Vous êtes sur la page 1sur 33

THE GROWING ISSUE OF CYBERCRIME AND SOCIAL MEDIA

ACTIVITIES

Submitted by:

Mark Anthony E. Pilar


John Mark Gaviola
Erick Penol

APRIL 2018
ABSTRACT

Title: The Growing Issue of Cybercrime and Social Media Activities


Name/s: Mark Anthony E. Pilar, John Mark Gaviola, and Erick Penol
School: AMA Computer College, General Santos City

Abstract:

Internet today has become the parallel form of life and living. People of the
community are now capable of doing things which were not imaginable few years ago.
However, along with the fastest growing of technology, cybercrimes are also emerging.
Thus in this study, the level of awareness and the prior knowledge of the people about
these criminal activities was assessed. Quantitative analysis was used to gather data.
Results were presented as bar graph showing the total percentage rate of the
respondents who agree and disagree during the conduct of the survey. Results revealed
that 100% of the respondents agree that they know cybercrime, cyber stalking, identity
theft, and cyber harassment. Majority of the respondents agree that spam floods on the
internet without prior notice or choice to ignore it and social security information should
be always kept in private. The total respondents who disagree that revenge is the main
reason for hacking is 60%, thus, majority believed that there are other reasons and
motives why hacking happens. The respondents have equal and different opinion about
confronting the cyber stalkers. Lastly, the respondents agree not to reveal large amounts
of personal information on the internet to protect personal privacy and security.

Keywords: Cybercrime, Cybercriminal activities, Security and Privacy

i
Table of Contents

ABSTRACT ..................................................................................................................... i
TABLE OF CONTENTS.................................................................................................. ii
LIST OF TABLE..............................................................................................................iv
LIST OF GRAPHS .......................................................................................................... v

Chapter 1: THE PROBLEM AND ITS SETTING ............................................................ 1

1.1 Background of the Study ........................................................................................ 1


1.2 Statement of the Problem ...................................................................................... 2
1.3 Significance of the Study........................................................................................ 3
1.4 Scope and Limitation of the Study ......................................................................... 3
1.5 DEFINITION OF TERMS ....................................................................................... 4

Chapter 2: REVIEW OF RELATED LITERATURE ........................................................ 5

2.1 Cybercrime............................................................................................................. 5
2.2 The Fight Against Cybercrime ................................................................................ 6
2.3 Effects and Threats of Cybercrime ......................................................................... 7
2.4 Researches regarding Cybercrimes ....................................................................... 7

Chapter 3: METHODOLOGY ....................................................................................... 11

3.1 Research design .................................................................................................. 11


3.3 Research instrument ............................................................................................ 11
3.4 Data Gathering Procedure ................................................................................... 12
3.4.1 Respondent Interview/Distribution of questionnaire ....................................... 12
3.4.2 Retrieval of the questionnaire ........................................................................ 12
3.4.3 Collection and Interpretation of data .............................................................. 12
3.5 Statistical Treatment of Data ................................................................................ 12

ii
Chapter 4: RESULTS AND DISCUSSION ................................................................... 14

Chapter 5: SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS..................... 25

5.1 Summary.............................................................................................................. 25
5.2 Conclusions ......................................................................................................... 25
5.3 Recommendations ............................................................................................... 26

BIBLIOGRAPHIES ....................................................................................................... 27

ii
i
LIST OF TABLE

Table Description Page

1 Questionnaire 13

iv
LIST OF GRAPHS

Graph Description Page

1 Result for the total percentage of the respondents who agree 14


and/or disagree on the statement, cybercrime is type of criminal
activity done using internet and computers.

2 Result for the total percentage of students who agree and/or 15


disagree that spam floods the internet leaves people with no
option other than to receive it.

3 Result for the total percentage of students who agree and/or 16


disagree about cyberstalking as an act of stalking through
electronic systems

4 Result for the total percentage of students who agree and/or 17


disagree about revenge as the main reason of hacking activities.

5 Result for the total percentage of students who agree and/or 19


disagree about the privacy of social security number.

6 Result for the total percentage of students who agree and/or 20


disagree about identity theft.

7 Result for the total percentage of students who agree and/or 21


disagree about harassment.

8 Result for the total percentage of students who agree and/or 22


disagree about the confronting stalker in cyberstalking.

9 Result for the total percentage of students who agree and/or 23


disagree about the authority of a person in hacking

10 Result for the total percentage of students who agree and/or 24


disagree about sharing personal information on the internet.

v
Chapter 1
THE PROBLEM AND ITS SETTING

This chapter informs the reader of the problem under the study. It includes the

following; (1.1) Background of the study, (1.2) Statement of the problem and objectives,

(1.3) Significance of the Study, and (1.4) Scope and Delimitation.

1.1 Background of the Study

Nowadays, socialization and communication through social networking sites are

very prominent in the daily activity of many individuals where they can reach to their

families and friends, share interests and/or activities and meet new people. Social

networking sites was made to mainly focus on building online communities of people or

millions of internet users who regularly visit social websites to keep linking with their

friends, share their thoughts, photos, videos and discuss even about their daily-life. It

encourages new ways to communicate and share information, allowing users to provide

information about themselves and enables them to connect with other people through

chat and video calls. These fast growing medium of communication is the social media,

any one regardless of the differences can have free access to these social sites provided

with internet connection. As observed, these social media allows the easy and fastest

way to send and receive feedbacks or messages from different parts of the world. It

increases people’s relationship and gives greater connection for many people around the

globe. In addition, it also make life easier because everything or all information can

1
already be searched and found on the internet with the use of different tools like

computers, laptops, smartphones, cellphones and etc.

However, the usefulness of social media has been overused for different crimes

committed using computers or electronic devices. These crimes are not new to us

because it continue to happen every day. According to Seth (2007), cybercrime activities

includes’ fraud, theft, blackmail, forgery, and embezzlement online or offline basis. This

Cybercrime is the latest and perhaps the most complicated problem in the cyber world.

Generally, cybercrime is defined as an “unlawful acts wherein the computer is either a

tool or target or both” that is used for illegal activities in social media. Basically, the initial

purpose of social media to provide positive uses has been compromise to wrong and bad

activities by these cyber criminals. Because of this, privacy and security issues of many

social media users are not anymore safe.

1.2 Statement of the Problem

Although social networking websites offer advanced technology of interaction and

communication, they also raise new challenges regarding privacy and security issues.

This study aimed to; (a) describe the types of cybercrime activities, (b) assessed the prior

knowledge of the respondents about the cybercrime activities, and (c) determine essential

strategies and precautionary measures applied by the respondents to prevent threats in

social media.

2
1.3 Significance of the Study

This study signifies to provide information basically about the present and/or

growing issues regarding the cybercrime activities through social media and the positive

and negative effect of these social media on people especially on students. Since social

media is the primary tool for communication and business matters, it is important to view

the things and/or describe some information to discuss regarding this issues and what

causes cybercrime activities to occur. The significance of this study answers the question

why there are cybercrimes and how can we lessen it to happen as internet users in this

generation. Modernization and advancement in technology is very popular and

purposefully useful as long as we used it for good but if its usefulness will compromise by

bad activities probably it will bring security risks to more people. As a citizen of this nation

we need to be aware of the things in our environment, we need to know our right and

obligations and responsibilities as people patronizing in the social world.

1.4 Scope and Limitation of the Study

The study is limited and is only focused on the growing issues concerning the

advantages and disadvantages of social media and the cause of cybercrimes and how to

become aware of it.

3
1.5 DEFINITION OF TERMS

Cybercrime Criminal activity doe using computers and other technology.

Cyber Harassment An act that is repeatedly done towards individual which causes
fear, harm, and distress.

Cyber stalking The act of stalking individual or group of people though


electronic means.

Hacking The act of modifying or altering computer software and


hardware.

Identity theft Also known as identity fraud, a crime in which an impostor


obtains key pieces of personal identifiable information of
someone.

Spam Is reffered to as UCE or Unsolicited Commercial Email and bulk


e-mail commonly used to describe junk e-mail on the internet.

4
Chapter 2
REVIEW OF RELATED LITERATURE

This chapter deals with the review of related literature and studies, which are

found to have bearing on this present study. These provide and relevant ideas which

serve as background of the study.

2.1 Cybercrime

Cybercrime is fast-growing are of crime. More and more animals are exploiting

the speed, convenience and anonymity of the internet to commit a diverse range of

criminal activities that know no boarders either physical or virtual, cause serious harm

and pose very real threats to victims worldwide. Although there is no single universal

definition of cybercrime, law enforcement generally makes a destinations between two

main types of interest-related crime. Advance cybercrime (or high-tech crime)

sophisticated attacks against have taken a news turn with the advent of the internet, such

as crimes children, financial crimes, and even terrorism.

In the past, cybercrime was committed mainly by individuals or small groups.

Today, we are seeing highly complex cybercriminal networks bring together individuals

from across the globe in real time to commit crimes on an unprecedented scale.

5
2.2 The Fight Against Cybercrime

Criminal organizations turning increasingly to the internet facilitate their activities

and maximize their profits in the shortest time. The crimes themselves are not necessarily

new such as theft fraud, illegal gambling, Sale of fake medicines but becoming more

widespread and damaging. Interpol is committed to the global fight against cybercrime,

as well as tackling cyber enable crimes.

Our main initiatives in cybercrime focus on. Operational and investigative support,

cybercrime intelligence and analysis. Digital forensics, Innovation and research, Capacity

building, National cyber reviews.

Interpol is committed to the global fight against cybercrime, as well tackling

cyber-enable crimes. Most cybercrimes are transnational in nature, therefore Interpol is

the the natural partner for any law enforcement agency looking to investigate these crimes

on a cooperative level. By working with private industry, INTERPOL is able to provide

local law enforcement with focused cyber intelligence, derived from combining inputs on

a global scale.

Interpol is committed to being global coordination body for the detection and

prevention of digital crimes through the INTERPOL Global complex for innovation (IGCI)

in Singapore. This cutting edge research and development facility, which opened in 2014,

averages global cyber-expertise from law enforcement in key private sector partners.

6
2.3 Effects and Threats of Cybercrime

Cybercrime may threaten person or a nation security and financial health.

Issues surrounding types of crimes have become high-profile, particularly those

surrounding hacking, copyright, infringement, unwarranted, mass-surveillance, child

pornography, and child grooming. These are also problems of privacy when confidential

information is intercepted or disclosed, lawfully or otherwise. Debarati halder and K. Jai

Shankar further define cybercrime from the prospective of gender and defined cybercrime

against women as crimes targeted against women with a motive to intentional harm the

victim psychologically and physically, using modern telecommunication networks such as

internet and mobile phones. International, both government and non-state actors engage

in activity closing international boarder and involving the interest of at least one nation

State is sometimes referred to a cyberwarfare.

2.4 Researches regarding Cybercrimes

A report (sponsored by McAfee) estimates that the annual damage to the global

economy is at 44 billion, however, a Microsoft report shows that such survey-based

estimates are “hopeless flawed” and exaggerate the true losses by orders of magnitude.

Approximately 1.5 billion has lost in 2012 to online credit and debate aid fraud in the USA.

In 2016 a study by Jupiter Research estimated that the cost of cybercrime could be as

high 2.1 trillion by 2019.

There are some classification of cybercrimes; Fraud Financial Crimes. Computer

fraud is any dishonest misrepresentation of fact intended to let another to do or refrain

from doing something which causes loss. In this context, the fraud will result in obtaining

7
a benefit by; Altering in an unauthorized way. This requires little technical expertise and

is common form of theft by employees alternating the da before entry or entering false

data or by entering unauthorized instructions or using unauthorized process, Altering,

destroying, suppressing, or defeat, Altering or deleting stored data, A variety of internet

scams, target consumers and businesses.

Cyber terrorism Government officials and information technology security

specialist have documented a significant increase in internet problems and serve scans

since early 2001. But there is a growing concern among federal officials that such

instruction are part of an organized effort by cyberterrorist, where in they are the one who

intimidates or coerces a government or organization to advance his or her political or

social objects by launching a computer-based attack against computer, network, or the

information stored on them. Cyberterrorism in general. Can be defined as an art terrorism

committed though the use of cyberspace or computer resources (parker 1983). As such

a simple propaganda in the internet, that there will be bomb attacks during the holidays

can be considered cyberterrorism. There are also hacking activities directed toward

individuals, families, organized by groups within networks, tending to cause fear among

people, demonstrate power collecting information relevant of ruining people’s lives

robberies, blackmailing etz.

Cyberextortion occurs when a website, e-mail server or computer system is

subjected to or threatened with repeated denial or service other attack by malicious

hacker. Those hackers demand money in return for poisoning to stop attacks and to offer

“protection” According to the federal bureau of investigation (FBI), cyber extortionist are

increasingly by attacking corporate websites and networks, crippling their ability to

8
operate and demanding payments to restore their service. More than 20 cases are report

each month to the FBI and many go unreported in order to keep the victims name out the

public domain. Perpetrators typically use a distributed denial-of-service attack. Cyber

warfare where in the US Department of Defence (DOD) notes that the cyberspaces has

emerged as anational level concern through recent events of geostrategic significance.

Among those are included, the attacks on Estonia’s infrastructure in 2007, allegedly by

Russian hackers. Fearing that such attacks may become the norm in future warfare

among nation-states, the concept of cyberspace operations impacts and will be adapted

by warfighting military commanders in the future. Computer as a target wherein these

crimes are committed by a selected group of criminals. Unlike crimes using the computer

as a tool, these crimes required the technical knowledge of the perpetrators. As such as

technology involves, so too does the nature of crimes. These crimes are relatively new,

having been in existence for only as long as computers have which explains how

unprepared society and the world in general is towards committed daily on the internet.

Crimes that primarily target computer networks or devices include: Computer viruses,

denial-of-service attacks, malware (malicious code).

When the individuals is the main target of cybercrime, the computer can be

considered as the tool larger than the target. These crimes generally involves less

technical expertise. Human weaknesses are generally exploited. The damage dealt is

largely psychological and it intangible, making legal action against the variants more

difficult. These are the crimes which have existed for countries in the offline would scared,

theft, and the like have existed even before the development in high-tech equipment. The

9
same criminal has simply been given a tool which increase his potential pool of victims

and makes hill all the harder to face and apprehend.

In 1983, a nineteen year old UCLA student used his PC to break into a Defence

Department international communication system.

Between 1995 and 1998 the newscorp satellite pay to view ecrypted SKY-TV

Service was hacked several times during an ongoing technological arms between a Don-

turopean hacking group of newscorp. The original motivation of the hackers was to watch

star trek re-runs in Germany; which has something which newscorp did not have the

copyright to allow.

On 26 March 1999, the Melissa worm infected a document on a victims

computer, then automatically sent that document and a copy og the virus spread via e-

mail to other people.

The Russian Business Network (RBN) was registered as an internet site in 2006

initially, much of its activity was legitimate. But apparently the founders soon discovered

that is was more profitable to host illegitimate activities and started hiring it’s services to

criminals. On 2 march 2010, Spanish investigators arrested 3 in infection of over 13 million

computers around the world. The “botnet” of infected computers included PC’s inside

more than half of the fortune 1000 companies and more than 40 major banks, according

to investigators. In august 2010 the international investigation operation Delego,

operating under the aegis of the department of homeland security shut down the

international pedophile ring Dreamboard.

10
Chapter 3
METHODOLODY

This chapter deals with the research design, respondent, and data gathering

procedures, instruments and statistical treatment used in this study.

3.1 Research design

This study used a descriptive survey of research because its main purpose is to

describe the level of preparedness and awareness to those computer user against

cybercrime. This was evaluated through the use of questionnaire.

3.2 Respondents and Sampling Used

The number of respondents surveyed in the study were 10 respondents who used

social media and internet.

3.3 Research instrument

The researchers used survey questionnaire in data gathering which was design

to extract specific information to gather data needed for this study. This questionnaire

was subjective to validation for the validity of the data gathered.

11
3.4 Data Gathering Procedure

The following procedures were employed by the researchers during the conduct

of the study.

3.4.1 Respondent Interview/Distribution of questionnaire – the researchers

personally conducted an interview to the respondent to gather data and distributed the

questionnaire to the respondent.

3.4.2 Retrieval of the questionnaire – the researchers retrieved the

questionnaires from the respondents as soon as the respondents accomplished them.

3.4.3 Collection and Interpretation of data – the researchers collated, analyzed,

and interpreted the data which were gathered.

3.5 Statistical Treatment of Data

Gathered data were tallied and assessed using bar graphs and presented in

percentage rate.

12
Table 1. Questionnaire

Direction: Please check YES if you agree and check NO if you disagree.

Questionnaire YES NO

1. Cybercrime is basically criminal activity done by using


computers and interest.
2. Spam floods the internet and leaves people with no option
other than to receive it.
3. The act of stalking an individual through a group or electronic
means is called cyberstalking.
4.
Revenge is the common issue when it comes to hacking.
5.
Your social security number should not be kept private.
6. Identify theft is a type of crime in which personal information is
stolen to commit fraudulent activity.
7. Deliberate and repeated hostile behavior towards individual is
known as harassment.
8. When cyberstalking occurs you should always confront your
stalker when cyberstalking.
9. Hacking is when you authorized somebody to use your
computer and its network information.
You should not reveal large amount of information about
10. yourself to people because thief’s can get your information and
commit fraud.

13
Chapter 4
RESULTS AND DISCUSSIONS

This chapter is devoted on the presentation, analysis and interpretation of the data

gathered through graphs and tables.

The results of the survey are illustrated and presented below using bar graph. The

total percentage of the respondents who agree/disagree on the respective questions used

during the survey are shown below.

Cybercrime is basically criminal


activity done by using computers
and interest.

100%

0%

YES NO

Graph 1. Result for the total percentage of students who agree and/or disagree on the
statement, cybercrime is type of criminal activity done using internet and computers.

Graph 1 shows the result for the total percentage of students who agreed that

cybercrime is basically a criminal activity that is done using computers along with their

interest to commit cybercrime activity. With a total percentage of 100%, 10 respondents

have agreed that cybercrime is a prominent type of criminal activity through internet and

14
telecommunication system using computers and other types of technology. According to

Carter (1995), one common definition that describes cybercrime is any activity in which

computers or networks are a tool and a target of criminal activity. It is different from

physical or terrestrial crimes because it is easy to commit, it requires minimal resources

for great potential damage, it is being committable in a jurisdiction in which the perpetrator

is not physically present, and often, not being entirely clearly illegal. Cybercrime activities

also includes crime, from vandalism to theft, and extortion to copyright infringement

(Chawki, Mohamed).

Spam floods the internet leaves


people with no option other than to
receive it.

80%

20%

YES NO

Graph 2. Result for the total percentage of students who agree and/or disagree that
spam floods the internet leaves people with no option other than to receive it.

In graph 2, 80% of surveyed respondents agreed that spam flooding on the internet

leaves no choice for internet users but to only receive it. However, there are still 20% of

respondents who disagree that spam on the internet leaves no choice, but to them,

internet users has their choice to accept and not to accept these spreading information

15
and advertisement on the internet. Spam is alternatively reffered to as UCE or Unsolicited

Commercial Email and bulk e-mail commonly used to describe junk e-mail on the internet.

It is usually an e-mail sent to thousands and sometimes millions of people without prior

approval, promoting a particular product, service or a scam to get other people’s money.

The act of stalking an individual


through a group or electronic means
is called cyberstalking.

100%

0%

YES NO

Graph 3. Result for the total percentage of students who agree and/or disagree about
cyberstalking as an act of stalking through electronic systems.

In graph 3, results show that 100% of respondents agreed that cyberstalking is the

act of stalking individual through electronic means. It clearly shows that the respondents

are aware of this kind of cybercrime. According to The National Center for Victims of

Crime, "cyber stalking" is threatening communication or unwanted advances directed at

another person using the Internet and other forms of online and computer

communications. It can involve the use of email, instant messaging, chat rooms, bulletin

boards and/or other electronic communication devices to repeatedly harass or threaten

another person. The process of stalking a person in real life generally requires that the

16
perpetrator and victim be in close physical proximity. Cyber stalkers can be across the

street, the country, or the globe from their victims. They can use Internet search engines

to find out additional information they can use to harass their victims. Cyber stalkers are

generally motivated by a desire to control their victims. Statistically, most cyber stalkers

are men; however, there are reported cases of women cyber stalking men and same-sex

cyber stalking. Victims can be any age. Working to Halt Online Abuse (WHOA) conducts

annual surveys on cyber stalking. Cyberstalking will be prevented if the user is very

careful and responsible of his/her actions upon posting personal information on the

internet.

Revenge is the common issue when


it comes to hacking.

60%

40%

YES NO

Graph 4. Result for the total percentage of students who agree and/or disagree about
revenge as the main reason of hacking activities.

In graph 4, the total percentage of respondents who agree that revenge is the

common issue of hacking is 40% while 60% believed that hacking is not part of someone’s

revenge and or sometimes it is just a criminal cyber habit. Computer hacking refers to the

17
practice of modifying or altering computer software and hardware to accomplish a goal

that is considered to be outside of the creator’s original objective. Those individuals who

engage in computer hacking activities are typically referred to as “hackers.”

The majority of hackers possess an advanced understanding of computer

technology. The typical computer hacker will possess an expert level in a particular

computer program and will have advanced abilities in regards to computer

programming. Unlike the majority of computer crimes which are regarded as clear cut in

terms of legality issues, computer hacking is somewhat ambiguous and difficult to define.

In all forms, however, computer hacking will involve some degree of infringement on the

privacy of others or the damaging of a computer-based property such as web pages,

software, or files.

Due to our reliance on computer technologies and the critical information shared

on networks, the art of computer hacking has been skeptically viewed. The primary issue

attached to computer hacking stems from an individual’s ability to access crucial or

personal information that is found on a computer network. The ability to retrieve and

subsequently tamper with such information will give way to the potential to commit

heinous criminal acts.

In order to prevent computer hacking, educational institutions must clearly

establish use policies and delineate appropriate and inappropriate actions to all

individuals who access information via a computer. The use of filters or firewalls may be

considered to reduce access to unauthorized software serial numbers and other hacking-

related materials.

18
Your social security number should
not be kept private.

90%

10%

YES NO

Graph 5. Result for the total percentage of students who agree and/or disagree about
the privacy of social security number.

Social Security Number is a nine-digit number used to track Social Security

benefits and other identification services. In graph 5, results show that majority or 90% of

the respondents are very particular in their social privacy wherein they prefer to let their

social security number to be always kept in private. However, 10% disagree of this

privacy. It is important that we take steps to protect our Social Security number from theft

because if someone obtains it, they can use it to get other personal information from

people including bank and credit information.

Someone can steal Social Security number by; stealing the wallet, purse, or mail;

obtaining personal information provided by the person from an unsecured site on the

internet; rummaging through trash; and posing information about phone or email on the

internet. Therefore, it is important that every individual should leave their personal

information in private. Protecting personal information can help reduce your risk of identity

theft. These can be done in four main ways: know who you share information with; store

and dispose your personal information securely, especially your Social Security number;

19
ask questions before deciding to share your personal information; and maintain

appropriate security on your computers and other electronic devices.

Identity theft is a type of crime in which


personal information is stolen to commit
fraudulent activity.

100%

0%

YES NO

Graph 6. Result for the total percentage of students who agree and/or disagree about
identity theft.

Identity theft is also known as identity fraud, a crime in which an impostor obtains

key pieces of personal identifiable information of someone usually to gain financial

advantage or obtain credit and other benefits through other person’s name, and perhaps

to the other person’s disadvantage or loss. Results show in graph 6 that 100% of the

respondents agreed that identity theft is a type of crime in which the criminal is stealing

personal information and use it to commit fraudulent activity and impersonating the

information for his own advantage.

Every year, millions of Americans become victims of identity theft. Identity theft occurs

when someone steals your personally identifiable information and pretends to be you. They

can use this information to open bank or credit card accounts, file taxes, or make new

20
purchases in your name. To minimize the risk of identity theft, keep your Social Security

card and any other documents that show your Social Security number in a safe place. Do

not carry your Social Security card or other documents with you that display your number

unless you need them.

Deliberate and repeated hostile


behavior towards individual is
known as harassment.

100%

0%

YES NO

Graph 7. Result for the total percentage of students who agree and/or disagree about
harassment.

Results show in graph 7 that 100% of the respondents agree that harassment is a

deliberate and hostile behavior towards individual. In other words, Harassment covers a

wide range of behaviors of an offensive nature. It is commonly understood as behavior

that disturbs or threatens, and it is characteristically repetitive. It shows on the graph that

the respondents are aware and has prior knowledge about harassment.

Harassment comes in different types of bullying that is repeatedly done verbally,

physically, socially or psychologically by a person or group of person towards less

powerful person or group that causes harm, distress, and fear.

21
When cyberstalking occurs you
should always confront your stalker
when cyberstalking.

50% 50%

YES NO

Graph 8. Result for the total percentage of students who agree and/or disagree about
the confronting stalker in cyberstalking.

Result in graph 8 shows that the respondents have different perspective and ways

in dealing cyberstalking through confrontation. The total tally shows that 50% of the

respondents agree to always confront cyber stalkers in stopping cyberstalking. However,

50% also of the respondents disagree about this confrontation. The results presented

only shows that one can always confront the stalkers if they will be identified. However

since stalkers are unidentifiable and difficult to trace, one cannot confront them easily.

Having a stalker can be an uncomfortable or terrifying situation, depending on the

severity of stalking. Stalking frequently escalates into other types of violent crime, so it is

important to protect yourself and your family. There are ways to distance yourself and

protect yourself from stalkers. First, you should know what qualifies stalking, which is the

act of making repeated or inappropriate contact that is unwanted and unreciprocated.

Second, always determine the type of stalker you have in order for you to know the right

people to notify and defend yourself. Third, sense how much danger you are in because

22
it can be harmless or threatening. Lastly, be always observant on your surroundings.

Cyberstalking may not be prevented but the people has the choice whether or not to allow

it to continually happen.

Hacking is when you authorized


somebody to use your computer and its
network information.

100%

0%

YES NO

Graph 9. Result for the total percentage of students who agree and/or disagree about
the authority of a person in hacking.

Results show in graph 9 that 100% of the respondents agree that hacking happens

because people allow hackers to have authority to access in their personal information.

Thus, it is always a choice if you wanted to be hacked or not. According to statistics in

2017, 50% of Filipino internet users who were hacked or infected with malware last year

showed that cybersecurity is more acknowledging to install security solutions and combat

them. Thus, Filipino’ defenses against cyberattacks should go beyond awareness.

23
You should not reveal large amount of
information about yourself to people
because thief’s can get your information
and commit fraud.

100%

0%

YES NO

Graph 10. Result for the total percentage of students who agree and/or disagree about
sharing personal information on the internet.

In graph 10, results revealed that 100% of the respondents agree that one should

always protect their personal security by not sharing large amounts of personal

information to others in order to prevent cybercrimes like identity theft, harassment,

bullying, cyber fraud activities, and cyber stalking.

In overall, the security and protection of individual depends on their full authority

on sharing and the privacy of their personal information on the internet, and their

awareness and level of preparedness on the situation. It is important that every individual

should be aware of the legal bases for cyber activities and knows where to go to notify

the problems on cybercrimes and should know what to do as a precautionary measures

to prevent and stop cybercrime activities.

24
Chapter 5
SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS

The summary of findings, conclusions and recommendations derived from the result of

the study are presented in this chapter.

5.1 Summary

The common issues and understanding of people about the types of cybercrimes

and the cybercrime activities was assessed using descriptive survey method through

quantitative analysis by gathering data from the distributed questionnaires. About 10

respondents were surveyed and participated in the study. Results were tally and

presented as bar graph using percentage rate to evaluate the opinion of the respondents

regarding the corresponding questions. Information about the data were then discussed.

5.2 Conclusions

The findings of the study revealed that 100% rate of the respondents have prior

knowledge about cybercrimes, cyberstalking, identity theft, harassment, and hacking

activities using electronic gadgets and technologies. Thus, the respondents are very

particular in revealing large amounts of their personal information on the internet for safety

and protection purposes and to prevent fraud cyber activities. In other survey questions,

80% of the respondents agree that spam floods the internet leaving no option to people

25
but to receive it and 90% agree that social security number should be always kept in

private. Therefore, majority of the respondents agree that spam or scam activities are

everywhere and it can just appear anytime, however, majority also aware of keeping their

personal information in private to avoid cybercrime and hacking activities. In terms of

hacking, majority of the respondents with 60% rate disagree that hacking is the cause of

revenge. According to some information on the internet, hackers possess expert skills in

hacking and reasons are defined to damage websites and steal important information.

On the surveyed question about confronting cyber stalkers, the respondents have 50/50

or 50% who agree and 50% who disagree. This clearly shows that the respondents have

neutral choice or idea in what to do about the cyberstalking whether or not they will

confront the stalkers and they will notify the police and other security organizations about

it. Overall, results revealed that the respondents are aware of cybercrime activities

happening and knows the precautionary measures to prevent it.

5.3 Recommendations

Based on the findings and conclusions derived from the study, following

recommendations were made.

1. The researchers encourage to conduct further investigation on cybercrime

activities here in General Santos City and in what particular age it is prominent.

2. Educational institutions should establish awareness and preparedness to the

students regarding cybercrimes and the proper use of technology.

26
BIBLIOGRAPHIES

Journals:

Chawki, Mohamed. “A Critical Look at the Regulation of Cybercrime.” Computer Crime


Research Center.

Kamini Dashora, P. (2011). Cyber Crime in the Society: Problems and Preventions.
Journal of Alternative Perspectives in the Social Sciences, Vol 3, No 1, 240-259.

Malar, M. N. (2012). Impact of Cyber Crimes on Social Networking Pattern of Girls.


International Journal of Internet of Things, 1(1): 9-15.

Shaabi, W. G. (2012). CYBER THREATS IN SOCIAL NETWORKING WEBSITES.


International Journal of Distributed and Parallel Systems (IJDPS), Vol.3, No.1.

Websites:

https://www.computerhope.com/jargon/s/spam.htm
http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber-
crimes/cyber- stalking.html
http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber-
crimes/cyber-stalking.html
https://www.techsoup.org/support/articles-and-how-tos/things-you-can-do-to-
prevent-spam
https://cyber.laws.com/hacking
https://blog.ssa.gov/protecting-your-social-security-number-from-identity-theft/
https://searchsecurity.techtarget.com/definition/identity-theft
https://searchsecurity.techtarget.com/definition/identity-theft
www.education.vic.gov.au
https://www.wikihow.com/Deal-With-Stalkers

27

Vous aimerez peut-être aussi