11 Gas B Group 5
11 Gas B Group 5
RESEARCHERS
John David Alama Atun
Niña Rica Tolete
Angela B. Alarzar
Nelca Arcilla
Jessica Decosto
Czar Julius
Rowel Mendevil
CHAPTER 1
INTRODUCTION
In the modern and digital age, technology and cyber activities continues to
develop and evolve which means the more our technology advance, the higher the
number of cybercrimes and the more difficult to understand the issue. Cybercriminals
phisihing, spamming, hate crimes and identity theft which results in massive losses of
individuals along with corporations that could even pose danger to national security in
some cases. The Crimes that have been mentioned are starting to become more
(Reuters 2021) on the 5th of July, when the information technology firm from US was
attacked by cybercriminals, about 800+ businesses were affected all around the world.
complaints have been received resulting $4.1 billion dollars were received by the
Internet Crime Complaint Centre (IC³) in 2020 and the number of reported cases has
increased by 69% compared to the reported cases back in 2019. Cybercrime can be
categorized as crimes done in the internet with the use of computer and traditional
crimes. Crimes such as stalking, harassing, fraud or scam committed using social
acts. It can be individual acts as well as state sponsored cybercrime. There is no true
definition of cybercrime which has been accepted by people globally. Although, the
term cybercrime has been used to describe a range of crimes excluding traditional
crimes but crimes committed using the computer network system. This is because of
the complexity and the nature of crime, a single act of cybercrime can cause overly
high damage.
Historically, legislation has been used to combat the challenges posed by cybercrime.
With the advancement of technology, cybercrimes also become more common these
days and the response of our country, the Philippines, was to create laws that
called “Cybersecurity”.
Cybersecurity is the one that deals with the security of Cyberspace from
Cybercriminals. The cyberspace contains all the things that are connected to the
implement cybersecurity properly and effectively for us to protect the Internet system
along with the trust of people in this system from a variety of cyberattacks. A simple
flaw in your cybersecurity will give a chance to cybercriminals to attack your Internet
System.
Confidentiality, Integrity and Availability. They are also known as the CIA Triad.The
Cyberattacks on online data and information can have an impact on these three core
ideas of Cybersecurity.
These days, everyone may possess sensitive data such as login credentials
(password and username), Social Security number, credit card details, and electronic
system, server, or any other Internet-connected device that needs to be protected from
sensitive data. The action must be performed in accordance with the significance of
the data.
The risk increases with the importance of the data. Thus, severe precautions
completely remove danger. There are numerous techniques that can be applied to
biometric verification, using strong user id and password, and user awareness.
It is possible to maintain the integrity of data and information over the internet by
implementing the necessary security measures, such as digital signatures, user access
controls, and file permissions. Security professionals are always drawn to the larger
attacks, but they also should not undervalue the smaller ones because even a small
integrity. Backups must be kept up to date in order to recover from any data and
private organization employee, with permission to access the internet can utilize
information and data in accordance with the access level that the organization has set.
garbage. Computer and server systems need to be large enough to accommodate user
cybersecurity and cybercrimes across multiple platforms from 2012 to 2016 are
shown in this section. The necessity of cybersecurity in the context of smart grids was
brought up by Liu et al. Surveys regarding numerous aspects indicate that the security
systems in place are insufficient to keep smart grids safe from hackers. They said that
the security specifications for smart grids are exactly the opposite of those for IT
networks. They concentrated on the many mechanisms that smart grids require to
Von Solms and van Niekerk gave a presentation explaining the difference and
relationship between information security and cyber security 1. They noticed that
most people use the term “cyber security” instead of information security. But both
terms have different meanings and implications in the cyber world. They concluded
that cyber security is a broader concept than information security, providing security
not only to a specific field, but also to everything that constitutes cyberspace.
NOTE: yung year niya asan?
cyberspace. They analyzed that nothing is safe in the present scenario. They stated
that the current cybersecurity techniques are not quite efficient for all kinds of attacks
and focus on the need for new security mechanisms which are not based on previous
lack of cyber security training in universities gives outsiders, such as the private and
public sectors, the opportunity to provide cyber security training that facilitates the
work of cyber criminals. Cyber security must be studied and trained to create an
environment that can protect against cyber threats. It is difficult to hack the devices
used by a person connected to the Internet if they have basic knowledge of cyber
security. Thus, cyber security training also reduces the number of cyber attacks and
makes the work of cyber criminals more difficult. This is not just the response of the
Philippines against Cybercrimes but also the response of other countries. Another
response of our country Philippines against Cybercrime is the creation of the law
Republic Act Number 10175 or is also known as the Cybercrime Prevention Act of
2012.
The law “Cybercrime Prevention Act of 2012” or is also known as “Republic Act No.
10175” was created on the 12th of August in 2015 by the Department Of Information
Government (DILG) and the Department Of Justice (DOJ) who conjointly edited and
Implemented the Rules and Regulations Implementing the Provisions of Republic Act
No. 10175 (R.A. 10175) also known as the Cyber Crime Prevention Act of 2012.
In Republic Act No. 10175, the Philippines recognizes the need to protect and
databases along with the confidentiality, integrity, and availability of data and
information stored inside, they are all protected from all forms of abuse, misuse and
illegal access by making them punishable under the law of such conduct. In order
achieve this, the Philippines shall adopt enough powers to properly and effectively
combat and prevent such offenses by facilitating the detection, investigation and
prosecution of such offense in a domestic and international level, this can also be
cooperation.
NOTE : do not use “we” and “ our” instead use “ the researchers......”
The researchers conduct this study entitled “Assessing the Level of Knowledge of
Senior High School Students on Cybercrime Prevention Act of 2012” also known as
Republic Act No. 10175 as it noticed that this is one of the most issues especially in
schools, the majority of the students are prone to this kind of bullying that is why
researchers want to know how deep is their awareness to this law, want them to be
more fully aware of the implications of cybercrimes and the legal framework in place
so that they can prevent and clearly address them. Researchers also want to help
because it can have a really serious consequences and damage for individuals. By
assessing them about the R.A 10175 which can prevent them from doing such thing
and decrease the number of people committing suicide from being a victim of
cyberbullying. Discussing this topic can increase the knowledge of people especially
the senior high school students that we’re focusing on about the law, they can adopt
NOTE:
- From general to specific
- Dito sa last pagragraph – refers that no specific implementation of the study at
cabangan high school
about the Cybercrime Prevention Act of 2012 and how deep is their awareness about
the law. It also involved the teachers on how they teach their students about this law
2012.Parents on how they discipline their children about the R.A 10175 for them to be
more cautions of their actions. The community on how much they are taking seriously
the law, in what way they are applying the law In their life. The last one is the
This study will be limited to junior high school students. Junior high school students
are excluded from the study due to their age and developmental stage, which may
limit their understanding of the complex legal and technological concepts related to
cybercrime prevention. Additionally, the curriculum for junior high school students
may not extensively cover the legal implications of cybercrimes, making it more
relevant to assess the knowledge of senior high school students who are closer to
entering the workforce or higher education where cybercrime laws are more pertinent.
By focusing solely on senior high school students, the study can provide a more in-
depth and targeted analysis of their understanding of the Cybercrime Prevention Act
without diluting the findings with responses from a younger and potentially less
informed demographic.
Significance of the Study
Introductory concept -
High School Students. The results of this study will help senior high school students
Additionally, it can assist in pinpointing areas in which they might need to increase
their comprehension and awareness of the laws and defenses against cybercrime. With
this knowledge, students will be better equipped to defend against online threats and
The study can benefit teachers and curriculum developers by providing them with an
prevention. This can inform the development of educational materials and teaching
relevant laws.
The study’s findings can provide information to these groups regarding high school
This may result in the creation of focused advocacy efforts, instructional materials,
educational institutions.
Future Researchers:
This study can be used as a starting point for future research on the efficacy of high
carrying out comparable research with different age groups or in different educational
contexts.
- Khan, S., Saleh, T. A., Dorasamy, M., Khan, N., Leng, O. T. S., & Vergara, R. G.
971. https://doi.org/10.12688/f1000research.123098.1
rules-and-regulations-cybercrime-prevention-act-2015
- Prensky, M. (2001). Digital Natives, Digital Immigrants. On the Horizon, 9(5), 1-6.
- Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital
terrorism. Pearson
Brar, H. S., & Kumar, G. (2018). Cybercrimes: A proposed taxonomy and challenges.
https://doi.org/10.1155/2018/1798659
cybercrime
Remove the dast (-) Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress:
-Respicio, A. H. (2023, October 8). Cybercrime Prevention Act of 2012 (R.A. 10175).
2012-ra-10175#:~:text=10175.,safe%20cyberspace%20environment%20for%20all.
The Cybercrime Prevention Act of 2012, also known as Republic Act No. 10175, is a
comprehensive law aimed at addressing various forms of cybercrime in the
Philippines. It covers offenses such as illegal access, data interference, device misuse,
cybersquatting, computer-related forgery, and cybersex, among others. The act also
outlines the penalties and procedures for investigating and prosecuting these crimes.
Given the importance of this law in protecting individuals and businesses from the
growing threat of cybercrime, it is essential to assess the level of knowledge and
awareness among senior high school students. As digital natives who have grown up
surrounded by technology, these students are likely to be frequent users of the internet
and various online platforms, making them potential targets or even inadvertent
perpetrators of cybercrimes.
Assessing the level of knowledge of senior high school students on the Cybercrime
Prevention Act of 2012 can provide valuable insights into the effectiveness of existing
educational efforts and highlight areas where additional measures may be needed.
This assessment could be conducted through surveys, quizzes, or focus group
discussions, covering topics such as:
Familiarity with the Cybercrime Prevention Act of 2012: Do students know about the
existence of this law and its purpose?
Understanding of specific cybercrime offenses: Are students aware of the different
types of cybercrimes covered by the act, such as illegal access, data interference, and
cybersex?
Knowledge of penalties and consequences: Do students understand the potential legal
consequences of committing cybercrimes, including fines and imprisonment?
Safe online practices: Are students familiar with best practices for protecting
themselves from becoming victims of cybercrime, such as using strong passwords,
being cautious of phishing attempts, and maintaining privacy settings?
Reporting mechanisms: Do students know how to report suspected cybercrime
incidents and where to seek assistance if they become victims?
By assessing the level of knowledge among senior high school students, educational
institutions and relevant authorities can identify gaps and tailor their efforts to address
these gaps effectively. This could involve incorporating cybercrime prevention
education into the curriculum, organizing awareness campaigns, or collaborating with
law enforcement agencies and cybersecurity experts to provide comprehensive
training.
In conclusion, assessing the level of knowledge of senior high school students on the
Cybercrime Prevention Act of 2012 is a crucial step in promoting cybersecurity
awareness and prevention among the youth. By understanding their current level of
knowledge, appropriate measures can be taken to bridge any gaps and equip students
with the necessary information and skills to navigate the digital world safely and
responsibly.
RESPONDENTS.
USE THESE IDEAS AS YOUR GUIDE IN WRITING YOUR SCOPE AND
DELIMITATIONS
By addressing the scope and delimitations outlined above, the research aims to pro-
vide insights into the knowledge levels of senior high school students regarding the
Cyber Crime Prevention Act of 2012, explore factors influencing their awareness, and
propose strategies for developing advocacy campaign materials to enhance students'
understanding of cybercrime legislation.
Speak
SUGGESTED THEORIES FOR YOUR STUDY!!
Theories for the Study "Assessing the Level of Knowledge of Senior High School
Students on Cyber Crime Prevention Act of 2012":
1. Diffusion of Innovation Theory: This theory can be applied to under-
stand how information about the Cyber Crime Prevention Act of 2012
spreads among senior high school students. It explores the factors influ-
encing the adoption and dissemination of new ideas, such as the legislation
related to cybercrime, within a given population.
2. Social Learning Theory: Social Learning Theory, popularized by Ban-
dura, focuses on how individuals acquire knowledge and behavior through
observation, modeling, and social interactions. Applying this theory can
help analyze how students' exposure to peers, teachers, and online commu-
nities influences their understanding of cybercrime laws.
3. Cognitive Dissonance Theory: Cognitive Dissonance Theory suggests
that individuals experience discomfort when their beliefs or knowledge are
inconsistent with new information. By employing this theory, researchers
can explore how students reconcile any discrepancies between their exist-
ing knowledge and the provisions of the Cyber Crime Prevention Act,
leading to changes in their understanding.
4. Information Processing Theory: Information Processing Theory exam-
ines how individuals encode, store, and retrieve information. By applying
this theory, researchers can investigate how senior high school students
process and comprehend the legal concepts and implications of the Cyber
Crime Prevention Act of 2012.
5. Health Belief Model: The Health Belief Model can be adapted to the con-
text of cybercrime prevention education. This model focuses on individual
perceptions of threats, benefits, barriers, and self-efficacy related to health
behaviors. When applied to cybercrime knowledge, it can help assess stu-
dents' perceived susceptibility to cyber threats and the perceived benefits
of complying with cybercrime laws.
6. Social Cognitive Theory: Social Cognitive Theory, developed by Ban-
dura, emphasizes the interplay between personal factors, environmental in-
fluences, and behaviors. By utilizing this theory, researchers can explore
how students' knowledge of the Cyber Crime Prevention Act is shaped by
their own beliefs, social interactions, and exposure to cyber-related con-
tent.
7. Elaboration Likelihood Model: The Elaboration Likelihood Model
(ELM) can be employed to understand the cognitive processes involved in
students' engagement with information about cybercrime legislation. This
model distinguishes between central and peripheral routes to persuasion,
shedding light on how students critically analyze and internalize knowl-
edge about the Cyber Crime Prevention Act.
By integrating these theoretical frameworks into the study on assessing the level of
knowledge of senior high school students on the Cyber Crime Prevention Act of 2012,
researchers can gain valuable insights into the cognitive, social, and behavioral factors
influencing students' awareness and understanding of cybercrime laws and prevention
measures.