers seek to answer the following questions:
1. What is the demographic profile of the respondents in terms of their:
1.1 age, :
1.2 gender,
1.3 Year level; and
1.4 Marital Status
2. How aware are the students towards cybercrime offense in terms of:
2.1 Cyber-bullying;
2.2 Cyber Extortion;
2.3 Cyber Squatting;
2.4 Cyber Sex;
2.5 Child Pornography;
2.6 identity Theft; and
2.7 Libel?
3. Is there a significant relationship between the demographic profile of the respondent
and their awareness towards cyber bullying cyber extortion cybersquatting, cybersex,
identity theft, Libel, child pornography and illegal access to data?
4. Based on the findings, what intervention program can be proposed?
NULL HYPOTHESIS
There is no significant relationship between profile of the respondents and
their awareness towards cybercrime offenses.
SIGNIFICANCE OF THE STUDY
The Result and finding of this study will provide information to the school
Administrators, Guidance, Counselor, Faculty, Parents, Students and Future
Researcher about the awareness on Cyber-Crime Offenses among the students of St.
Peters College
School Administrators. This Study will provide necessary inputs to the school's
administrators for their information regarding student’s awareness on cybercrime
offenses and be able to provide strategic program for the student’s protection.
Guidance Counselor. The result of this study will be the basis for her to intensify
the individual counseling services specifically to the students who are victims of
cybercrime, including who could be guilty in committing such acts.
Faculty. The findings of this study will help the faculty members in identifying
student in their respective classroom who could be victims of cybercrime or could be the
culprits of cybercrime offenses.
Parents. The findings of this study will make the parents be aware on cybercrime
offenses for them to remind their children not to do such acts which might harm their
future.
Students. This will provide insight for those who could be into it yet they not
know they can be liable to their acts.
Future Researchers. This study will help the future researchers to use as their
guide and reference in conducting the same study with wider scopes and additional
variables.
Scope and limitation of the study
This study will be conducted to determine the Awareness on Cyber-Crime
Offenses among Students of St. Peters College. It considered the students who are
officially enrolled in college during the 1 st semester of S.Y 2020-2021
Definition of Terms
The following herein are defined conceptually and operationally for
clarification and understanding.
Cybercrime. This refers to any type of illegal scheme that uses one or more
components of the internet (chat room, email, message board, website, and auctions) to
conduct fraudulent transactions or transmit the proceeds of frauds to financial
institutions or to others connected with scheme. Cybercrime also applies to generating
spam emails, downloading viruses or spyware to computer, harassing another through
the internet child pornography and solicitation of prostitution online. Perhaps the most
prominent form of Cybercrime is identity theft, in which criminals use the internet to steal
personal information from other users (https://definitions.uslegel.com/c/cybercrimes/)
Cyber Bullying. This is the use of cellphones, instant messaging, email, chat
rooms or social networking sites such as Facebook to harass, threaten or intimidate
someone.
(http://searchsecurity.techtarget.com/definition/cyberbullying)
Child Pornography. This refers to a form of child sexual exploitation or any
visual deception of sexuality explicit conduct involving minor (person less that 18 years
old) (https://www.justice.govicriminal-ceos/child-pornography)
Cyber Extortion. This refers to a crime involving an attack or treat of attack
coupled with demand for money to avert or stop the attack.
(http://searchsecurity,techtarget.com/definition/cyberextortion)
Cyber Squatting. This term refers to illegal domain name registration or use
or claiming a website to be your for the purpose of scamming.
(http://www/techopedia.com/definition/2393/cybersqatting)
Cyber Sex. This refers to an online sex-oriented conversations and
exchanges or sex oriented available on a computer.
(http://www.meriam-webster.com/dictionary/cybersex)
Libel. This refers to defamation by written or printed words, pictures, or in
any form other than by spoken words or gestures.
(http://www.dictionary.com/browse/libel)
Identity Theft. This refers to known as identity fraud, is a crime in which an
imposter obtains key pieces of personally identifiable information, such as social
security or drivers license numbers, in order to impersonate someone else .
(https://searchsecurity.techtarget.com/definitaion/identitytheft)
Internet. This refers to an electronic communications network that
connects computer networks and organizational computer facilities around the world.
(https://www.meriam-webster.com/dictionary/internet)
CHAPTER 2
REVIEW OF RELATED LITERATURE AND STUDIES
In this chapter, the focus is on the Cybercrime Law. It aims to provide
student's information to know and to be aware about cybercrime law.
Related Literature
Cybercrimes are any crime that is committed using a computer, a network, or
hardware device. Attack include keystroke loggers, viruses, root kits or Trojan horses,
phishing, pharming, theft or manipulation of data or services via hacking or viruses,
identity theft and back or e commerce fraud (Merrit 2010:15).
From the viewpoint of the Council of Europe on the Convention on Cybercrime
which is the only binding international instrument on issue, "Cybercrime" is "one of the
most global of all transnational crimes an it poses major challenges for the law
enforcement and criminal justice systems" (Council of Europe 2009). The pervasiveness
of these computer crimes is in fact growing reaching to an annual revenue of "$1.trillion"
(Leyden, 2009.1) and is estimated to exceed to revenues of international drug trafficking
(Council of Europe 2009 and Security (Watch 2009).
Related Studies
The prevalence of cybercrimes worldwide has been considered as a threat to
democracy. "The Growing danger from crimes committed against computers, or against
information on computers, is beginning to claim attention in national capital" (McConnel
2000;1). The information technology revolution has influenced the society in handling
everyday activities. "it has in one way or the other pervaded almost every aspect of
human activities" (Convention on Cybercrime, ETS 185, Explanatory). Cybercrimes are
harmful acts committed from or against a computer or network. According to German
criminologists, cybercrimes are computer crimes that infringe property interests when
electronic information is deliberately modified (computer manipulation). destroy
(computer sabotage) or used to misappropriate computer time. Other popular definitions
are those committed in the sphere of computer information and those perpetrated by
using the computer (Polivanyuk, 2009)
Furthermore, Cybercrimes differ from most terrestrial crimes in four ways. First,
committing these crimes can easily be learned; second. there are few resources relative
to the potential damage caused; third, cybercrimes can be committed in a jurisdiction
without being physically present; and fourth, cybercrimes are often not clearly illegal
(McConnell 2000), The emergence of these crimes can be attributed to information and
Communication Technology (ICT) which is a "set of activities that facilitate by electronic
means the processing, transmission, and display of information" which has become the
center of the society" (Asian Development Bank 2003). "ICT" is also defined as tools
that facilitate the production, transmission, and processing of information.
(https://aboutphilippines.ph/files/policypaper-addressingcybercrimes.pdf).
The crime that is done using internet i.e. cybercrime has been taking place
tremendously. internet is the place where large number of criminal activities can take
place and people that have intelligence can misuse the internet which leads to lasting of
criminal activities in cyber space. So, to control the criminal activities in cyberspace,
cyber law was made. Cyber law is made to help the people if any cybercrime has
happened with them. At some places, there is special team of intelligent officers that
work to arrest the criminals. Cyber law deals with all this online transactions, activities
going on the internet and cyberspace. Every action in cyberspace has cyber legal
perspective. There are various cyber laws issues associated at every point of time.
Form the time of registering domain name for website to the time to promote your
website to the time when you send and receive mails to the time of online transactions,
at every point of the time these cyber law issues are involved. Everyone must
understand the cyber law for their own benefit.
(https:www.ijarcsse.com/docs/papers/Volume_5/8_August2015/V5180156.pdf)
Cyber criminals are no different than traditional criminals in that they want to
make their money as quickly and easily as possible. Cybercrime prevention can be
achieved fairly quickly and in a cost-effective manner. When Armed with a little technical
advice and common sense, many cybercrime attacks can be avoided. Seminar to target
hardening for residence or a business (e.g., lights, locks, and alarms), the more difficult
it is for cybercriminal to successfully attack a target, the more likely he or she is to leave
it alone and move on to an easier target. Most cybercrimes cannot be placed into a
single crime category, which makes statistical recording of this activity limited at best.
The internet Crime Complaint Center (IC3) Compiles and releases annual
reports on the statistics and cybercrimes facts. Using statistics and facts, analysis,
prepare reports on cybercrime trends and growth. Knowing the facts, trends, and growth
is critical to crime prevention efforts on protection personal data
http://www.ncpc.org/resources/files/pdf/internet-safety/13020-Cybercrimes-revSPR.pdf)
Computer crime is a global phenomenon criminal offenses may be committed
from anywhere in the world and may have effects beyond the borders of the offenders
country, across entire continents, or even on a worldwide scale. The prevention and
prosecution of these criminal acts require all affected countries to cooperate and to
develop the necessary legal instruments. Up to now, The Council of Europe’s
"Convention on Cybercrime" of 2001 is the most influential international instrument in
the field. Still, it covers only some computer related criminal offenses and legal issues.
Further problem areas are regulated by other international instrument or they are not
regulated at all. The project takes broad aim at current computer-specific issues of
substantive criminal law and criminal procedure as well as at selected related issues. As
far as the substantive criminal law is concerned, the main focus is on offenses against
the confidentiality, integrity, and availability of the computer data and systems (the so-
called CIA offenses), additional areas of examination include other computer related
offenses, "illegal content," infringements of intellectual property, as well as privacy
offenses and the general principles of criminal liability of internet service provides. In the
area of criminal procedure computer-specific, coercive investigatory powers and the law
of evidence are being analyzed as are questions concerning the obligatory retention of
telecommunication data for evidentiary purposes and the protection of civil liberties
during the criminal process.
(https://www.mpicc.de/en/forschung/forschungsarbeit/strafrencht/computerkriminalitaet.
html)
CHAPTER 3
RESEARCH METHODOLOGY
This Chapter provides a discussion of the research design, locale of the study,
respondents, data gathering procedures, instrument used, statistical treatment of data
and scoring procedure.
Research Design
The study used the descriptive method with the guided response type
questionnaire for the gathering of data about the Awareness on St. Peters College
students towards Cybercrime Offenses. This design was deemed useful in carrying out
the objectives of the Study.
Respondents
The Respondents of this study were the students from the different departments
of St. Peters College. A total population of (100) students representing all departments
were considered but in case of those departments with few students such as College of
Electrical Engineering and College of Computer Studies all were given questionnaires.
Sampling Design
The study utilized the random sampling in getting the awareness of the selected
college students of St. Peters College towards cybercrime offenses.
Data Gathering
The researchers asked permission from the Dean of every department covered in
the study. After the approval, the researchers will distribute the questionnaires. A total of
50 respondents from the different departments will be given ample time to answer
correctly and honestly the questions.
At the end of the session, the respondents were asked to return the questionnaires
immediately. After the retrieval of the questionnaires, the data were tabulated, analyzed
and evaluated.
Instrument Used
The researchers made use of the self-constructed Survey Questionnaires based
from cybercrime law provisions and were validated by their adviser Prof.
Maricar Cabili_________ Kimberly Mae Mirantes_________ The Department Head of
criminology
The Questionnaire contains two (2) parts Part 1 is the respondents profile Variables
used were the ages, gender, year level, and marital status. Part 2 were the awareness
of the student towards the cybercrime offenses.
Statistical Treatment of Data
In this study, the quantitative method was used as the instrument in analyzing
data. The data gathered from the study was analyzed and presented in tabular forms.
With the final result, interpretation of data were done with several recommendations that
generated for enhancement.
To obtain an accurate analysis and interpretation of data the following statistical
tools were
1. Frequency and Percentage. This was used to describe the profile or the
respondents.
P = (f/n) x 100
Where P= Percentage
f = frequency
n = numbers of respondents
100 = constant
2. Weighted Mean. The most common type of average, except that instead of each of
the data points contributing equally to the final average, some data points contribute
more than others
Formula = X = W 1 V 1 + 1 V 2 +
N
Where X = is the weighted mean
W = is the weight given to the response of x
V = is the number of respondents
N = total population
3. Ranking. The relationship between a set of items such that for any two items, the
first either higher than' ranked higher than', ranked equal to the following items. This
was used in the items of part 2 of the questionnaire which is the awareness of the
students towards cybercrime offenses.
4. Pearson Correlation Coefficient - This is a technique for investigation the
relationship between two quantitative, continuous variables, for example, age and blood
pressure.
Formula
r= NΣXY=(ΣX)(ΣY) .
√(NΣX3-(Σx)3)(NΣy2-(ΣY)1)
Where :
r = the Pearson Product Moment Coefficient of Correlation
n = sample size
Σxy = the sum of the product of x and y
ΣxΣy = the product of the sum of Σx and the sum of Σy
Σx2 = sum of squares of x
Scoring Procedure
These are corresponding points gained upon checking the frequency of the
respondents answer in the visual, auditory and kinesthetic questions.
Table 1. Scale for Weighted Mean Interpretations
Scale Weighted Mean Value Interpretation
4 3.26-4.0 Highly Aware
3 2.51-3.25 Aware
2 1.75-2.50 Unaware
1 1.00-1.75 Highly Unaware