Professional Documents
Culture Documents
Buhay, Guinaban, and Simbajon - Thesis Chapters 1, 2 and 3
Buhay, Guinaban, and Simbajon - Thesis Chapters 1, 2 and 3
UNIVERSITY CAVITE
Tricia G. Simbajon
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
TABLE OF CONTENTS
TITLE PAGE
TABLE OF CONTENTS
INTRODUCTION
Research Objectives 7
Theoretical Framework 10
Conceptual Framework 12
Definition of Terms 13
Types of Cybersquatting 28
Synthesis 38
METHODOLOGY
Research Design 41
Research Instrument 46
CHAPTER I
INTRODUCTION
The fundamental knowledge and guidelines that govern the study proposal
procedures are presented in this chapter. It includes the objectives and concepts that
collectively make up the research’s framework. It also defines the terms that are
operationally used throughout the study and discusses the study’s significance, scope, and
limitations.
money off the reputation of another person’s trademark. It usually refers to acquiring
domain names that incorporate the names of existing companies to sell them to those
companies for a profit. The act that has come to be known as “cybersquatting” first
appeared when most businesses were still ignorant of the lucrative online opportunities.
Some enterprising individuals registered popular company names as domain names to sell
the names back to the organizations once they realized what they were doing. Opportunities
for cyber squatters are rapidly dwindling as more and more companies realize how
punishable under the Republic Act No. 10175 also known as the Cybercrime Prevention
Act of the Philippines. Section 5 of the Republic Act No. 10175 states that cybersquatting
is the acquisition of a domain name over the internet, in bad faith, to profit, mislead, destroy
the reputation, and deprive others of registering the same, if such a domain name is:
the appropriate government agency at the time of the domain name registration;
b.) Identical or in any way similar to the name of a person other than the registrant,
critical infrastructure, the penalty of reclusion temporal, or a fine of at least five hundred
incurred, or both shall be imposed. However, despite the long existence of the law, a lot of
citizens are still not knowledgeable about the implications and repercussions of
cybersquatting in their lives. A lot of Filipinos still use similar or almost identical domain
names when creating websites that are subject to trademark infringement punishable as
above mentioned.
all of which are prohibited. Typosquatting is one of them. Typosquatting is one of the most
misspelled domain names for popular brands. If a domain name is typed incorrectly, the
Additionally, it involves altering the order of the letters or words within a domain.
Typosquatting is the practice of profiting from possible errors. Second, identity theft.
Cybersquatting can be used for identity theft because it allows someone to create a
comparable Uniform Resource Locator (URL) using the identity of a business. A user
visiting that business’s website might instead fall on the fake site. At the given moment,
the cybersquatter effectively took control of the target’s digital identity. Third, there is the
Given the proliferation of fan sites currently available online, this is a murky topic.
However, if the website begins selling goods that infringe on the victim’s brand or without
legal license, this might help strengthen the case for cybersquatting. Lastly, there is Reverse
Domain Name Hijacking (RDNH), also known as reverse cybersquatting, is a practice that
domain name that incorporates a trademark with the intention of profiting from that
trademark, reverse domain hijacking is a little different. It occurs when a person or business
falsely claims to possess a trademark and then takes unreasonable actions to take away
Since the 1990s, cybersquatting has been a problem. This is why governments as
Continuously, it is no secret that it is one of the forms of cybercrime that has shown an
increasing pattern in 2020 and 2021, and it remains confusing to some individuals
(Armstrong, V., 2019). We are also aware of how reputation and credibility can be
exceedingly difficult to acquire but easily lost, causing considerable harm to the business’s
image and legitimacy. The researchers have chosen Cybersquatting to be the subject of
their study because they want people to be familiar with the Republic Act No. 10175 also
known as Cybersquatting under the Cybercrime Prevention Act of 2012 to at least have an
elementary knowledge of the law so that they would understand its purpose and where it
The study aims to determine the implications and repercussions of Republic Act
10175 or the Cybercrime Prevention Act of 2012 in using domain names against trademark
1.1 Age;
community?
3. How knowledgeable are students in terms of cybersquatting, and how do they seek
4. What are the implications of failing to protect intellectual property rights, including
Generally, this study aims to make an in-depth analysis about the implications of
3. Depict the effect of such implications to the effectivity of the law concerning
4. Identify the issue that the Philippine government should consider in implementing
individuals:
1. Legal Studies Students. The findings of this study will help the Legal Studies
cybersquatting can harm their brand reputation, lead to financial losses, and confuse
consumers, impacting their ability to maintain customer trust and loyalty. The study
may lack resources for legal action, leading to policy recommendations for their
protection. Moreover, this will outline how trademark infringement affects their
businesses legally.
this will provide a cohesive study on the possibilities that may arise from trademark
infringement.
4. Consumer Trust. This study can reveal how cybersquatting affects consumer trust
purchase.
5. Legislators. This study will serve as a guide for legislators in understanding the
is to line out its implications for possible points of the Cybercrime Prevention Act
2012 for amendments. Legislators can create effective and enforceable laws that
can deter cybercrime, protect individuals and businesses, and establish a legal
6. Society. This study will enlighten the people of the true nature of the Cybercrime
the history and background of the law so as to know where it came from, and to
outline how such affects the society in its every sector. It is crucial for society to
protect intellectual property rights, foster fair competition, and maintain trust and
The scope of this study is limited only to all students enrolled under Bachelor of
Arts in Legal Studies for Academic Year 2023-2024 at the Lyceum of the Philippines
The study was focused on determining the perceptions of the Legal Studies students
and the Cybercrime Prevention Act of 2012. These questions are derived from the study of
Khan et. Al (2015), and were modified according to the information needed in the research
study.
which regulations is devised by political leaders and manually executed through impartial
Berman (1978 and 1980), Lipsky (1978), Hull and Hjern (1987), who contend that a more
to the macro-level plans by creating their particular initiatives and putting them into action.
According to Berman, the “interaction of a rule with the micro-level institutional setting”
is the primary cause for the majority challenges with implementation. The regulations
developed at the national level may be dominated by the local organizations and context-
specific variables, and legislators are unlikely to be able to regulate the processes. As a
result, there are significant differences in how the same national policy is carried out locally
(Palumbo, Maynard-Moody, and Wright 1984). Theorists of the bottom-up approach have
additionally come to conclusions that there certainly cannot be a “context free” theory of
inclined to fall short if local administrators, or those at the “street level,” “are lacking in
the autonomy and opportunity of adapting regulations to their own realities.” Additionally,
they contend that in order to possess a better grasp of the course of a given policy, street-
level bureaucrats’ activities must be taken as well into account because it is at the small
imagined at the national level and their actual execution on the ground, this study will apply
of choice. Michael Lipsky described street-level bureaucrats in his seminal work as “public
service workers that relate closely with citizens in the ordinary course of their duties, and
who also have significant control in the performance of their duties” (Meyers and
Vorsanger 2003). As a result, they play a distinctive and important part in the
state counsels, government attorneys, judges, and other individuals involved in cybercrime
who directly affect policy execution would be regarded street-level bureaucrats in this
study. This presents us once again to the idea of “institutional fit,” which means that new
programs cannot simply be created at the national level and brought in in a particular
and Salvador 2006). The amount of alignment between the policy and its locale context,
which is mostly shaped by local bureaucrats and other social influences, should also be
describing the conceptual framework of the study. An effective method for both analyzing
and capturing the key elements of a transformation process is provided by the IPO Model.
Figure 1. A Table Showing the Input Process Output Model of the Study
The study’s input box contains information about the age, sex, and academic year
of the Legal Studies students. In accordance with the Cybercrime Prevention Act of 2012,
The procedure box demonstrates how survey questions are distributed while using
both qualitative and quantitative data collection for the undertaking. The mean, percentage,
frequency count, and standard deviation were used to evaluate and interpret the data.
The study’s findings are displayed in the output box, giving legal studies students
cybersquatting, trademark infringement, and the Cybercrime Prevention Act of 2012 and
its repercussions.
technologies, such as the internet, social media platforms, text messages, or other digital
means. It involves using these technologies to harass, intimidate, threaten, or harm others,
Cybercrime – refers to criminal activities that are carried out using computers,
over the internet or through digital devices. It typically involves individuals using text,
Cyber squatters – often take advantage of the fact that some individuals or
companies may want to secure domain names related to their brands or trademarks and are
domain name with the intent to profit from the goodwill of someone else’s trademark.
as a result of the actions or negligence of another party. Damages are a crucial concept in
legal contexts, particularly in civil law, where they are a remedy sought by a party who has
action or practice.
Intellectual Property – refers to the legal rights that are granted to individuals or
Law suit – A lawsuit is a legal dispute or case that is brought before a court of law
for resolution. It is a formal legal proceeding in which one party, known as the plaintiff,
files a complaint or a claim against another party, known as the defendant, alleging that the
Liberty – is a concept that refers to the state of being free from oppressive
restrictions or control. It encompasses the idea of personal freedom, individual rights, and
the ability to make choices and decisions without undue interference from external
authorities or forces.
group, or entity for violating a law, rule, regulation, contract, or some established standard
of conduct.
design, or combination thereof that is used to identify and distinguish the goods or services
trademark is a distinctive sign, symbol, word, or phrase used by businesses to identify and
individuals, often involving activities that exploit vulnerable people for various purposes,
instance, the cyber squatter deliberately buys misspelled domain names for popular brands.
website.
CHAPTER II
LITERATURE REVIEW
The researchers were able to select a number of well-known studies from the wide
variety of resources available. There are numerous materials available online, as well as
some in the university library. A number of critiques of the Cybercrime Prevention Act of
practices covered by its provisions, emerged as the general public monitored the evolution
of the law.
cybersquatting, which refers to the illicit act of registering and employing a domain
instances within the nation. The COVID-19 pandemic expedited the utilization of
computer data and systems. Additionally, the act also encompasses offenses that
Similarly, Republic Act 10173 aimed to address identity theft and unsolicited
electronic messages. However, there were other factions that expressed opposition
towards the inclusion of Internet posts under the purview of libel law. As a result,
the Supreme Court intervened by issuing a temporary restraining order and a status
quo ante decree. Moreover, this legislation stipulates that legal action taken under
the Cybercrime Prevention Act of 2012 would not exempt individuals from any
legal consequences for breaching any section of the Revised Penal Code, as
Property Organization (WIPO) stipulates that there was a 1.3 percent increase in
the number of domain name disputes in 2017 compared to the previous year. In the
year 2018, the United States accounted for the most number of conflicts, reaching
a cumulative total of 920. Certain countries, such as the Philippines and the United
the standard provisions of trademark law. In contrast, nations like China have more
relaxed laws pertaining to the protection of intellectual property in the online realm,
notoriety for their practice of registering domain names that have a resemblance to
from China. The lawsuit alleges that the said individual registered the domain name
Pinterest on his website, a practice intended solely for the purpose of displaying
to a monetary penalty amounting to USD 7.2 million, which included the costs
industry and domain squatting industry rocks the Philippine e-commerce start up
scene in the Philippines. A local blog that focuses on tech startups, The Bobbery,
revealed that daily deals website Metrodeal is said to be the owner of a number of
domain names that are connected to pornographic websites and are all versions of
the names of competing companies. The list of web addresses that were link to adult
capitalize on the domain name or even harm the reputation of the intended website.
No matter who the site’s owner is, the prohibitions banning cybersquatting that are
part of the new law are unable to be put into effect due to the Cybercrime Law’s
2012 (RA 10175), however a Catholic leader by the name of Legazpi Bishop Joel
Baylon asked the populace to allow the newly enacted law the chance to apply the
Legazpi Bishop Joel Baylon, acknowledged that the law has advantages and
disadvantages.
and e-libel have a right to protection against those who use the internet with harmful
intent. This protection extends beyond just protecting politicians, celebrities, and
execute the IRR, which will negate all of the public’s negative sentiments and
computer data, publish or distribute illegal files online, access or use any account
passwords online, use any illegal online services, or engage in cybersex or child
Cited in the study of Banzuela and Garcia in 2015, ten years after former
commonly referred to as the Cybercrime Prevention Act of 2012, was passed into
law. The passage of the law required some time because it was necessary for
whether or not the stipulations for punishment under Republic Act 8792, the E-
Commerce Law, were enough. Hence, when these issues emerged, Republic Act
10175 was enacted. In Philippine law, cybercrimes are enumerated as follows: (1)
Illegal Access; (2) Illegal Interception; (3) Data Interference; (4) System
related Identity Theft; (8) Computer-related Fraud; (9) Cybersex; (10) Child
acquisition of domain name over the Internet in bad faith to profit, mislead, destroy
reputation, and deprive others from the registering of the same, includes those
existing trademark at the time of registration; the names of persons other than the
registrant; and acquired with intellectual property interests in it. Those who get
domain names of prominent brands and individuals which in turn are used to
damage their reputation, can be sued under such provision. This constitutes the fact
are treated separately because a party may exercise his liberty to express himself
without the need to violate the trademarks of brand names or such of a person.
Moreover, the penalty prescribed under the Revised Penal Code of the
Philippines indicate Prision Mayor or imprisonment of six years and one day up to
(imprisonment for twelve years and one day to twenty years) or a fine of at least
2012)
Foundation, it was reported in the year 2022 that the underlying essence of the
catalysts for the generation of ideas. Ideas serve as the foundation for the
behavior. The rate at which information diffuses and ideas are adopted has
dissemination.
solutions. The business process outsourcing (BPO) industry in the Philippines has
workers.
Philippines. Due to the nascent state of digital transformation in the country, there
threat or that the Philippines is not a prime target. The global systemic shocks
experienced worldwide were a result of the pandemic and the intense and divisive
established assumptions and prevailing knowledge about the Internet. The twin
prevent or, at the very least, minimize the potential harm that could arise by giving
more thought and taking more action towards the adoption and enforcement of
cybersecurity protocols.
The Philippines passed the Cybercrime Act in 2012; roughly three years
later, the Departments of Justice, Interior and Local Government, and Science and
In the study of Alberto and Pelongco in 2020, they stated how the United
States implemented its cybercrime law and what is the Philippines Cybercrime Act
status. It stated that taking into account the newly implemented but untested
provisions of the Philippines’ Cybercrime Act raises the question of how the
case. The network of contracts that ICANN and Providers use to bind all parties
registrants accused of cybersquatting may result from the fact that Philippine
legislation, unlike ACPA in the U.S., does not define reverse domain name
hijacking. In other words, it has yet to be determined if the Cybercrime Act will
Cybercrime Courts to try and decide Cybercrime cases covered by the law in this
Courts to Try and Decide Cybercrime Cases Under Republic Act No. 10175.”
addressed the pertinent provisions has ever made it to the Philippine Supreme
Court. The Department of Justice’s (DOJ) Office of Cybercrime reports that there
were just four cases in 2014, two in 2015, and one in 2016. The need for more legal
cybersquatting cases is even more concerning. As far as the authors are aware, there
have yet to be any instances that address this specific conundrum. There has yet to
be a corresponding law in the Philippines, unlike the U.S., where the courts have
ruled that the UDRP is only a cause of action to begin a review under the ACPA196
and not an arbitration subject to minimal review. It differs from the processes that
business from the authentic owners. Through the laws, rules, and frameworks that
are put into place, cyber security also indirectly influences political interactions and
entities. It is impossible to bring cybersquatting under the authority of only one law.
Over and beyond the standard laws governing trademark law, certain nations have
cybersquatting, some countries have imposed rather arbitrary restrictions on the use
of domain names, such as demands that the domain name be distinct or contain no
broad terms.
2022, the WIPO has been significant in putting a stop to cybersquatting. Around
Organization (WIPO) in 2022, and over 7900 domain names were present in the
total. Particularly since 2012, when there were almost 2900 such conflicts, the
for online dispute resolution could aid in resolving complaints and increase
Internet Corporation for Assigned Names and Numbers (ICANN) Policy, which is
the stable and secure operation of the unique identifier systems that are used
throughout the entire global Internet. This approach is not only quicker, but also
more economical. On the other side, the United States became the leading protector
Philippine scenario, the Republic Act No. 10175, otherwise known as the
(Senate and House of Representatives of the Philippines, 2012). Under the new
Senate Bill, squatters could spend six to twelve years in prison if found guilty
(Realtime Register, 2012). The Philippine adopted the Uniform Domain Name
Dispute Resolution Policy (UDRP) which is the legal basis for resolving disputes
between a domain name registrant and a third party about the unauthorized
registration and use of an Internet domain name in the generic top level domains
Types of Cybersquatting
recognized practice that dates back to its inception. Many organizations and
online in the early years of the internet. During this time, some fraudsters would
2022, there are many different sorts of cybersquatting being formed nowadays
commerce at the expense of the goodwill and trade name of legitimate trademark
owners.
1. Typosquatting
trademarks (Stella & Kumari, 2022). The cyber squatters will create a typo in
the domain name that will be registered on purpose. Since these typos are
generic in nature, there is a risk that many users will enter them erroneously and
Rampure, 2022).
2. Identity Theft
Identity theft is the common cybercrime that can be under the manipulation of
the cybersquatters. The internet sources different identity theft issues. The
names after the ownership of such names expires in order to deceive website
visitors into believing that the website is maintained by the same original
3. Name Jacking
Name jacking takes place when a cyber squatter utilizes the real name of a
names of such well-known public figures with the intention of attracting visitors
to the website associated with their legitimate online identity. They are typically
employed to increase traffic to the website of the cybersquatter, which may have
4. Reverse Cybersquatting
hackers taking advantage of the current legal system to help their domain
squatting. Cyber squatters will exploit the law, such as the Anti Cybersquatting
Consumer Protection Act (ACPA), to try and take over the website in question
by claiming that the actual owner is web squatting using the business name that
they own (Kaspersky, 2023). The legitimate trademark owner, who properly
registered the domain name and protected it, would be intimidated by the cyber
squatters, who would then urge him to transfer the domain name into their
name.
The growth of trade relationships from the physical world into the digital one
today fosters a positive trading environment for players. However, some groups
have turned the Internet’s expansion into a site of dishonesty in addition to its
positive qualities. Famous brand names and domain names are being misused,
identified and represented through its trademarks. There has been a lot of
growing menace of cybersquatting. This document lays the foundation for anti-
media reports, statistical data, etc. (Hein Online, 2021) The words, images,
expressions, logos, or mottos that distinguish one company from another are known
as trademarks.
registering, purchasing, or using a domain name with the intention of profiting from
the generosity of another person’s existing brand name. It pertains to the practice
businesses with the intention of offering them at a profit to those legitimate owners
current and potential customers. Although there are related laws and international
structures in this way, some laws does not have a specific systematized method to
In Khal, et. Al, study in 2015, it was cited that understanding the
technological context that has allowed the problems outlined in the research study
IP address. A Domain Name System (DNS) is necessary for every web server in
addresses. These databases hold a database containing domain names and their
associated Internet Protocol (IP) addresses. The hierarchical nature of the DNS
2015)
Typo squatters are dependent on the assumption that people using the Internet will
type domain addresses incorrectly into the web browsers they use. Through these
names, which will negatively affect the original owner of a trademark. People will
be able to open the infringed versions of the authentic domain name. Some
Names and Numbers (“ICANN”) is responsible for managing and coordinating the
(“IP”) addresses and domain names. However, many domain name registries
located throughout the world are responsible for handling actual domain name
the key concerns in the different domain name disputes that have been brought
entitlement to make use of his own brand. In this way, the online squatter infringes
the trademark owner’s fundamental freedom to utilize the trademark. The domain
names which have been “squatted” are occasionally, however not constantly paid
for within the process for registration by the cybersquatters, which makes
names that draw in the public are adding to the problem caused by cybersquatting.
names, especially when the domain name ends up being utilized for a pornographic
website. The fact that more cybersquatting claims have been submitted with the
evidence of the nuisance that cybersquatting causes more today that the world is in
and individuals had only a little understanding of the broad spectrum of commercial
prospects that existed in the online realm. During this period, a subset of hackers
exploited the situation by engaging in the registration of domains under the guise
(Kapersky, 2023)
communication with the individual engaging in the practice and provide monetary
potential for constructing a legal argument against the individual occupying the
(Kapersky, 2023)
recognized and has been weakened due to the practice of domain squatting.
domain name with the purpose of encroaching upon the rights of, and
owner of a trademark.
trademark.
there exists a wide range of methods. It is worth noting that a majority of European
as well as the safeguarding of personal and trade names. This study presents an
cases involving deception in passing off actions. The realm of conflicts between
competing rights, including trademarks and personal and trade names, presents an
Finland, France, and Denmark, have deemed the matter critical and have
challenges arising from the endeavor to apply conventional legal rules, while
names that violate trademark rights. The confrontation between the accessibility of
cyberspace and the idea of territoriality gives rise to several challenges. Put
differently, there exists the possibility of a single domain name, such as xyz.com or
xyz.de, with 200 trademark registrations for the term “xyz” in 100 distinct nations,
each registered within different classes. These circumstances give rise to conflicts
between trademarks and domain names. Furthermore, it appears that trademark law
is inadequately equipped to address the issue of cyber squatters, and the judicial
the sale or provision of goods or services in order to establish and maintain legal
seeking protection for personal names, and exploring sui generis solutions. The
of countries that adhere to the common law and civil law legal systems. (Panton,
2013)
2.3 Synthesis
personality profile of a person, organization, business, good, or service. (Khan, et. Al,
2015) This means that image cannot be easily remembered without studiously crafting
one’s personality profile. The market for internet domain names is enormous. The globe is
seeing a major revolution in the area of communications, which has given internet residents
countless new options. The wide-ranging web has evolved into an effective instrument for
organizations to market, advertise, as well as sell products and solutions as a result of its
growing relevance. Unfortunately, cybersquatting, which results from dishonest and illegal
domain name squatting, is defined by the Cybercrime Prevention Act of 2012 as the
generating revenue by exploiting the goodwill of another person’s trademark. The cyber
squatter then makes an exorbitant offer to market the domain to the individual or business
that is the owner of the trademark associated with the name. The word originates from
without the owner’s, tenant’s, or other authorized user’s approval. The domain names
which have been “squatted” are occasionally, however not constantly paid for within the
process for registration by the cyber squatters, which makes cybersquatting somewhat
distinct. The costs cyber squatters typically want are much higher than the ones they
originally paid. Several cyber squatters post disparaging comments about the person or
business the domain is meant to symbolize in an attempt to persuade the target to purchase
the domain from them. Others monetize their squatting by posting sponsored connections
through ad networks to the real website that the user probably wanted.
expensive. This burdens the legal system and raises the cost to those who are affected. To
preserve intellectual property, uphold online trust, and promote a secure digital
CHAPTER III
METHODOLOGY
This chapter presents the research design, the sampling design, respondents’
statistical treatments used in order to establish reliable and pertinent study results.
qualitative and quantitative approaches, researchers aimed to delve deeply into the
exploration, enabling the researchers to triangulate data from diverse sources. Qualitative
data provided rich insights into students’ perceptions, motivations, and contextual factors
On the other hand, quantitative data pertaining to cybersquatting helped establish statistical
implications of this phenomenon. By combining these methods, the study could offer a
holistic view, bridging the qualitative nuances of student perceptions with the quantitative
data on cybersquatting’s tangible consequences, thus enriching the overall analysis and
In this approach, the research begins with qualitative data collection and analysis, followed
by quantitative data collection to explain or validate the initial qualitative findings. In this
study, researchers initially conduct qualitative surveys with Legal Studies students to
questions, researchers can gather rich qualitative data, capturing the nuances and
underlying reasons behind the students’ attitudes and beliefs regarding trademark
infringement. Qualitative methods allow for a deep exploration of the topic, uncovering
various perspectives and contextual factors that might influence students’ views.
Legal Studies students on cybersquatting and trademark infringement will provide valuable
insights into the qualitative data gathered. By utilizing this structured analytical framework,
researchers can systematically evaluate the content of the essay responses. This methodical
approach enhances the understanding of students’ perceptions and allows for tailored
After analyzing the qualitative data, the researchers can identify patterns, themes,
and hypotheses. To further validate and explain these qualitative findings, quantitative
methods can be employed. A structured, Likert-scale based survey designed to quantify the
prevalence of certain attitudes or beliefs identified during the qualitative phase, will be
relation to cybersquatting. The qualitative phase offers depth and context, while the
quantitative phase validates the qualitative findings on a larger scale, enhancing the study’s
The table below shows the variables and measures used in the study.
VARIABLES MEASURES
Perception of Legal Studies The researchers adapted questions from Khan et al.'s
students with trademark (2015) study, specifically tailored to explore a unique set
infringement. of questions to probe the respondents' perspectives on
cybersquatting and trademark infringement. These
questions were meticulously designed to delve into the
participants' views, shedding light on their perceptions
concerning the cybersquatting and trademark
infringement cases in the realm of cybercrimes.
Perception of the Legal Modified questions from Khan et al. (2015) that would
Studies students on their establish the effects of their familiarity on
familiarity with the cybersquatting and how it would affect their day to day
cybercrime of cybersquatting. online activities.
Perception of Legal Studies Modified questions from Khan et.al (2015) regarding the
students with the effect of trademark infringement in a cyber setting and lay out its
Cybersquatting under effects under Republic Act 10175.
Cybercrime Prevention Act of
2012.
situated at Governor’s Drive, Barangay Manggahan, City of General Trias, Cavite. The
university, established in June 2008, served as the backdrop for this study.
The participants selected for this research were students enrolled in the Legal
academic year 2023-2024. The researchers gathered information from the College of
Liberal Arts and Education (CLAE) and LPU Legal Studies Society (LLSS) indicating that
the Legal Studies program comprised 67 students, both male and female, excluding the
researchers themselves.
These students were chosen as respondents due to their relevance to the study’s
subject matter, aligning with their course of study. Furthermore, their age group represents
seventy percent of the Philippine population. Moreover, they possess diverse knowledge
technological advancements.
For this study on the perceptions of Legal Studies students regarding cybersquatting
and trademark infringement, a stratified random sampling method will be employed. The
University-Cavite Campus during the academic year 2023-2024. The students will be
divided into strata based on their familiarity and experience with online activities and
intellectual property issues, which are directly relevant to the study on trademark
The stratification will take place by dividing the 67 Legal Studies students into
strata based on their level of engagement with online activities, such as social media usage,
online shopping, blogging, or website ownership. This division ensures that participants
have varying degrees of exposure to the online environment, where issues like
Stratum 1: Students actively engaged in online activities (e.g., frequent social media
Stratum 3: Students with minimal online activity (e.g., infrequent internet users, limited
For the survey administration, the researchers will administer the survey
questionnaire to the randomly selected students within each stratum. The questionnaire will
Then the researchers will analyze the survey responses to draw conclusions about the
infringement. Ensure the findings are representative of the entire Legal Studies student
population by accounting for the stratified sampling method during the analysis.
By stratifying the students based on their online activities and intellectual property
awareness, you ensure that the sampled participants represent diverse backgrounds and
on the Likert scale and open-ended inquiries. These questions were fashioned based on
themes explored in the study conducted by Khan et al. (2015). These themes encompassed
under the Cybercrime Prevention Act of 2012. To mitigate bias, the researchers
Prior to survey administration, the researchers diligently sought approval from the
Dean of the College of Liberal Arts and Education, formally addressing this request
through a letter. Upon securing consent, the survey was administered to the participants.
agreement to partake and acknowledging that their responses would be subject to the Data
Likert scale-based queries, and subsequent open-ended questions. These elements were
steps:
3. Obtain approval to conduct the study through a formal letter signed by the Dean
4. To gather data, two distinct methods were employed. The first method involved
data mining, wherein the researchers explored various sources such as research
survey method involved setting study objectives, selecting a suitable survey frame,
5. The researchers will personally collect the completed survey questionnaires from
the participants.
6. Subsequent to the collection phase, the researchers will collate and analyze the
gathered data. They will collaborate with a statistician and utilize XLSTAT in
count, mean, percentage, rank, and standard deviation. Additionally, the responses
quantitative data to evaluate the perceptions of Legal Studies students regarding the
To gauge these perceptions accurately, a refined 4-point Likert Scale was utilized.
This scale allowed participants to express their opinions clearly, with each point
representing a distinct viewpoint on the topic. The Likert scale encompassed responses
ranging from “strongly agree” to “strongly disagree,” ensuring a forced choice of opinion
and preventing neutral responses. This structured approach enabled a meticulous analysis
providing valuable insights into their perspectives on trademark infringement within the
digital realm.
enhancing the depth and breadth of the data analysis and statistical treatment. By
understanding of Legal Studies students’ perceptions, enriching the study’s findings and
implications.
REFERENCES
Berman, P. (1978). “The Study of Macro- and Micro-Implementation.” Public Policy 26,
no. 2: 157-84.
Bernat, F. P., & Makin, D. (2014). Cybercrime Theory and Discerning if there is a Crime:
The Case of Digital Piracy. International Review of Modern Sociology, 40(2), 99–
119. http://www.jstor.org/stable/43499904
Bhusari, R., & Rampure, K. (2022, January 15). Cybersquatting: A Threat To The
Globalising World. Indian Journal of Law and Legal Research, 3(2). https://doi-
ds.org/doilink/01.2022-68535724/IJLLR/V3/I2/A221
Cabel, K. (2015). Combating Cybercrime in the Philippines. United Nations Asia and Far
http://www.unafei.or.jp/english/pdf/RS_No97/No97_IP_Philippines.pdf
Dizon, D., (2008, September 13). Cybersquatting cases in RP rising. ABS-CBN News.
https://news.abs-cbn.com/features/09/11/08/cybersquatting-cases-rp-rising
Domingo, F. (2016). Strategic Considerations for Philippine Cyber Security. ADR Institute
http://www.academia.edu/20823505/Strategic_Considerations_for_Philippine_Cy
ber_Security.
https://heinonline.org/HOL/LandingPage?handle=hein.journals/ijlmhs13&div=73
&id=&page=
Ivankova, N. V., Creswell, J. W., & Stick, S. L. (2006, February). Using Mixed-Methods
20. https://doi.org/10.1177/1525822x05282260
http://www.jstor.org/stable/3700093
safety/cybersquatting
safety/cybersquatting
Krisa, J. (2013, March 19) Review of Related Literature on Cybersquatting. Jamelle Krisa
https://ssrn.com/abstract=1484763
Lipsky, M. (1980). Street level bureaucracy: Dilemmas of the Individual in Public Service.
https://www.techinasia.com/domain-squatting-controversy-rocks-ecommerce-
startup-scene-philippines
http://orion.luc.edu/~rmatlan/pdf/1995SynthesizingtheImplementationLiterature.p
df.
Theory, 5:02:145-174.
Mazmanian, D., and Sabatier, P. (1984). “Implementation and Public Policy,” Policy
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2427582
Petrosyan, A. (2022, December 13). Cybersquatting: most domain name dispute filings
https://www.statista.com/statistics/416159/domain-name-cases-filings-wipo/
Rodriguez, A., (2012, February 5). Cybersquatters Face Serious Sentences in the
https://realtimeregister.com/blog/cybersquatters-face-serious-sentences-in-the-
philippines/
Rupal, P. (2019, July 6). Jaiswal Symbisosis Law School. Volume 6. The Web of
Cybersquatting. http://penalclaims.com/wp-content/uploads/2019/07/Rupal-
Jaiswal
Saydjari, O. Sami. (2008) “Structuring for Strategic Cyber Defense: A Cyber Manhattan
12).
Shackelford, Scott, Scott Russell, and Jeffrey H. (2015) Bottoms Up: A Comparison of
Journal.
Sosa, Gilbert. (2015). Country Report On Cybercrime: The Philippines. The Criminal
Senate and House of Representatives of the Philippines. (2012, September 12). Republic
Act No. 10175. Official Gazette. Retrieved September 17, 2023, from
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
Khurana And Khurana Advocates and IP Attorneys. Retrieved September 17, 2023,
from https://www.khuranaandkhurana.com/2021/12/16/cybersquatting-regulatory-
mechanisms/
Stella, J., & Kumari, A. (2022, March). Cyber Squatting – The Digital Version of Passing
content/uploads/2022/03/Jenifer-Stella-S-JLSR-1.pdf.
Timans, R., Wouters, P., & Heilbron, J. (2019). Mixed methods research: what it is and
http://www.jstor.org/stable/45200451
Van, M., Donald S., Carl E., and Van H. (1975). “The Policy Implementation Process: A
Villanueva, V. (2021, December 5). R.A. No. 10175: The Cybercrime Prevention Act: The
https://legalresearchph.com/2021/12/05/r-a-no-10175-the-cybercrime-prevention-
act-the-net-commandments/
World Intellectual Property Organization. (n.d.). WIPO Guide to the Uniform Domain
Name Dispute Resolution Policy (UDRP). WIPO. Retrieved September 17, 2023,
from https://www.wipo.int/amc/en/domains/guide/