The Problem and Its Setting Background of The Study
The Problem and Its Setting Background of The Study
The Problem and Its Setting Background of The Study
Chapter 1
According to Britz 2008, over the past two decades, Cybercrimes has
emerged as a salient area of inquiry for criminologist and a growing concern for
public policy. Although there are many definition of Cybercrime, the term generally
refers to the crimes committed through the use of computers and computer
networks, but it also includes crimes that do not rely heavily on computers
also used to include traditional crimes in which computers or networks are used to
enable the illicit activity. The Cybercrime can halt any railway where it is, it may
misguide the planes on its flight by misguiding with wrong signals, it may cause
any important military data to fall in the hands of foreign countries, and it may halt
Today’s society is all about fast pace and advancement. Part of this
people’s entire lives revolve around technology and many times, they do not even
realize it. Computer systems practically run much of the world today from security
systems to the computer systems that run most businesses technology is taking
more concerning issue. The world’s growing dependency on technology also leads
2
to the world’s vulnerability. Steps are in place to protect against and prevent
cybercrime, but with technology constantly, evolving there is a need for the
crimes and many times make crimes that have existed even easier to commit than
they ever were before. Cybercrime prevention is important because in many cases
nothing is attempted to stop it until the damage has already been done.
in General Santos City as basis for a proposed action plan that can help eradicate
Specifically the researcher sought to find out the answer of the following
questions:
2. Base on the result of the study, what significant actions plans can be
proposed?
General Santos City and the proposed action plan to eradicate this
problems?
3
Theoretical Framework
crime", "e-crime", and "cyberspace crime" are often used interchangeably. The
was drafted by the Council of Europe (COE) in 2001 along with Canada, Japan,
South Africa and the US, cybercrime includes events “committed via the Internet
specific types of crime that can be linked to this research are pertinent to computer-
related fraud and violations of network security. There is also a focus on utilitarian
crimes typically associated with profit gain. The sorts of cybercrime of interest in
this research, as observed in the data examined, indicate personal gain as one
environmental and life factors. The assumption is made in this study that financial
4
benefit, or more generally personal gain, is a chief rationale for crime, but other
motivating factors are not ruled out. Motivation can change over time, and there
offender.
This study will look into the status of cybercrime related cases in General
This study was only limited to the twenty (20) police officers of Police
Precinct 1 and 2 of this city. They will be chosen through simple random sampling.
By nature and purpose of this study, the results or findings of the study will
PNP Officials. The study will serve as basis for action plans to minimize or
their action if they engage in cybercrime. Through this research they will increase
Other Researchers. This study provided baseline data needed for further
study and acquire more knowledge in conducting research, put in practice what
they had learned in their subjects and develop their communication skills.
5
Definition of Terms
The following terms were used in this study and are being defined as
follows:
or another computer
email, chat rooms or social networking sites such as Facebook and t to harass,
Cyber fraud - online theft of credit card number, expiration date, and other
Chapter 2
This aspect of the study reviews the various literature and studies related
to the study.
Foreign Literature
pg. 433). Cybercrime incorporates so many various types of crime. Some are
crimes only possible because of the access of a computer and others were crimes
long before computers appeared and technology simply was another tool to utilize.
Crimes like the various forms of fraud and pornography existed before the
technology boom, but with computers and other pieces of technology, these crimes
became easier to commit and many times get away with. As times change and
technology
Computer Trespass
pg. 433). Computer trespass is often referred to hacking is something that is often
viewed as more of a hobby to those who do it than a crime. While they may be
aware that what they are doing is illegal, they simply enjoy the challenge of it. In
this technology driven world, so many people learn from watching various
from the first season of the television show “Arrow” (2013) there is a scene
between a character who will become a main character of the show and a police
officer about the criminality of computer hacking. In this particular scene when
asked about alleged hacking abilities the character described them as a hobby,
much as many today view it. The character does not view herself as a criminal and
she definitely does not appear to be criminal, but that does not change the fact that
Fraud
or government agency” (Anderson & Gardner, 2015, pg. 416). Fraud is one of
those crimes that encompasses many variations and has been around since long
before technology. Fraud is one of the many crimes that technology simply made
that much easier to commit. A prime example comes from the concept of internet
banking and just how easy it is now for someone to gain access to someone else’s
Cybercrime is categorized into three stages that “parallel the three stages of data
(Ionescu, Mirea, & Blajan, 2011, pg.375). This simply goes to show that at any
will not happen. Despite security messages, there is no real way to guarantee the
Identity Theft
identity)” (Anderson & Gardner, 2015, pg. 229). Identity theft ties right in with fraud
and is made much easier through the processes of online banking and shopping
most cybercrimes, especially identity theft there is nothing that can be done
normally until it is too late. There are is generally no detecting one of these crimes
beforehand, cases are brought forward only after someone’s identity has already
been stolen. The lack of prevention is what causes the biggest problem.
White-Collar Crime
the criminal’s economic gain” (Anderson & Gardner, 2015, pg. 416). White-collar
crime can tie in many times with fraud and identity theft when the criminal is trying
to take from others for their own personal gain. White-collar crime spans across
continents and is a problem in more than just the United States. “In China, bank
fraud is a serious white collar crime that causes billions of dollars in loss every
year, and is considered a criminal offence even punishable by death if the case
involves corruption” (Cheng & Ma, 2009, pg. 166). In America, white-collar crimes
do not constitute a death penalty, but they do result in just as much loss. This like
many other crimes is a big problem because many times no one even realizes
Stalking
Stalking is “to follow, watch, and bother (someone) constantly in a way that
is frightening, dangerous, etc.” (“stalk,” 2015). This definition seems to go best with
the traditional sense of stalking that involves physically following and harassing
another person. Stalking though has evolved as well with the advancement of
technology. The better definition of stalking that would best apply to the realm of
(“stalk,” 2015). Social media has made the crime of “cyber-stalking” just as, if not
more, prevalent than the act of physically following someone. At the same time,
social media has also made physical stalking simpler with the ability to track
Combatting Cybercrime
As pointed out by Jaishankar (2011) with the introduction of the internet and
all the possibilities presented because of it many criminologists have had to rethink
and redefine their views on crime (pg. xxvii). For all the precautions placed there
is really very little that can be done. The biggest thing is for people in general to be
smart about what they put out on the internet and what information they let get out.
Cybercrime encompasses so many various forms of crime that have long existed
before computer access and now these crimes require altered definitions to include
the new ways these crimes can be committed. Combatting cybercrime is made
especially difficult simply because it can be near impossible to trace many of the
crimes back to the actual offender especially with the overlap of some many crimes
One article points out “the legal aspects are of no use if laws are not properly
implemented, one does not know what is cyber stalking and what to do, when one
becomes the prey of it” (Sen, 2013, pg. 382). This concept applies to every facet
of cybercrime not only cyber stalking. Many people rely so heavily on the internet
and other technology in their lives and when something goes wrong, they do not
always even realize that it was illegal. Until there is an understanding there can
only be so much done to try to help with the issue of cybercrime. Another issue is
it is difficult because “there is not a consistent international treaty in the regard yet”
(Dang, 2011, pg. 1). If no one can agree on the terms of which constitute cyber-
attacks then there is no hope of being able to agree to the terms to put a stop to it.
Local Literature
No. 10175, is a law in the Philippines approved on September 12, 2012. It aims to
address legal issues concerning online interactions and the Internet in the
The Cybercrime Prevention Act of 2012 is the first law in the Philippines
which specifically criminalizes computer crime, which prior to the passage of the
law had no strong legal precedent in Philippine jurisprudence. While laws such as
12
the Electronic Commerce Act of 2000 (Republic Act No. 8792) regulated certain
computer-related activities, these laws did not provide a legal basis for
authorities due to a lack of legal basis for him to be charged under existing
The first draft of the law started in 2001 under the Legal and Regulatory
"Ver" Peña and the Committee was chaired by Atty. Claro Parlade (+). It was an
Dela Cruz who was the President of PHCERT together with then Anti-Computer
Crime and Fraud Division Chief, Atty. Elfren Meneses of the NBI. The
the 14th and 15th Congress. The Cybercrime Prevention Act ultimately was the
the second district of Tarlac and 36 other co-authors, and Senate Bill No. 2796,
proposed by Senator Edgardo Angara. Both bills were passed by their respective
chambers within one day of each other on June 5 and 4, 2012, respectively, shortly
13
after the impeachment of Renato Corona, and the final version of the Act was
Chapter 3
METHODOLOGY
Research Design
This study employs the descriptive research method to determine the status
of cybercrime related cases in General Santos City as basis for a proposed action
The study will be conducted in two chosen precinct of General Santos Ciy.
This includes Police Station 1, Pendatun Avenue, General Santos City and Police
Research Instrument
instrument in gathering the information from the respondents. The questions were
SCALING DESCRIPTION
1 Occur Frequently
2 Occur Infrequently
respondents. Particularly, the simple random sampling using the Slovin’s formula.
Asking permission to conduct the study. The researcher will write a letter to the
Officer in charge in the Security of General Santos Airport to gather specific data’s
and assures the institutions that this data will be use purely in the study.
Analysis and interpretation of data. The researcher will gather and analyzed the
and the computation of the weighted average mean (WM). These statistical tools
will be used to come up with the summary of the results of the survey. Thus, these
16
results will be tabulated and interpreted according to the problems of the study
being identified.
17
REFERENCES
responses and crime prevention across the Taiwan Strait. Edward Elgar
Publishing.
Smith, R. (2010). Identity theft and fraud. The Handbook of Internet Crime.
Agustina, J. R., & Insa, F. (2011). Challenges before crime in a digital era:
Prevention and the Surveillance Society. Computer Law & Security Review,27(2),
http://www.sciencedirect.com/science/article/pii/S0267364911000318
Cheng, H., & Ma, L. (2009). White collar crime and the criminal justice
http://www.emeraldinsight.com/doi/full/10.1108/13590790910951849
18
/disec/issue-brief-2011-the-prevention-of-cyberterrorism-and-cyberwar.pdf
Ionescu, L., Mirea, V., & Blajan, A. (2011). Fraud, Corruption and Cyber
http://search.proquest.com/docview/884339022/fulltextPDF?accountid=12085
68-78). ACM.
Sen, A. (2013). Linking Cyber Crime to the Social Media: A Case Study of
and cybercrime. J. on Telecomm. & High Tech. L., 7, 107-124. Retrieved from
http://heinonline.org/HOL/Page?handle=hein.journals/jtelhtel7&div=8&g_sent=1&
collection=journals
19
Charges on E-Mail Virus". The New York Times. Retrieved 3 October 2012.
Appendix A
QUESTIONNAIRE
NAME: _____________________________________________________
Surname Given name Middle name
GENERAL DIRECTIONS: Check the box that will correspond to your answer as
the means of cybercrime that is usually happening in your jurisdiction using the
scale below:
1 – Occur Frequently
2 – Occur Infrequently
Internet Fraud
This includes those strategies to
defraud users and consumers on the
Internet. The strategies used involves
innocent users receiving an email stating
that the sender needs assistance in the
transfer of a large amount of money.
Identity theft and Privacy Invasion
When criminals use information of
somebody on stolen credit card making
and will have a huge transaction involving
money by reconstructing that person’s
identity.
ATM Fraud
Criminals keep developing many
new ways of getting into the user’s
account. Through providing a personal
identification number (PIN) at the ATM
machine, criminals can intercept the data
on the card’s magnetic strip and even the
user’s PIN.
21
Wire Fraud
This involves a highly
programmable application that transfers
funds from organization accounts or
individual account.
Child Pornography
This crime occurs through the
provision of websites at exposes children
that are less than 18years old to
pornography.
Computer Viruses
This is the intentional release of
computer viruses that can damage the
computer system in a very short time. It is
sometimes released over the internet and
when it gets into some computer
systems, it replicates itself and damages
the computer.
Hacking
This is a breach into the computer
network through some computer
programming. Hacking was a good
activity that made many programmers
good computer security architects.
Sabotage
This is a cybercrime that is related
to hijacking the website of an organization
or even the government through hacking.
Phishing
This a technique of extracting
confidential information such as credit
card numbers and username password
combos by masquerading as a legitimate
enterprise.
Cyber stalking
Cyber stalking is a new form of
internet crime in our society when a
person is pursued or followed online. A
cyber stalker doesn’t physically follow his
victim; he does it virtually by following his
online activity to harvest information
about the stalkee and harass him or her
and make threats using verbal
intimidation. It’s an invasion of one’s
online privacy.
22
Cyberbullying
Cyberbullying is one of the most
rampant crimes committed in the virtual
world. It is a form of bullying carried over
to the internet. On the other hand, global
leaders are aware of this crime and pass
laws and acts that prohibit the
proliferation of cyberbullying.
Social Engineering
Social engineering is a method in
which cybercriminals make a direct
contact with you through phone calls,
emails, or even in person. Basically, they
will also act like a legitimate company as
well.