0% found this document useful (0 votes)
53 views

Cybercrime Victimization Instrument 2

Thesis

Uploaded by

Peter Condes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Cybercrime Victimization Instrument 2

Thesis

Uploaded by

Peter Condes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1

Survey Questionnaire

Dear Participants,

We are criminology students of Western Philippines University under the


College of Criminal Justice Education and taking up Bachelor of Science in
Criminology. We are reaching out to invite you to participate in an important
research study focusing on cybercrime awareness among students.

The primary aim of this study is to gain insights into students' awareness of
cybercrimes, their experiences, and the factors influencing their
vulnerability. By participating, you will contribute valuable information that
can enhance our understanding of the challenges students face in the online
environment.

Participation in this study involves you completing a survey. The information


collected will be kept confidential, and your responses will be anonymized to
ensure your privacy. The data collected will be used for research purposes
only.

Your participation is entirely voluntary, and you have the right to withdraw
at any time without any consequences. If you decide to participate, please
sign the conformed.

Your contribution is vital to the success of this study, and your insights will
help inform strategies to enhance cybersecurity awareness among students.

Thank you for considering participation in this research. We look forward to


your valuable contribution.

Sincerely,
Conformed: __________________
JOMER M. BONBON Signature/Date
ELDELIZA A. BADANG
PETER S. CONDES
Researchers

Part I. Level of Awareness of Students on Type of Cybercrime.


Instruction: Please honestly rate your awareness of various types of
cybercrime offenses using the Likert scale below. Tick the box () that
corresponds to your level of awareness.
4 - Fully Aware
3 - Aware
2 - Less Aware
1 - Not Aware
No. Type of Cybercrimes 4 3 2 1
How familiar are you with the following
cybercrime offenses:
1. Online Scam such as…..
a. Phishing
b. Smishing
c. Vishing
2. Catfishing
3. Malware
4. Cyber related Identity theft
5. Cybersquatting
6. Financial fraud/scam
7. Dumpster Diving Attack
2

8. Pig Butchering Crypto Scam/Romance Scam


9. Online blackmail such as…..
a. Sextortion
b. Online Threat
c. Child Pornography
10. Cyberstalking
11. Cyber-bullying
12. Ransomware
13. Fraud
14. Online Libel
15. Online Lending
16. Botnets
17. Computer Viruses
18. Cybercrime Harassment
19. Credit Card Fraud
20. Data Breach
21. Web Attack
22. Copyright Infringement
23. Philpost Scam
24. Data Interference
25. System Interference

Part II. Factors that contribute to students' vulnerability to


cybercrimes.
Instruction: Please check the box () you may select as many as you can.
Your input will help us understand the factors contributing to students'
vulnerability to cybercrimes.
Tic
Which of the following factors influence students' k
vulnerability to cybercrimes? the
No.
box
()

1. Insufficient knowledge about common cyber threats


2. Insufficient knowledge about common cyber security
3. Using weak passwords
4. Reusing passwords
5. Failing to update passwords
6. Limited Knowledge of Online Security Practices such
as…..
a. Enabling two-factor authentication,
b. Updating software and applications
c. Using secure Wi-Fi connections
7. Oversharing personal information on social media
platforms without considering privacy settings
8. Connecting to unsecured public Wi-Fi networks without
using a Virtual Private Network (VPN)
9. Inability to identify suspicious emails, messages, or
websites can lead to compromised accounts and sensitive
data exposure.
10. Downloading apps, software, or files from untrusted or
unofficial sources
11. Not using two-factor authentication
12. Failing to regularly update software and applications
13. Lack of access to cybersecurity education programs and
workshops
14. Lack of participation cybersecurity education programs
and workshops
15. Clicking on suspicious links or visiting unsecured website
3

16. Inadequate protection measures on devices (e.g.,


antivirus software)

Part III. Knowledge about Cybersecurity Information

Instruction: Please check the box () you may select as many as you can.

No Where do students primarily acquire Tick the


. information about cybersecurity? box ()

1. What sources do you typically rely on for information


about cybersecurity?
a. Formal education (courses, workshops)
b. Online articles and blogs
c. Social media platforms
d. News websites and publications
e. Cybersecurity forums and communities
f. Friends and peers
g. Family members
h. Flyers
i. Online video tutorials
j. Webinars and online events
k. Alerts from cybersecurity apps or tools
l. Educational courses and webinars
m. Reminders from E- wallet, NTC and other
online services
n. Other (please specify)
2. Engaging with educational content related to
cybersecurity on social media platforms
3. Participating in any formal cybersecurity education
programs or workshops provided by your educational
institution.
4. Following cybersecurity-related accounts or
influencers on social media for updates and insights
5. Participating in online discussions or forums related
to cybersecurity topics.

Part IV. Attitudes and Behaviors of Students Toward Online Security


Measures.

Instruction: Please share your insights by responding to the following


questions regarding your attitudes and behaviors towards online security
measures. Your feedback is valuable in understanding the perspectives of
students in this regard. Kindly select the response that best reflects their
opinion or behavior for each statement.

Tick the box () that corresponds to your level of awareness.


No. Statements Yes No
1. I use online security practices, such as using strong
passwords.
2. Regularly updating passwords for online accounts.
3. I am confident in the effectiveness of current online security
measures in protecting my personal information.
4. I scrutinize emails for potential phishing attempts before
clicking on links or providing information.
5. I used two-factor authentication for my online social
accounts.
6. I am confident in the effectiveness of current online security
measures in protecting my personal information.
4

7. I void sharing personal information on social media


platforms.
8. I use antiviruses to protect me from a cybercrime
9. I do not trust the websites that ask me to enter some details
about my bankcard
10. I think that downloading any file from any website is always
safe.
11. I trust any website that asks me to enter my bank account
detail.
12. I believe that big companies are the only victims of
cybercrime.
13. I use other methods other than antivirus software to protect
myself from cybercrimes.
14. I think that antiviruses are enough to protect me from a
cybercrime
15. I think that I am able to identify a fraudulent email/website.
16. I think that I am protected from cybercrime
17. I think that downloading any file from any website is always
safe.
18. I would click any link that I receive via email/SMS
19. I think that it is difficult to identify a fraudulent website.
20. I know what the details are about my card that I should not
enter on any website when shopping online.
21. I know some of the cyber laws.
22. I care about purchasing the best antivirus software.
23. I protect myself from cybercrime.
24. I do not trust the websites that ask me to enter some details
about my bankcard.
25. When I am online, I consider my permissible space and the
forbidden space of others
26. I am familiar with the risks associated with sharing personal
information on social media platforms.
27. I do not download and install apps or software from
untrusted sources
28. I do not use public Wi-Fi networks because of the potential
for unauthorized access to my data.
29. Rate your awareness of the importance of regularly updating
your software and applications for enhanced security.
30. I understand the risks of responding to unsolicited emails or
messages that request personal information that’s why I do
not respond or on links.
31. I am aware in Investment Scam.

Thank you for your participation.

You might also like