Vous êtes sur la page 1sur 5

Chapter III

METHODOLOGY

In this chapter, the researcher presented the research design, sources of


data, research instrument, sampling technique, procedure and statistical
treatment of the study.

Research Design

In this study, qualitative research design was used and descriptive method
made use as primary tool to collect descriptive data. This tool was designed and
utilized to evaluate the assessment on Internet user’s risky behaviors in the
cyberworld and awareness with those identified threats in order to ascertain what
possible standards of threats.

Sources of Data

In this study, electronic books, journals, and articles were used as a


secondary source of data and a survey questionnaire was used as a primary
source of data which was given directly to the respondents of the study.

Research Instrument

A four page survey questionnaire was used as a research instrument to


collect the necessary information needed to satisfy the objectives of the study.
The questionnaire was composed of name of respondent, which was optional,
and survey questions which have corresponding responses from 1 – 5 scale as
presented in the table 1, 2, 3 and 4.

20
Table 1. Numerical Value and Description of rating scale on Risky Behaviors in
surfing the Internet.

Point Range Description


Scale Interval
5 4.51 – 5.00 Excellent When the behavior is extremely practiced.

4 3.51 – 4.50 Very Good. When the behavior is highly practiced.

3 2.51 – 3.50 Good. When the behavior is moderate of being


practiced.
2 1.51 – 2.50 Fair. When the behavior is below moderate of being
practiced.
1 1.00 – 1.50 Poor. When the behavior is never being practiced.

Table 2. Numerical Value and Description of rating scale on Forms of Threats


posing in the cyberworld.

Point Range Description


Scale Interval
5 4.51 – 5.00 Excellent. When the awareness with the threat is
extremely high.
4 3.51 – 4.50 Very Good. When the awareness with the threat is
high.
3 2.51 – 3.50 Good. When the awareness with the threat is
average.
2 1.51 – 2.50 Fair. When the awareness with the threat is below
average.
1 1.00 – 1.50 Poor. When never aware with the threat.

Table 3. Numerical Value and Description of rating scale on Assess of Internet


users to cyber threats.

21
Point Range Description
Scale Interval
5 4.51 – 5.00 Excellent. When the confidence of being protected
is extremely high.
4 3.51 – 4.50 Very Good. When the confidence of being protected
is high.
3 2.51 – 3.50 Good. When the confidence of being protected is
uncertain.
2 1.51 – 2.50 Fair. When the confidence of being protected is low.

1 1.00 – 1.50 Poor. When the confidence of being protected is


very low.

Table 4. Numerical Value and Description of rating scale on Assess of Internet


users to international cyber laws issues.

Point Range Description


Scale Interval
5 4.51 – 5.00 Excellent. When the agreement with the issue is
extremely strong.
4 3.51 – 4.50 Very Good. When the agreement with the issue is
strong.
3 2.51 – 3.50 Good. When the agreement with the issue is
undecided.
2 1.51 – 2.50 Fair. When the agreement with the issue is low.

1 1.00 – 1.50 Poor. When the agreement with the issue is very
low.

Respondents Profile

The University of Southeastern Philippines fourth year Institute Computing


(IC) students of school year 2009-2010, second semester, were chosen as main
respondent of this study. Since the study had its focus on the risky behaviors of
Internet users in the cyberworld and their assessment with those identified

22
threats, those fourth year IC students were the best respondents for the study as
the level of experience in surfing the Internet was concerned. Those students
were among of the most active Internet surfers in the University.

Sampling Technique

The respondents of the study were randomly and purposively selected


from the fourth year IC students of this University. They were chosen based on
their skills and experience in surfing the Internet.

Procedure of the Study

A research study proposal entitled as Scenarios in the Cyberworld


exposing Internet Users to Vulnerable Menace: Assessment was first agreed to
implement in the process. Hence, the objectives of the study were first planned
and studied whether they are achievable or not when the process of
implementing the study is on its way.

When the objectives of the study were set good, the conceptual
framework of the study was prepared and studied through some prior
consultations to the adviser. Then followed by the interpretation of the variable
and analysis of the problems of the study which have helped to formulate and
organize the survey questionnaire. The formulated questionnaire was first
undergone through several consultations with the collaborators of the study such
as the adviser and validators for validation and approval purposes.
After the approval of the panel, the survey questionnaire was subjected for
distribution to the respective respondents of the study prior to the approval of the
IC - Dean of this University. When the survey questionnaires were fully
distributed and answered by the respondents, the gathered data were undergone
through tabulation, analysis and interpretation.

23
Statistical Treatment

Average Weighted Mean was used to measure, analyze, and interpret the
mean of responses of the respondents with regards to their risky behaviors and
awareness with those identified forms of threats that are nimble to encounter in
the cyberworld.

24

Vous aimerez peut-être aussi