Académique Documents
Professionnel Documents
Culture Documents
ACTIVITIES
Submitted by:
APRIL 2018
ABSTRACT
Abstract:
Internet today has become the parallel form of life and living. People of the
community are now capable of doing things which were not imaginable few years ago.
However, along with the fastest growing of technology, cybercrimes are also emerging.
Thus in this study, the level of awareness and the prior knowledge of the people about
these criminal activities was assessed. Quantitative analysis was used to gather data.
Results were presented as bar graph showing the total percentage rate of the
respondents who agree and disagree during the conduct of the survey. Results revealed
that 100% of the respondents agree that they know cybercrime, cyber stalking, identity
theft, and cyber harassment. Majority of the respondents agree that spam floods on the
internet without prior notice or choice to ignore it and social security information should
be always kept in private. The total respondents who disagree that revenge is the main
reason for hacking is 60%, thus, majority believed that there are other reasons and
motives why hacking happens. The respondents have equal and different opinion about
confronting the cyber stalkers. Lastly, the respondents agree not to reveal large amounts
of personal information on the internet to protect personal privacy and security.
i
Table of Contents
ABSTRACT ..................................................................................................................... i
TABLE OF CONTENTS.................................................................................................. ii
LIST OF TABLE..............................................................................................................iv
LIST OF GRAPHS .......................................................................................................... v
2.1 Cybercrime............................................................................................................. 5
2.2 The Fight Against Cybercrime ................................................................................ 6
2.3 Effects and Threats of Cybercrime ......................................................................... 7
2.4 Researches regarding Cybercrimes ....................................................................... 7
ii
Chapter 4: RESULTS AND DISCUSSION ................................................................... 14
5.1 Summary.............................................................................................................. 25
5.2 Conclusions ......................................................................................................... 25
5.3 Recommendations ............................................................................................... 26
BIBLIOGRAPHIES ....................................................................................................... 27
ii
i
LIST OF TABLE
1 Questionnaire 13
iv
LIST OF GRAPHS
v
Chapter 1
THE PROBLEM AND ITS SETTING
This chapter informs the reader of the problem under the study. It includes the
following; (1.1) Background of the study, (1.2) Statement of the problem and objectives,
very prominent in the daily activity of many individuals where they can reach to their
families and friends, share interests and/or activities and meet new people. Social
networking sites was made to mainly focus on building online communities of people or
millions of internet users who regularly visit social websites to keep linking with their
friends, share their thoughts, photos, videos and discuss even about their daily-life. It
encourages new ways to communicate and share information, allowing users to provide
information about themselves and enables them to connect with other people through
chat and video calls. These fast growing medium of communication is the social media,
any one regardless of the differences can have free access to these social sites provided
with internet connection. As observed, these social media allows the easy and fastest
way to send and receive feedbacks or messages from different parts of the world. It
increases people’s relationship and gives greater connection for many people around the
globe. In addition, it also make life easier because everything or all information can
1
already be searched and found on the internet with the use of different tools like
However, the usefulness of social media has been overused for different crimes
committed using computers or electronic devices. These crimes are not new to us
because it continue to happen every day. According to Seth (2007), cybercrime activities
includes’ fraud, theft, blackmail, forgery, and embezzlement online or offline basis. This
Cybercrime is the latest and perhaps the most complicated problem in the cyber world.
tool or target or both” that is used for illegal activities in social media. Basically, the initial
purpose of social media to provide positive uses has been compromise to wrong and bad
activities by these cyber criminals. Because of this, privacy and security issues of many
communication, they also raise new challenges regarding privacy and security issues.
This study aimed to; (a) describe the types of cybercrime activities, (b) assessed the prior
knowledge of the respondents about the cybercrime activities, and (c) determine essential
social media.
2
1.3 Significance of the Study
This study signifies to provide information basically about the present and/or
growing issues regarding the cybercrime activities through social media and the positive
and negative effect of these social media on people especially on students. Since social
media is the primary tool for communication and business matters, it is important to view
the things and/or describe some information to discuss regarding this issues and what
causes cybercrime activities to occur. The significance of this study answers the question
why there are cybercrimes and how can we lessen it to happen as internet users in this
purposefully useful as long as we used it for good but if its usefulness will compromise by
bad activities probably it will bring security risks to more people. As a citizen of this nation
we need to be aware of the things in our environment, we need to know our right and
The study is limited and is only focused on the growing issues concerning the
advantages and disadvantages of social media and the cause of cybercrimes and how to
3
1.5 DEFINITION OF TERMS
Cyber Harassment An act that is repeatedly done towards individual which causes
fear, harm, and distress.
4
Chapter 2
REVIEW OF RELATED LITERATURE
This chapter deals with the review of related literature and studies, which are
found to have bearing on this present study. These provide and relevant ideas which
2.1 Cybercrime
Cybercrime is fast-growing are of crime. More and more animals are exploiting
the speed, convenience and anonymity of the internet to commit a diverse range of
criminal activities that know no boarders either physical or virtual, cause serious harm
and pose very real threats to victims worldwide. Although there is no single universal
sophisticated attacks against have taken a news turn with the advent of the internet, such
Today, we are seeing highly complex cybercriminal networks bring together individuals
from across the globe in real time to commit crimes on an unprecedented scale.
5
2.2 The Fight Against Cybercrime
and maximize their profits in the shortest time. The crimes themselves are not necessarily
new such as theft fraud, illegal gambling, Sale of fake medicines but becoming more
widespread and damaging. Interpol is committed to the global fight against cybercrime,
Our main initiatives in cybercrime focus on. Operational and investigative support,
cybercrime intelligence and analysis. Digital forensics, Innovation and research, Capacity
the the natural partner for any law enforcement agency looking to investigate these crimes
local law enforcement with focused cyber intelligence, derived from combining inputs on
a global scale.
Interpol is committed to being global coordination body for the detection and
prevention of digital crimes through the INTERPOL Global complex for innovation (IGCI)
in Singapore. This cutting edge research and development facility, which opened in 2014,
averages global cyber-expertise from law enforcement in key private sector partners.
6
2.3 Effects and Threats of Cybercrime
pornography, and child grooming. These are also problems of privacy when confidential
Shankar further define cybercrime from the prospective of gender and defined cybercrime
against women as crimes targeted against women with a motive to intentional harm the
internet and mobile phones. International, both government and non-state actors engage
in activity closing international boarder and involving the interest of at least one nation
A report (sponsored by McAfee) estimates that the annual damage to the global
estimates are “hopeless flawed” and exaggerate the true losses by orders of magnitude.
Approximately 1.5 billion has lost in 2012 to online credit and debate aid fraud in the USA.
In 2016 a study by Jupiter Research estimated that the cost of cybercrime could be as
from doing something which causes loss. In this context, the fraud will result in obtaining
7
a benefit by; Altering in an unauthorized way. This requires little technical expertise and
is common form of theft by employees alternating the da before entry or entering false
specialist have documented a significant increase in internet problems and serve scans
since early 2001. But there is a growing concern among federal officials that such
instruction are part of an organized effort by cyberterrorist, where in they are the one who
committed though the use of cyberspace or computer resources (parker 1983). As such
a simple propaganda in the internet, that there will be bomb attacks during the holidays
can be considered cyberterrorism. There are also hacking activities directed toward
individuals, families, organized by groups within networks, tending to cause fear among
hacker. Those hackers demand money in return for poisoning to stop attacks and to offer
“protection” According to the federal bureau of investigation (FBI), cyber extortionist are
8
operate and demanding payments to restore their service. More than 20 cases are report
each month to the FBI and many go unreported in order to keep the victims name out the
warfare where in the US Department of Defence (DOD) notes that the cyberspaces has
Among those are included, the attacks on Estonia’s infrastructure in 2007, allegedly by
Russian hackers. Fearing that such attacks may become the norm in future warfare
among nation-states, the concept of cyberspace operations impacts and will be adapted
crimes are committed by a selected group of criminals. Unlike crimes using the computer
as a tool, these crimes required the technical knowledge of the perpetrators. As such as
technology involves, so too does the nature of crimes. These crimes are relatively new,
having been in existence for only as long as computers have which explains how
unprepared society and the world in general is towards committed daily on the internet.
Crimes that primarily target computer networks or devices include: Computer viruses,
When the individuals is the main target of cybercrime, the computer can be
considered as the tool larger than the target. These crimes generally involves less
technical expertise. Human weaknesses are generally exploited. The damage dealt is
largely psychological and it intangible, making legal action against the variants more
difficult. These are the crimes which have existed for countries in the offline would scared,
theft, and the like have existed even before the development in high-tech equipment. The
9
same criminal has simply been given a tool which increase his potential pool of victims
In 1983, a nineteen year old UCLA student used his PC to break into a Defence
Between 1995 and 1998 the newscorp satellite pay to view ecrypted SKY-TV
Service was hacked several times during an ongoing technological arms between a Don-
turopean hacking group of newscorp. The original motivation of the hackers was to watch
star trek re-runs in Germany; which has something which newscorp did not have the
copyright to allow.
computer, then automatically sent that document and a copy og the virus spread via e-
The Russian Business Network (RBN) was registered as an internet site in 2006
initially, much of its activity was legitimate. But apparently the founders soon discovered
that is was more profitable to host illegitimate activities and started hiring it’s services to
computers around the world. The “botnet” of infected computers included PC’s inside
more than half of the fortune 1000 companies and more than 40 major banks, according
operating under the aegis of the department of homeland security shut down the
10
Chapter 3
METHODOLODY
This chapter deals with the research design, respondent, and data gathering
This study used a descriptive survey of research because its main purpose is to
describe the level of preparedness and awareness to those computer user against
The number of respondents surveyed in the study were 10 respondents who used
The researchers used survey questionnaire in data gathering which was design
to extract specific information to gather data needed for this study. This questionnaire
11
3.4 Data Gathering Procedure
The following procedures were employed by the researchers during the conduct
of the study.
personally conducted an interview to the respondent to gather data and distributed the
Gathered data were tallied and assessed using bar graphs and presented in
percentage rate.
12
Table 1. Questionnaire
Direction: Please check YES if you agree and check NO if you disagree.
Questionnaire YES NO
13
Chapter 4
RESULTS AND DISCUSSIONS
This chapter is devoted on the presentation, analysis and interpretation of the data
The results of the survey are illustrated and presented below using bar graph. The
total percentage of the respondents who agree/disagree on the respective questions used
100%
0%
YES NO
Graph 1. Result for the total percentage of students who agree and/or disagree on the
statement, cybercrime is type of criminal activity done using internet and computers.
Graph 1 shows the result for the total percentage of students who agreed that
cybercrime is basically a criminal activity that is done using computers along with their
have agreed that cybercrime is a prominent type of criminal activity through internet and
14
telecommunication system using computers and other types of technology. According to
Carter (1995), one common definition that describes cybercrime is any activity in which
computers or networks are a tool and a target of criminal activity. It is different from
for great potential damage, it is being committable in a jurisdiction in which the perpetrator
is not physically present, and often, not being entirely clearly illegal. Cybercrime activities
also includes crime, from vandalism to theft, and extortion to copyright infringement
(Chawki, Mohamed).
80%
20%
YES NO
Graph 2. Result for the total percentage of students who agree and/or disagree that
spam floods the internet leaves people with no option other than to receive it.
In graph 2, 80% of surveyed respondents agreed that spam flooding on the internet
leaves no choice for internet users but to only receive it. However, there are still 20% of
respondents who disagree that spam on the internet leaves no choice, but to them,
internet users has their choice to accept and not to accept these spreading information
15
and advertisement on the internet. Spam is alternatively reffered to as UCE or Unsolicited
Commercial Email and bulk e-mail commonly used to describe junk e-mail on the internet.
It is usually an e-mail sent to thousands and sometimes millions of people without prior
approval, promoting a particular product, service or a scam to get other people’s money.
100%
0%
YES NO
Graph 3. Result for the total percentage of students who agree and/or disagree about
cyberstalking as an act of stalking through electronic systems.
In graph 3, results show that 100% of respondents agreed that cyberstalking is the
act of stalking individual through electronic means. It clearly shows that the respondents
are aware of this kind of cybercrime. According to The National Center for Victims of
another person using the Internet and other forms of online and computer
communications. It can involve the use of email, instant messaging, chat rooms, bulletin
another person. The process of stalking a person in real life generally requires that the
16
perpetrator and victim be in close physical proximity. Cyber stalkers can be across the
street, the country, or the globe from their victims. They can use Internet search engines
to find out additional information they can use to harass their victims. Cyber stalkers are
generally motivated by a desire to control their victims. Statistically, most cyber stalkers
are men; however, there are reported cases of women cyber stalking men and same-sex
cyber stalking. Victims can be any age. Working to Halt Online Abuse (WHOA) conducts
annual surveys on cyber stalking. Cyberstalking will be prevented if the user is very
careful and responsible of his/her actions upon posting personal information on the
internet.
60%
40%
YES NO
Graph 4. Result for the total percentage of students who agree and/or disagree about
revenge as the main reason of hacking activities.
In graph 4, the total percentage of respondents who agree that revenge is the
common issue of hacking is 40% while 60% believed that hacking is not part of someone’s
revenge and or sometimes it is just a criminal cyber habit. Computer hacking refers to the
17
practice of modifying or altering computer software and hardware to accomplish a goal
that is considered to be outside of the creator’s original objective. Those individuals who
technology. The typical computer hacker will possess an expert level in a particular
programming. Unlike the majority of computer crimes which are regarded as clear cut in
terms of legality issues, computer hacking is somewhat ambiguous and difficult to define.
In all forms, however, computer hacking will involve some degree of infringement on the
software, or files.
Due to our reliance on computer technologies and the critical information shared
on networks, the art of computer hacking has been skeptically viewed. The primary issue
personal information that is found on a computer network. The ability to retrieve and
subsequently tamper with such information will give way to the potential to commit
establish use policies and delineate appropriate and inappropriate actions to all
individuals who access information via a computer. The use of filters or firewalls may be
considered to reduce access to unauthorized software serial numbers and other hacking-
related materials.
18
Your social security number should
not be kept private.
90%
10%
YES NO
Graph 5. Result for the total percentage of students who agree and/or disagree about
the privacy of social security number.
benefits and other identification services. In graph 5, results show that majority or 90% of
the respondents are very particular in their social privacy wherein they prefer to let their
social security number to be always kept in private. However, 10% disagree of this
privacy. It is important that we take steps to protect our Social Security number from theft
because if someone obtains it, they can use it to get other personal information from
Someone can steal Social Security number by; stealing the wallet, purse, or mail;
obtaining personal information provided by the person from an unsecured site on the
internet; rummaging through trash; and posing information about phone or email on the
internet. Therefore, it is important that every individual should leave their personal
information in private. Protecting personal information can help reduce your risk of identity
theft. These can be done in four main ways: know who you share information with; store
and dispose your personal information securely, especially your Social Security number;
19
ask questions before deciding to share your personal information; and maintain
100%
0%
YES NO
Graph 6. Result for the total percentage of students who agree and/or disagree about
identity theft.
Identity theft is also known as identity fraud, a crime in which an impostor obtains
advantage or obtain credit and other benefits through other person’s name, and perhaps
to the other person’s disadvantage or loss. Results show in graph 6 that 100% of the
respondents agreed that identity theft is a type of crime in which the criminal is stealing
personal information and use it to commit fraudulent activity and impersonating the
Every year, millions of Americans become victims of identity theft. Identity theft occurs
when someone steals your personally identifiable information and pretends to be you. They
can use this information to open bank or credit card accounts, file taxes, or make new
20
purchases in your name. To minimize the risk of identity theft, keep your Social Security
card and any other documents that show your Social Security number in a safe place. Do
not carry your Social Security card or other documents with you that display your number
100%
0%
YES NO
Graph 7. Result for the total percentage of students who agree and/or disagree about
harassment.
Results show in graph 7 that 100% of the respondents agree that harassment is a
deliberate and hostile behavior towards individual. In other words, Harassment covers a
that disturbs or threatens, and it is characteristically repetitive. It shows on the graph that
the respondents are aware and has prior knowledge about harassment.
21
When cyberstalking occurs you
should always confront your stalker
when cyberstalking.
50% 50%
YES NO
Graph 8. Result for the total percentage of students who agree and/or disagree about
the confronting stalker in cyberstalking.
Result in graph 8 shows that the respondents have different perspective and ways
in dealing cyberstalking through confrontation. The total tally shows that 50% of the
50% also of the respondents disagree about this confrontation. The results presented
only shows that one can always confront the stalkers if they will be identified. However
since stalkers are unidentifiable and difficult to trace, one cannot confront them easily.
severity of stalking. Stalking frequently escalates into other types of violent crime, so it is
important to protect yourself and your family. There are ways to distance yourself and
protect yourself from stalkers. First, you should know what qualifies stalking, which is the
Second, always determine the type of stalker you have in order for you to know the right
people to notify and defend yourself. Third, sense how much danger you are in because
22
it can be harmless or threatening. Lastly, be always observant on your surroundings.
Cyberstalking may not be prevented but the people has the choice whether or not to allow
it to continually happen.
100%
0%
YES NO
Graph 9. Result for the total percentage of students who agree and/or disagree about
the authority of a person in hacking.
Results show in graph 9 that 100% of the respondents agree that hacking happens
because people allow hackers to have authority to access in their personal information.
2017, 50% of Filipino internet users who were hacked or infected with malware last year
showed that cybersecurity is more acknowledging to install security solutions and combat
23
You should not reveal large amount of
information about yourself to people
because thief’s can get your information
and commit fraud.
100%
0%
YES NO
Graph 10. Result for the total percentage of students who agree and/or disagree about
sharing personal information on the internet.
In graph 10, results revealed that 100% of the respondents agree that one should
always protect their personal security by not sharing large amounts of personal
In overall, the security and protection of individual depends on their full authority
on sharing and the privacy of their personal information on the internet, and their
awareness and level of preparedness on the situation. It is important that every individual
should be aware of the legal bases for cyber activities and knows where to go to notify
24
Chapter 5
SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS
The summary of findings, conclusions and recommendations derived from the result of
5.1 Summary
The common issues and understanding of people about the types of cybercrimes
and the cybercrime activities was assessed using descriptive survey method through
respondents were surveyed and participated in the study. Results were tally and
presented as bar graph using percentage rate to evaluate the opinion of the respondents
regarding the corresponding questions. Information about the data were then discussed.
5.2 Conclusions
The findings of the study revealed that 100% rate of the respondents have prior
activities using electronic gadgets and technologies. Thus, the respondents are very
particular in revealing large amounts of their personal information on the internet for safety
and protection purposes and to prevent fraud cyber activities. In other survey questions,
80% of the respondents agree that spam floods the internet leaving no option to people
25
but to receive it and 90% agree that social security number should be always kept in
private. Therefore, majority of the respondents agree that spam or scam activities are
everywhere and it can just appear anytime, however, majority also aware of keeping their
hacking, majority of the respondents with 60% rate disagree that hacking is the cause of
revenge. According to some information on the internet, hackers possess expert skills in
hacking and reasons are defined to damage websites and steal important information.
On the surveyed question about confronting cyber stalkers, the respondents have 50/50
or 50% who agree and 50% who disagree. This clearly shows that the respondents have
neutral choice or idea in what to do about the cyberstalking whether or not they will
confront the stalkers and they will notify the police and other security organizations about
it. Overall, results revealed that the respondents are aware of cybercrime activities
5.3 Recommendations
Based on the findings and conclusions derived from the study, following
activities here in General Santos City and in what particular age it is prominent.
26
BIBLIOGRAPHIES
Journals:
Kamini Dashora, P. (2011). Cyber Crime in the Society: Problems and Preventions.
Journal of Alternative Perspectives in the Social Sciences, Vol 3, No 1, 240-259.
Websites:
https://www.computerhope.com/jargon/s/spam.htm
http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber-
crimes/cyber- stalking.html
http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber-
crimes/cyber-stalking.html
https://www.techsoup.org/support/articles-and-how-tos/things-you-can-do-to-
prevent-spam
https://cyber.laws.com/hacking
https://blog.ssa.gov/protecting-your-social-security-number-from-identity-theft/
https://searchsecurity.techtarget.com/definition/identity-theft
https://searchsecurity.techtarget.com/definition/identity-theft
www.education.vic.gov.au
https://www.wikihow.com/Deal-With-Stalkers
27