Final - Oral Defense
Final - Oral Defense
Final - Oral Defense
S. Y. 2016 - 2017
Criminology Department
Digos City
ARJAYBRENT A. CAYAWIN
ALEXANDER A PUTO
October 2016
2
APPROVAL SHEET
In
fulfillment of the requirements in Criminology Research 1 leading to the
Bachelor of Science in Criminology this undergraduate thesis entitled
Level of awareness of the Cybercrime Prevention Act of 2012 and
the extent behavioral change among Students of Polytechnic
College of Davao Del Sur. Inc. S.Y. 2016 - 2017, prepared and
submitted by Alexander A. Puto, Arjaybrent A Cayawin, Jeverson J.
Alcoba, Rey Anthony B. Apor is hereby to recommended for acceptance
and approval for Oral Examination.
Panel of Examiners
Member Member
Chique M. Nacionales,MsCrim.
Chairperson
Research Director
ACKNOWLEDGEMENT
3
people whose assistance and unselfish help made this study possible.
Heartfelt thanks to our mentors, colleagues, and friends who pave the
To
Mr. Rex C. Parame, LET, Adviser, for his guidance, concern, supervision
Department, for her heartfelt support and who impart her knowledge and
without them this project could have not made possible and nevertheless
Above all to the Almighty and Loving God, the source of all the
blessing and wisdom, for sustaining grace that made this research a
reality.
-The researchers
4
Table of Content
Title Page. i
Table of Content.. ii
Acknowledgement... iv
Dedication v
Chapter 1
Definition of Terms. 8
Chapter 2
Chapter 3
Methodology
5
APPENDICES
APPENDEX A
6
LETTER OF PERMISSION
Dear Maam:
ARJAYBRENT A. CAYAWIN
JEVERSON J. ALCOBA JR
ALEXANDER A. PUTO
Noted by:
Adviser
APPENDEX B
7
LETTER OF PERMISSION
October19, 2016
Dear Maam:
ARJAYBRENT A. CAYAWIN
JEVERSON J. ALCOBA JR
ALEXANDER A. PUTO
Noted by:
Adviser
APPENDEX B
8
LETTER OF PERMISSION
October19, 2016
Dear Maam:
ARJAYBRENT A. CAYAWIN
JEVERSON J. ALCOBA JR
ALEXANDER A. PUTO
Noted by:
Adviser
APPENDEX B
9
LETTER OF PERMISSION
October19, 2016
Dear Sir:
ARJAYBRENT A. CAYAWIN
JEVERSON J. ALCOBA JR
ALEXANDER A. PUTO
Noted by:
Adviser
APPENDEX B
10
LETTER OF PERMISSION
ROMIE B. LACADEN
Dean Hospitality Management Department
Polytechnic College of Davao Del Sur
Dear Sir:
ARJAYBRENT A. CAYAWIN
JEVERSON J. ALCOBA JR
ALEXANDER A. PUTO
Noted by:
Adviser
APPENDEX D
11
SURVEY QUESTIONNAIRE
1 Not Aware This means that you dont have any knowledge or
information about Cybercrime prevention
Act of 2012.
Digos City
CHAPTER I
Introduction
According to (britz 2008) over the past two decades, Cybercrimes has
the use of computers and computer networks, but it also includes crimes
computers or networks are used to enable the illicit activity. The Cyber
crime can halt any railway where it is, it may misguide the planes on its
military data to fall in the hands of foreign countries, and it may halt e-
threat poses of Cyber crime by India. Efforts have been made to analyze
legal framework available for its control in India. To start with, it is,
and essentially all societies from ancient to modern have been evidently
demonstrating its presence. Each society have been providing its own
will of the political community ruling over the society and it was always
given society. Thus from time immemorial the behavior that attracts Penal
The Department of Justice (DOJ) has ordered the filing of the first
related forgery under the cybercrime law covers the act of using computer
This study aims to find out the level of awareness on the Cybercrime
Prevention Act of 2012 and the extent Self control among students of
2.1. C
ourse, and
2.2. O
verall?
3.1. C
ourse , and
3.2. O
verall?
The null hypothesis was tested using the 0.5 level awareness
Theoretical Background
gratification both in short and long term (Hirchi 2004). Gottfredson and
rearing, and has many diverse manifestation that reverberate through the
life cycle.
Act No. 10175, is a law in the Philippines approved on September 12, 2012.
the bill are cyber squatting, cybersex, child pornography, identity theft,
While hailed for penalizing illegal acts done via the Internet that were not
covered by old laws, the act has been criticized for its provision on
expression.
days, and extended it on 5 February 2013 "until further orders from the
court.
On May 24, 2013, The DOJ announced that the contentious online libel
On February 18, 2014, the Supreme Court ruled that section 5 of the law
unconstitutional.
activities, these laws did not provide a legal basis for criminalizing crimes
offenses such as cybersex and spam, and other offenses. The law also
Republic Act No. 9779 (the Anti-Child Pornography Act of 2009), and libel,
an offense under Section 355 of the Revised Penal Code of the Philippines,
punishable under the Revised Penal Code also punishable under the Act
On May 24, 2013, The DOJ announced that online libel provisions of
the law have been dropped, as well as other provisions that "are
punishable under other laws already", like child pornography and cyber
squatting. The DOJ will endorse the revised law to the next 16th Congress
of the Philippines.
Conceptual Framework
Independent Variables
Dependent Variables
COURSES
area of inquiry for criminologists and a growing concern for public policy.
computers (Britz, 2008). Extant research has explored the nature and
extent of cybercrime (Cukier & Levin, 2009; Finley, 2009; Finn, 2004;
Geis et al., 2009; Huang etal., 2009; Jaishankar, Halder, & Ramdoss.
Act of 2012 and the extent Self control among students of Polytechnic
College of Davao Del Sur. S.Y. 2016 2017. This was conducted at
Polytechnic College of Davao Del Sur. The data gathered through the
polytechnic college of Davao Del Sur, Inc. Students about the Cybercrime
The main purpose of this study was to determine the level of awareness
2016, 2017.in addition, the study seek to detect the relationship of two
variables. Hence the result of the study will be a great help to the
following beneficiaries:
Deans/ Directors. The output of this study will shed light among the
Faculty. The result of this study will be a great help for the teachers on
22
how to motivate the students the proper usage of the computers, internet
and social media sites that will heighten their level of maturation.
Students. The output of this study will provide guidelines to the students
on what type or appropriate words they will post or sends. it will also
Act of 2012 so that they will not find it hard to gather data.
Definition of Terms
In
known for his theories of the unconscious mind and the defense
unconscious desires.
any particular point in time. It includes what you are thinking about right
now, whether it is in the front of you mind or the back. If you are aware
below the surface of awareness. It can be retrieved with relative ease and
desires that are buried deep in ourselves, well below our conscious
awareness. Even though we are not aware of their existence, they exert
Cybercrime includes any type of illegal scheme that uses one or more
criminals use the Internet to steal personal information from other users.
24
2012.
Republic Act No. 10175 - also known as the Cybercrime Prevention Act
President.
ancestors and the rest of the animal kingdom, thanks to our large
avoid doing things we'll later regret. The ability to exert self-control is
depletion. It's one reason we're more apt to reach for that chocolate chip
cookie when we're feeling stressed than when we're feeling on top of the
CHAPTER II
Presented in this portion are the related ideas and information taken from
College of Davao Del Sur. Inc. Students on the Cybercrime Prevention Act
Foreign study
all crime tends to have a cyber component. For example, the widespread
use of cell phones means that even ordinary street crimes usually involve
with denial of service attacks, hacking and, more generally, attacks that
take advantage of flaws in computer systems and networks. Yet the most
(IC3) is auction fraud: I saw it on the Internet; I paid for it; I received
nothing or What I did receive was not what I saw. Like law-abiding
anonymity.
legislation, court action and even industry wide security standards often
fail to keep pace with rapid changes in technology. Countering misuse and
For six years the Center for Cybercrime Studies has brought
computer related crime. Center speakers and researchers have also been
concerned with the impact on individual privacy that the ever growing use
We invite you to peruse our site and to learn about our events, the
projects we sponsor, and the work of our affiliated researchers. Please feel
free to give us your feedback on the Contact Page. If you would like to be
included on the Centers distribution list for talks and other events, please
Cybercrime
individuals who are spatially distant, which creates possibility for new
forms of association which in turn gives rise to cyber crime and cyber
or device may be the agent of the crime, the facilitator of the crime, or
the target of the crime. It can take place on the computer alone, or in
their vast network which is spread across globe. The synergy between
organized crime and the internet has thus increased the insecurity of the
digital world.
Cyber Fraud
another form of cybercrime which has a firm grip on society is cyber fraud
and scams online. But, the problem with this is the lack of systematic and
official data. Internet Crime Complain Centre (ICCC) is the only source
refer them to the relevant criminal justice agencies for action, claims that
frauds ascent for only 0.01% of transactions undertaken using the site yet
this would amount to 3000 frauds per day, given that more than 30
million auctions take place on eBay daily Cha (2005)17. The fact is that a
Pornography
pocket PC, wireless, mobile phone, etc. In the late 1970s and early
1996, of the ten most popular Usenet groups, five were sexually oriented
and one (atl.Sex. Net) attracted some 5, 00,000 readers every day. To a
important mention here is about a case which was filed in the Juvenile
Court, Delhi on the charge of cyber pornography. Some jurist says this is
the first Indian cyber pornographic case which was charge sheeted in the
and section 292,293, 294 of the Indian penal code and the indecent
Cyber Bullying
using the internet for interpersonal relationships, the risk of being bullied
May 27 proposed a bill aiming to define and penalize the crime of cyber
can potentially affect not only school-aged children, but also any
said.
using the Internet or any form of electronic media or technology that has
or emotional harm.
Among other offenses included in the bill that defines the scope of cyber
bullying are:
cyber bullying would be fined a penalty of P50, 000 but not more than
P100,000 and imprisonment of not less than six months, but not more
31
than six years, or both. Because of the anonymity that the Internet
gives, social and moral norms are easily switched off and users are
Andaya explained.
become a culture among Internet users and even initiates problems that
Plagiarism
might occur at any time when the material of another is being used,
you do collaborative work with other students and then use their ideas or
material in the work you submit, you must credit the work of the other
the work of other students into your materials, you are guilty of
plagiarism.
In
copying verbatim from a source but also occurs when you paraphrase the
work of another.
The sole exception to the rule that all materials being used must be
knowledge. Information and ideas that appear in many places or that are
may not know what a common knowledge in your discipline is. When in
bibliographical item was used, or possibly in the body of your text. You
acknowledging sources.
33
Cyber Trespass
control over the property the trespass actions are stranded. The websites
Trespass. The act of hacking by the hacker is of civil nature, but if the
nature. The hacking may also result in other crimes mentioned in the
Indian Penal Code 1860 apart from criminal trespass. For example if a
hacker hacks into the Information Technology Act tries to the website of a
bank and transfers money into his account this may constitute a crime
under Section 378 of the Indian Penal Code 1860. The act in the above
case can also be termed as Cyber Theft. The Information Technology Act
provides civil and penal consequences for hacking and other wrongful
activities.
activities like email spoofing, cyber defamation and also used as a target
cyber trespass from the cyber world; however it is quite possible to check
them. The computer data may also contain personal information, so the
Money laundering
Anti-Money Laundering Act of 2001 (RA 9160) an act defining the crime of
money laundering, providing penalties there for and for other purposes Be
It is hereby declared the policy of the State to protect and preserve the
Philippines shall not be used as a money laundering site for the proceeds
of any unlawful activity. Consistent with its foreign policy, the State shall
SEC. 3. Definitions. For purposes of this Act, the following terms are
hereby defined as follows: (a) "Covered institution" refers to: (1) banks,
non-banks, quasi-banks, trust entities, and all other institutions and their
exchange rate within five (5) consecutive banking days except those
instruments; and (4) other similar instruments where title thereto passes
under Article 267 of Act No. 3815, otherwise known as the Revised Penal
and Corrupt Practices Act; (4) Plunder under Republic Act No. 7080, as
amended; (5) Robbery and extortion under Articles 294, 295, 296, 299,
300, 301 and 302 of the Revised Penal Code, as amended; (6) Jueteng
1602; (7) Piracy on the high seas under the Revised Penal Code, as
amended and Presidential Decree No. 532; (8) Qualified theft under
Article 310 of the Revised Penal Code, as amended; (9) Swindling under
Article 315 of the Revised Penal Code, as amended; (10) Smuggling under
Republic Act Nos. 455 and 1937; (11) Violations under Republic Act No.
Cyber Trespass
control over the property the trespass actions are stranded. The websites
Trespass. The act of hacking by the hacker is of civil nature, but if the
nature. the hacking may also result in other crimes mentioned in the
Indian Penal Code 1860 apart from criminal trespass. For example if a
hacker hacks into the Information Technology Act tries to the website of a
bank and transfers money into his account this may constitute a crime
38
under Section 378 of the Indian Penal Code 1860. The act in the above
case can also be termed as Cyber Theft. The Information Technology Act
provides civil and penal consequences for hacking and other wrongful
activities.
activities like email spoofing, cyber defamation and also used as a target
cyber trespass from the cyber world; however it is quite possible to check
them. The computer data may also contain personal information, so the
LOCAL STUDY
intentioned. But when you read the actual contents of whats been
by comparison.
Yes, theres the usual hacking, cracking, identity theft and spamming,
which most of us can agree should be illegal. But theres also cybersex,
with the nature of online anonymous criticism. But to actually try to make
such a thing illegal? You wade into dangerous waters that anything
resembling freedom of speech will likely drown in. And thats overlooking
sharing as well, two provisions getting less attention due to the severity
Over the past few weeks, Filipinos online have been trying to raise
cybersex, hacking, identity theft and other online crimes, the Philippine
Constitution. And it would seem that the campaign have fallen to deaf
order against the implementation of the law (which takes effect just an
40
hour from now). The high court has yet to render its judgment on seven
Local studies
Manila Months after the high tribunal upheld its constitutionality the
Cybercrime Prevention Act of 2012 is facing its first test, in the case of a
woman charged with using computer fraud to have P1.4 million in non-
Based on a complaint by the Philippine National Bank, the Las Pinas City
May 30, 2014 said prosecutors found probable cause to indict Ignacio with
Act 10175.
from the PNBs branch in Barangay Almanza, Las Pinas part of a total
transactions started when the PNB branch in Guam informed the head
Sunny Pulan Juan to Ostrich Business Services, and another one for
from these supposed deposits. She was unable to withdraw the rest of the
at PNB Guam and that there was an illegal or unauthorized access to the
and Gretchen Quilit Andres) whose real identities and whereabouts are
still unknown. Using such inauthentic data, Ignacio went to the bank
branch in Almanza to withdraw the amount on May 16 and that she went
again last May 22 to withdraw the remainder of the account but was
unsuccessful after the bank reversed the amount, prosecutors said. She
knowingly used the said inauthentic data to with intent to gain and with
intent to cause damage to the bank. She probably knew that the money
curb various emergent crimes using the internet, but its implementation
42
was stalled for one year after various groups questioned its
CHAPTER 3
METHODOLOGY
This chapter is about the research method and procedures that were use
Research Design
Del Sur. Inc .S. Y. 2016 2017 as the respondents of this study.
Slovins Formula:
n = N/ (1+Ne2)
Whereas:
n - No of samples
N Total Population
The respondents of this study were 100 randomly selected students from
Research Locale
Polytechnic College of Davao Del Sur, Inc. is one of the pioneer collegiate
Philippines.
Research instruments/s
The instrument that was used in this study Is the survey questionnaires
that was prepared by the researcher and were evaluated by the panelists
During the conduct of the study, the researchers Secure permission from
the Polytechnic College of Davao Del Sur. Inc. to conduct the study
immediately retrieved right after the test administration. The data were
The data was analyzed using descriptive statistics. The data was treated
Awm=fx
N
Where:
X- Weighted mean
2. Pearson r
(N-1)(sdx)(dy)
Rp =dxdy
Where:
Dy = Standard deviation of y
= Number of subject
47
Bibliography
https://thepsychologist.bps.org.uk/volume-25/edition-2/self-control-
%E2%80%93-moral-muscle
http://en.wikipilipinas.org/index.php/Cybercrime_Prevention_Act_of_201
2
http://definitions.uslegal.com/c/cybercrimes/
http://freudhistoryandconcepts.blogspot.com/2008/04/3-levels-of-
awareness.html
]. Id. (citing City of Chicago v. Morales, 527 U.S. 41 at 64, 119 S.Ct.
1849).
http://www.ndtv.com/india-news/cyber-criminals-to-be-more-aggressive-
in-2011-study-443824
http://www.nationalcrimeagency.gov.uk/crime-threats/cyber-crime
http://www.kaspersky.com/internet-security-center/threats/cybercrime
http://www.cybercrimejournal.com/ngo2011ijcc
http://astro.temple.edu/~tuc16417/papers/Kirwan
https://www.helpnetsecurity.com/2010/09/08/the-emotional-impact-of-
cybercrime/
http://interaksyon.com/article/89143/cybercrime-law-test-case--
bizwoman-charged-with-drawing-funds-from-forged-remittances
InterAksyon.com
The online news portal of TV5
http://www.ndtv.com/india-news/cyber-criminals-to-be-more-aggressive-
in-2011-study-443824