Académique Documents
Professionnel Documents
Culture Documents
METHODOLOGY
Research Design
In this study, qualitative research design was used and descriptive method
made use as primary tool to collect descriptive data. This tool was designed and
utilized to evaluate the assessment on Internet user’s risky behaviors in the
cyberworld and awareness with those identified threats in order to ascertain what
possible standards of threats.
Sources of Data
Research Instrument
20
Table 1. Numerical Value and Description of rating scale on Risky Behaviors in
surfing the Internet.
21
Point Range Description
Scale Interval
5 4.51 – 5.00 Excellent. When the confidence of being protected
is extremely high.
4 3.51 – 4.50 Very Good. When the confidence of being protected
is high.
3 2.51 – 3.50 Good. When the confidence of being protected is
uncertain.
2 1.51 – 2.50 Fair. When the confidence of being protected is low.
1 1.00 – 1.50 Poor. When the agreement with the issue is very
low.
Respondents Profile
22
threats, those fourth year IC students were the best respondents for the study as
the level of experience in surfing the Internet was concerned. Those students
were among of the most active Internet surfers in the University.
Sampling Technique
When the objectives of the study were set good, the conceptual
framework of the study was prepared and studied through some prior
consultations to the adviser. Then followed by the interpretation of the variable
and analysis of the problems of the study which have helped to formulate and
organize the survey questionnaire. The formulated questionnaire was first
undergone through several consultations with the collaborators of the study such
as the adviser and validators for validation and approval purposes.
After the approval of the panel, the survey questionnaire was subjected for
distribution to the respective respondents of the study prior to the approval of the
IC - Dean of this University. When the survey questionnaires were fully
distributed and answered by the respondents, the gathered data were undergone
through tabulation, analysis and interpretation.
23
Statistical Treatment
Average Weighted Mean was used to measure, analyze, and interpret the
mean of responses of the respondents with regards to their risky behaviors and
awareness with those identified forms of threats that are nimble to encounter in
the cyberworld.
24