Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 27

Impact of Modern Technology in Relation to R.A.

10173 Act of 2012 for the Students of

CELTECH College
Chapter 1

The Problem and Its Setting

Introduction

“It used to be expensive to make things public and cheap to make them private. Now it’s

expensive to make things private and cheap to make them public.”

- Clay Shirky

The quote captures how the digital age has fundamentally changed the interplay of

privacy and publicity. Before digital technologies were widely used, releasing information

needed a lot of work, resources, and occasionally even official channels like media outlets or

publishing organizations. On the other hand, preserving privacy was usually simple and

affordable, depending on tangible methods like closed doors, filing cabinets, or private

discussions.

But things have radically changed with the advent of social media, the internet, and

digital communication platforms. Public information sharing is now very simple and affordable.

Content can be instantaneously published online by anybody with an internet connection,

potentially reaching a global audience for little to no cost. Social media platforms have

democratized the flow of information by making it incredibly easy for anyone to share their

ideas, experiences, and works of art.

The Republic Act No. 10173 or the Data Privacy Act of 2012 it is an act protecting an

individual information in Information and Communication System (ICS) in the government and

the private sector, creating for this purpose a National Privacy Commission (NPC), and for other
purpose. On the section 2 of the law, it is the policy of the State to protect the fundamental

human right of privacy, of communication while ensuring free flow of information to promote

innovation and growth. The State recognizes the vital role of information and communications

technology in nation-building and its inherent obligation to ensure that personal information in

information and communications systems in the government and in the private sector are secured

and protected.

The development of technology has made our lives easier, more productive, and more

connected. Between cell phones, virtual reality, and artificial intelligence, technology has made

numerous positive advancements that have changed how we interact with one another and the

environment. The impacts of technology on society haven't always been positive, though. It has

numerous positive advantages, but it has also caused negative side effects that need to be

managed. Cyberbullying, privacy invasion, and technological dependency are a few of the

detrimental effects of technology on society. Concerns about job losses and the rising wealth gap

have been raised by the growing use of technology and artificial intelligence (Watts, 2023).

The rate at which technology has advanced in the previous few decades has been

astounding. Numerous innovations such as cloud computing, smartphones, and the internet are

revolutionizing every aspect of our life. Affected industries include business, government,

fundraising, tourism, and even agriculture and communication (Walden, 2024).

Cybersecurity and privacy are only two of the many areas of our life that technology has

profoundly impacted. The proliferation of digital devices and the internet have facilitated

information sharing and access for both individuals and companies. But there are also additional

privacy and security issues as a result of this greater connectedness. This article will examine the
ways in which technology has impacted cybersecurity and privacy as well as the precautions that

can be done to ward against such dangers (Fast Facts 101, 2023).

A major consequence of technology on privacy is the abundance of personal data that is

being gathered, saved, and exchanged online. People are voluntarily disclosing personal

information, including name, address, phone number, and credit card information, as a result of

the rising usage of social media, online shopping, and other digital platforms. Companies then

use this data for data mining, targeted advertising, and other uses. The issue is that hackers and

other bad actors may also obtain this sensitive data and utilize it for identity theft, fraud, and

other crimes.

One of the central themes of the Philippine Development Plan 2023–2028 is digital

transformation. In his second State of the Nation Address (SONA), President Marcos ordered the

digitization of all vital public services by all government institutions. More common tower

infrastructures are being built in an effort to improve connectivity; local governments' business

registration procedures are being digitalized; online government services are being integrated

into a single platform through the eGov PH Super App; the national broadband plan is being

implemented to enhance internet and mobile services; and the Cloud First Policy, which

encourages the use of cloud computing technology for public service delivery and government

administration, is being carried out. The government of the Philippines also strongly encourages

and supports MSMEs (micro, small, and medium-sized firms) to embrace innovation and

digitalization.

Based on the statement mention above from the different reports, studies, and editorial.

The researchers aim to investigate the compliance of CELTECH college students and staffs in

Republic Act 10173.


Theoretical Framework

In investigating the effects of modern technology in compliance with the R.A. 10173 of

CELTECH College, the researcher can use Technology Acceptance Model (TAM). According to

Curley (1984) Information technology adoption and utilization can have both short- and long-

term positive effects on individuals and organizations, including increased productivity, cost and

time savings, and convenience.

The Technology Acceptance Model (TAM) is a popular theoretical framework for

researching how users accept and adopt new technology. It could be used to assess how students

behave and think about different digital tools and platforms, as well as how effectively they

follow data privacy laws. Through evaluating elements like perceived utility, usability, and

privacy concerns, researchers can learn more about how students engage with contemporary

technology and how eager they are to follow data privacy regulations.

The study's findings might be effectively described by using the Technology Acceptance

Model (TAM), which looks at students' and staffs’ of CELTECH College attitudes and behaviors

about the usage of modern technology as well as their adherence to R.A. Act No. 10173, 2012.

According to TAM, people are more willing to embrace and use technology if they

believe it will help them achieve their objectives. Within the framework of the study, researchers

can evaluate how valuable students think different digital tools and platforms are for both

personal and academic goals. Students might view social media platforms as helpful for

information sharing and social networking, but they might view online learning platforms as

helpful for peer collaboration and access to course resources. Knowing how valuable students
think technology is can help us understand why they use it and whether or not they are prepared

to abide by data privacy laws when utilizing it.

Conceptual Framework

In this study, the researchers will use the Input-Process-Output research paradigm to

discuss the process of the study. In the input part, the researchers will collect the demographic

profile of the respondents for both students and staff of CELTECH College. In the process part,

the researcher will use survey questionnaire to collect all the necessary data needed to answer the

questions and achieve the objective of the study. The researchers will also use appropriate

statistical tool to ensure the validity and reliability of the results. The output of this study is to

identify the compliance of the students and staffs of CELTECH College in R.A. 10173.

Input Process Output

Demographic Profile
Students
- Sex
- Year level
- Gadget use
Survey Questionnaire
- Social Media Compliance of
CELTECH Staff CELTECH Students
Statistical Treatment
- Sex and Staff to R.A.
- Age 10173
Data Analysis
- Department
- Years in
service
- Gadget use
- Socia media

Figure 1. Paradigm of the Study


Statement of the Problem

This study aims to investigate the compliance of the students and staffs of CELTECH

College in R.A. 10173 in securing the privacy of the records of the students. Specifically, it

sought to answer the following questions;

Demographic Profile

1. How may the students be describe in terms of ;

a. Sex

b. Year level

c. Gadget use

d. Social media application

2. How may the staff be describe in terms of;

a. Age

b. Sex

c. Years in service

d. Department

e. Gadget use

f. Social media application

3. How may the respondents be described their compliance with R.A. 10173 in terms of;

a. Securing the grades

b. Securing the personal information

4. How may the respondents describe their awareness on R.A. 10173?

5. Based on the result of the study, how may CELTECH improve its data privacy?
Significance of the Study

The study's significance stems from its potential to provide valuable insights for future

research endeavors in this area as well as to inform policies, practices, and educational

interventions aimed at improving data privacy awareness, protection, and compliance among

students, staff, and administrators within the educational institution. The result of this study may

benefit the following;

Students. Students who are aware of how modern technology affects data privacy rights will be

more equipped to choose their online activities and privacy settings. Students' knowledge of the

value of protecting their personal data and adhering to data privacy laws may be increased as a

result of the study. The study can help improve students' data privacy protections and lessen their

susceptibility to identity theft and privacy violations by identifying potential dangers and

weaknesses in students' digital activities.

Staff. The findings of the research can guide staff members' professional development programs,

giving them the information and abilities, they need to help students use digital technology in a

responsible and safe manner. The results can be used by staff members in charge of data

management and technology integration to guarantee adherence to data privacy laws and put best

practices for safeguarding sensitive data into action.

Administration. The study can help with the creation of institutional rules and regulations

around cybersecurity, data privacy, and technology use in educational settings. Administrators

have the authority to designate funds for enhancing infrastructure, bolstering security protocols,

and launching instructional programs designed to encourage staff and students to comply with

data privacy laws.


Future Researchers. This work can be used as a starting point for further research on data

privacy concerns in educational environments, giving rise to comparative analyses and long-term

studies. By using the study's methods and results, researchers can create and carry out

comparable studies with different populations or in different circumstances, advancing our

understanding of data privacy and technology use.

Definition of Terms

Data Privacy. The security and administration of personal data to guarantee its confidentiality,

integrity, and proper usage is referred to as data privacy. It includes steps to limit access to

private information, protect it from misuse or unauthorized disclosure, and adhere to applicable

laws and rules, such R.A. Act No. 10173, 2012.

Technology. Technology is the practical application of scientific knowledge, instruments, and

methods; it is especially used in the creation, development, and use of tools, systems, and

processes that help people carry out their daily tasks and find solutions to issues.

Identity Theft. The illegal acquisition, use, or exploitation of another person's financial or

personal information for the purpose of fraud, deception, or other illegal acts is referred to as

identity theft. It entails taking on a persona in order to access their accounts, get credit or other

financial advantages, or carry out illicit activities.

Cyber Security. Cybersecurity refers to the practice of protecting computer systems, networks,

and data from unauthorized access, cyberattacks, and other security threats. It involves

implementing measures to prevent, detect, and respond to malicious activities that could

compromise the confidentiality, integrity, or availability of information.


Social Media. Social media refers to online platforms and applications that enable users to

create, share, and interact with content, as well as connect with other users across digital

networks. It encompasses various forms of user-generated content, communication channels, and

social networking features.


Chapter 2

Review of Related Literature and Studies

In the digital age, where personal information is increasingly vulnerable to malicious activities,
identity theft has become a prevalent and damaging crime. In terms of criminal growth,
Cybercrime is the largest industry worldwide. Cybercrime is the word used to describe any
illegal conduct involving a computer, network, or device. Some Cybercrime are carried out to
make money for the perpetrators; others are committed against computers directly to damage or
render them inoperable; others use computers or networks to disseminate malware, illegal data,
images, or other information (Alalwan, 2018).

As individuals use technology for business and leisure, cybercrimes such as child
pornography, hacking, and software piracy will only increase (Willits & Nowacki, 2016). The
more individuals use the internet, the more people will become cybercrime victims due to the
cyber criminals' ability to target individuals and businesses online (Horsman, 2017). By
investigating the strategies employed, understanding the challenges faced, and evaluating the
overall efficacy of these measures, this research seeks to provide comprehensive insights into the
complex landscape of identity theft prevention.

Identity theft is a serious crime with far-reaching consequences for its victims. The
financial losses incurred are often accompanied by profound emotional distress. In this digital
era, where personal and financial information is readily accessible online, the risk of
unauthorized access and fraudulent use of data has escalated dramatically. Law enforcement
agencies stand as guardians against this escalating threat. By investigating these crimes,
apprehending criminals, and assisting victims in reclaiming their identities, law enforcement
plays a pivotal role in combating identity theft.

The prevalence of identity theft in our increasingly digital society cannot be


underestimated. It has become a widespread concern, not only for individuals but also for
businesses and governments. As the digital world constantly evolves, it brings both opportunities
and challenges. The internet, which was initially envisioned as a tool to improve our everyday
lives, has transformed into a massive part of society, enabling efficiency and simplicity in day-to-
day activities, (Mitek, 2022). This has led to severe consequences for internet and electronic
users due to criminals exploiting what was initially progressive. Understanding extensive safety
measures in the technological age allows citizens to feel at ease in their daily commercial and
financial activities. Nevertheless, in all its forms, identity theft robs individuals of their ability to
control events in their lives. The exposure of valuable information to criminals puts law-abiding
citizens constantly at risk.

Identity theft is becoming increasingly frequent in the era of digital technology, and it
poses serious hazards to both individuals and businesses. In response to this growing concern,
the Anti-Cybercrime Group has taken proactive measures to prevent and mitigate the effects of
Cybercrime. This study examines the efficacy of these preventive measures and examines the
strategies employed by the Anti-Cybercrime Group and their ability to reduce the prevalence of
identity theft. The purpose of this study is to shed light on the practicality and effectiveness of
the Anti-Cybercrime Group's efforts to safeguard individuals and organizations against the
pervasive threat of identity theft. It accomplishes this by highlighting key findings from a
relevant study that was published in the Journal of Cybersecurity.

Identity theft is a major issue in an era where digital connectivity is the norm,
necessitating strong defenses against its cunning ubiquity. The Anti-Cybercrime Group has put
preventive measures in place to tackle the growing threat of identity theft incidents. This essay
examines these tactics critically. By deeply examining contemporary cyber threats, as outlined in
the research article "Cybersecurity Challenges in the 21st Century" published in the International
Journal of Information Security, this study seeks to evaluate the efficacy of the Anti-Cybercrime
Group's initiatives. By providing practical experiences, this investigation aims to provide light on
the effectiveness of the preventive measures put in place, ultimately contributing to the ongoing
discussion on safeguarding our digital surroundings from the dynamic technology.

Like underdeveloped nations in Southeast Asia and other areas of the world, the
Philippines continues to struggle to adequately handle the issue of criminal cyber activity and
cybercrime victims. Due to a lack of preventative measures and, in certain circumstances, a lack
of awareness of the hazards associated with its abuse, it is anticipated that as technology grows
and develops throughout the nation's industries and sectors, its usage will rise (SecureAsia,
2013).

Websites and programs that prioritize collaboration, content sharing, community


participation, communication, and engagement are referred to as social media. Social media is
used by people to communicate and engage with friends, family, and other communities. Social
media apps are used by businesses to track consumer complaints and market and promote their
products.

As per Dollarhide (2023), social media encompasses an array of tools that enable people
to share ideas and information. Approximately 60% of the global population, or over 4.7 billion
individuals, utilize social media, including Facebook, Instagram, YouTube, and X platform
(previously Twitter). Early in 2023, 94.8% of users visited websites and apps for chat and
messaging, with social media platforms coming in second with 94.6% of users.

The phrase "social media" refers to websites and applications that individuals may use to
post personal material. Anyone can reply to material posted by others on social media. Images,
text, responses to or comments on other people's postings, and informational links can all fall
under this category. Many people use social media platforms to connect with new people or
remain in contact with old ones through online sharing. And compared to other age groups, that
could be more crucial for teens. Friendships play an important part in shaping a teen's identity
and in making them feel supported. It seems sense, then, to be curious about the potential effects
of teen social media use (Mayo Clinic, 2024).

A 2022 survey of 13- to 17-year-olds offers a clue. Based on about 1,300 responses, the
survey found that 35% of teens use at least one of five social media platforms more than several
times a day. The five social media platforms are: YouTube, TikTok, Facebook, Instagram and
Snapchat.

As stated by Forgeard (2021) on her social media blog Brilliantio, social media has
become a big part of every individual life. It has become the most useful means of
communication for many from far places. Because of social media, it is now possible to have
access to different aspects of life.
Teens may establish social networks, communicate with others, and construct online
personas thanks to social media. Teens who use these networks might get help from those who
share their interests or life experiences. This kind of support may be especially helpful for
teenagers who: 1) Are lonely or lack offline social support; 2) Are going through a difficult
period; 3) Belong to marginalized groups, such as the LGBTQ community, racial minorities, and
people with disabilities; and 4) Have chronic medical conditions (Mayo Clinic, 2024).

In the present digital era, our way of life has undergone a significant transformation.
Ordinary people can now accomplish feats that were previously unimaginable. With society's
increasing reliance on computers, the Internet has swiftly become an integral part of millions of
people's lives. Email, websites, and various IT solutions are now accessible anytime and
anywhere, benefiting humanity. While the Internet brings numerous positive social impacts, it
also equips criminals with advanced and highly sophisticated technological tools. To prevent
involvement in or unintentional support of illegal and punishable activities, individuals need to
be educated about the extent and limitations of cybercrime. (Toso, S., et al., 2023) As a
consequence, policymakers, law enforcement agencies, and international organizations are
grappling with new challenges arising from the ever-evolving forms of cybercrime (Stansberry
and Anderson, 2019).

The primary effect of cybercrime is financial. Cybercrime can include many different
types of profit-driven criminal activity, including ransomware attacks, email and internet fraud,
identity fraud, and attempts to steal financial account, credit card, or other payment card
information. Cybercriminals might target an individual's private information or corporate data.
While most cybercriminals use cybercrimes to generate a profit, some cybercrimes are carried
out against computers or devices to directly damage or disable them. Others use computers or
networks to spread malware, illegal information (Brush, 2023).

Cybercrime is classified by the U.S. Department of Justice (DOJ) into three categories: 1)
crimes where the computer device is the target, such as when it's used to obtain network access;
2) crimes where the computer is used as a weapon, such as when a denial-of-service (DoS) attack
is launched; and 3) crimes where the computer is used as an accessory to a crime, such as when
it's used to store illegally obtained data. The United States is a signatory to the Council of Europe
Convention on Cybercrime, which defines cybercrime as a broad variety of hostile acts, such as
unauthorized data interception, system interferences that jeopardize network integrity,
availability violations, and copyright infringements.

Criminal action that involves the intentional use or targeting of a computer, computer
network, or networked device is known as cybercrime. Hackers or cybercriminals looking to
profit from their crimes commit the majority of cybercrime. On occasion, though, cybercrime
seeks to harm networks or systems for purposes other than financial gain. They might be
personal or political. Cybercrime is committed by both individuals and groups. Some
cybercriminals are quite proficient technically, well-organized, and employ cutting-edge
methods. Some are inexperienced hackers (Kaspersky, 2023).

A minimum of 422 million people were affected by cybercrime, according to FBI online
crime data, which includes 800,944 complaints filed in 2022. In 2023, there will be breaches into
about 33 billion accounts, with an estimated $8 trillion in losses.

Palatty (2023) says that 33 billion accounts would be compromised in 2023, translating to
2328 daily victims and 97 victims of cybercrime per hour. 8,00,000 cyberattacks have been
reported in total; a hacker assault occurs every 39 seconds on average. It's estimated that 2328
cybercrimes happen per day. Cybercrime has claimed the lives of at least 6.5 million people in
the previous 21 years, from 2001 to 2021, with an estimated cost of approximately $26 billion
throughout that time.

As of July 2023, Malaysia reached the highest score on the National Cyber Security
Index among countries in the Asia-Pacific region, 79.22 out of 100. In contrast, Myanmar
received 10.39 index points, the lowest score across APAC (Kameke, 2023).

In early 2023, there was a breach in a database that included over a million police records
and almost 800 terabytes of personal information of applicants and staff of the Philippine law
enforcement agency. This was just one of the several instances of data breaches that have been
reported in the nation in recent years as it adopts digital banking technology and advances
toward digitalizing services. Similar cyber instances have been documented, particularly during
the COVID-19 pandemic's peak, when a greater proportion of Filipinos turned to the internet for
both necessary and non-essential buying. Even if there were fewer occurrences recorded after the
pandemic, precautions still need to be taken to protect users' and companies' online safety from
criminal activity (Statistica Research Department, 2023).

It was predicted that between 2023 and 2028, the Philippines' cybersecurity market will
generate 178 million U.S. dollars in sales, a growth of 85.11 percent. The indicator is predicted
to reach 387.11 million US dollars, a new top in 2028, following the ninth year of increases.
Notably, throughout the previous years, the cybersecurity market's revenue has been steadily
rising.

An essential component of electronic payment systems is security. Identity theft has been

a big worry for both payment providers and consumers in the recent past due to its extensive

media coverage. The impact of identity theft on consumers' payment preferences is still up for

debate (Khan, 2012).

Identity theft happens when someone steals someone else's personal information and uses

it for their own gain (Cullen, 2007). Every year, nine million new identity theft instances are

recorded. Unreported cases or cases where the victim is unaware of the incident occur far more

frequently. Identity theft can affect anyone who has a Social Security number (Sharp, Shreve-

Neiger, Fremouw, Kane, & Hutton, 2004). For instance, the Office of the Florida Attorney

General (2008) estimates that 500,000 children in the United States fall victim to identity theft

each year, with child identity theft cases increasing at a faster rate than any other category

(Cullen, 2007). Theftsters may utilize a child's identity, just like they do with adult victims, to

open credit accounts, get loans, and get jobs (California Office of Privacy Protection, 2006).

Subcategories of identity theft related to finances, health, and character are identified by

Schmidt and McCoy (2005). Theft of personal financial data, including bank and credit account

details, is known as financial identity theft. It is possible to create accounts in the victim's name
using this information. According to the Identity Theft Resource Center (2007), financial identity

theft is the kind of identity theft that is most frequently reported.

An estimated 1.5 million Americans have been victims of medical identity theft, which

happens when someone uses the victim's personal information to get medical advantages

including insurance or medical treatment (Poneomon, 2011; Schmidt & McCoy, 2005).

Because there aren't any laws that particularly target medical identity theft, Sullivan

(2009) claims that it is more difficult to recover from than financial identity theft. Financial

ramifications might result from medical identity theft. For instance, a victim may get a charge for

a medical service they never received or their insurance provider may refuse to pay them because

they have hit their benefit cap (Federal Trade Commission, 2010).

Potential treatment repercussions could result from the identity thief's medical records

being mixed with the victim's. For instance, the victim's medical records can contain the blood

type of the identity thief (Engeler, 2012). If the victim needed blood, this blood type might not be

compatible with their blood type, which could lead to major health issues. This is significant

because it is possible for children's identities to be misused falsely for health-related reasons.

Giving someone else's personal information for other reasons, like avoiding having an

arrest record in one's own name, is known as character identity theft (Schmidt & McCoy, 2005).

Identity thieves may cause crimes that lead to the issuance of an arrest warrant in the victim's

name and the victim being imprisoned for a crime they did not commit (Redford, n.d.). The

implications of character identity theft include housing and job denials. In one instance, the

victim's character identification persisted as an issue even after five years (Sullivan, 2003).
Prevention is a collection of actions that assist halt identity theft before it is
recognized as suspicious or to build barriers to committing IDT. It is frequently used to stop
fraud from happening (Shah, 2016).

Cybercrime impacts both consumers and sellers and is becoming a major worry for
nations at all developmental stages. Although 156 nations (80%) have passed cybercrime laws,
the adoption rate differs by continent, with Europe having the greatest rate (91%) and Africa
having the lowest (72%). Law enforcement organizations and prosecutors have a serious problem
in light of the changing Cybercrime landscape and the ensuing skills gaps, particularly in cross-
border enforcement (UNCTAD, 2021).

Everyone is impacted by Cybercrime, both as people and as a nation. On the one hand,
social connections, banking, shopping, and other elements of our lives have all been made
simpler by modern technologies. However, the more we rely on the Internet, the greater the
hazards and the more avenues for criminal activities it opens to everyone (Interpol, 2019).

In the Philippines, Cybercrime Prevention Act of 2012 or the ACT DEFINING


CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION
AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES states
that The State recognizes the vital role of information and communications industries such as
content production, telecommunications, broadcasting electronic commerce, and data processing,
in the nation’s overall social and economic development. The State also recognizes the
importance of providing an environment conducive to the development, acceleration, and
rational application and exploitation of information and communications technology (ICT) to
attain free, easy, and intelligible access to exchange and/or delivery of information; and the need
to protect and safeguard the integrity of computer, computer and communications systems,
networks, and databases, and the confidentiality, integrity, and availability of information and
data stored therein, from all forms of misuse, abuse, and illegal access by making punishable
under the law such conduct or conducts. In this light, the State shall adopt sufficient powers to
effectively prevent and combat such offenses by facilitating their detection, investigation, and
prosecution at both the domestic and international levels, and by providing arrangements for fast
and reliable international cooperation.
Identity theft and using a stolen identity for identity fraud are the hallmark crimes of the
information age. Amer. Identity theft is "the greatest threat to consumers today," according to
Secretary of Treasury John Snow, because it "...attacks the trust and confidence that nurture our
open economy, even as it destroys individual lives" (Snow, 2003). Based on research conducted
by the U.S. According to the Federal Trade Commission, over a five-year period, 12% of
Americans reported having experienced identity theft. 6.5% of adult Canadians said they have
fallen victim to identity theft in a single year. The victims in Canada had to pay $150 million out
of pocket, and it took 20 million hours to repair the damage (Sproule and Archer 2008).

Three parties can be considered accountable for preventing identity theft: the
individuals who supply the information, the organizations—such as corporations and
governments—that gather and utilize the data, and the governmental bodies—such as national
and local governments—that enact laws governing the processing of personal data. For instance,
the Organization for Economic Cooperation and Development, or OECD, places a strong
emphasis on regulation and advocates for the standardization of statistics and definitions, the
passage of laws to give victims legal recourse, and the enforcement and deterrence of laws
against those who commit crimes (OECD 2009).

The California Privacy Law (SB1 3 86) and the Personal Information Protection
and Electronic Documents Act (PIPEDA) in Canada are two examples of exemplary laws.
Conversely, the Ontario privacy commissioner emphasizes the significance of the role that
organizations play in safeguarding personal data, cites 15 instances of significant data breaches
in organizations in a single year (2005), and advocates for the mandatory reporting of data
breaches as well as increased organizational use of physical controls and data encryption
(Cavoukian 2005). But even with all the efforts made by groups and lawmakers, it is still the
consumer's responsibility to secure personal information. Governments and businesses'
preventative efforts can be undone by consumers' carelessness or lack of attention, which
includes things like not protecting passwords, throwing away identity information in regular
trash, not securing regular mail or access to personal laptops, or reacting to "phishing" attacks.
These organizations have promoted consumer education on fraud and identity theft because they
acknowledge this reality.
The Federal Trade Commission's 'Fighting Back Against Identity Theft' website is
one example of an educational resource, as are the publications "Take Charge: Fighting Back
Against Identity Theft" (FTC 2006), "Consumer Identity Theft Kit" (Consumer Measures
Committee 2007), "Identity Theft and You" (Office of the Privacy Commissioner of Canada
2009), and "Reduce Your Roaming Risks" pamphlet (BMO 2006).

There have been suggestions that identity cards can reduce identity fraud,
including credit card fraud. In actuality, however, this has not been the case, with the financial
and privacy costs having surpassed the gains (Jackson and Ligerwood 2006). In the end,
biometric measures might make identity theft more difficult, but in addition to the reliability and
cost issues that exist today, different biometric technologies have inherent problems with
universality, distinctiveness, permanence, collectability, performance, acceptability, and
resistance to circumvention (Institute for Prospective Technological Studies, 2005).

Moreover, these procedures do not apply to everyone. The use of biometric screening at
ATMs (Automated Teller Machines) will not stop people from dumpster diving for personal
information. Customers will continue to be essential in preventing identity theft and spotting
identity fraud in the future. They must exercise caution. Legislation and technological solutions
alone cannot stop identity theft and fraud in the absence of a coordinated customer education
program (Williams 2008).

In order to guarantee adherence to privacy and data protection rights, the


Philippines passed the Data Privacy Act of 2012, which intends to safeguard personal data and
establish the National Privacy Commission (NPC). After being appointed, the NPC has ninety
days to create implementing rules and regulations (IRRs). In the Philippines, identity theft
prevention and mitigation strategies include phishing attacks. Businesses have faced difficulties
adhering to the law as a result of the Data Privacy Act's delayed enforcement resulting from the
NPC's tardy appointment. Factors including general deterrence, the validity of rules, and the e-
commerce act affect compliance with the Data Privacy Act. Technologies like the Mobile
Automated Fingerprint Identification System (MAFIS) and secure networks like Virtual Private
Networks (VPNs) have been implemented by Philippine law enforcement agencies, such as the
Philippine National Police (PNP), to improve crime prevention and guarantee the security of
sensitive information.

Chapter 3

Research Method and Procedure

Research Design

In this study, the researchers will use a Quantitative Research Design. According to

Bansil (2019) quantitative descriptive research design is a type of research methodology that

aims to systematically describe and summarize characteristics, behaviors, attitudes, or

phenomena within a population. This approach involves collecting numerical data through

structured instruments, such as surveys or questionnaires, and analyzing the data using statistical

techniques to generate descriptive statistics. A quantitative descriptive research design can be

effectively utilized in this study to provide a comprehensive overview of students' and staffs’

attitudes, behaviors, and perceptions related to modern technology use and data privacy

compliance at CELTECH College.

Participants

In this study the researcher will use the students and staffs of CELTECH College as their

participants. The researcher will describe the compliance of both students and staffs of

CELTECH college with regard to R.A. 10173 or the Data Privacy Act of 2012. The students

must be a Criminology students enrolled in CELTECH in the academic year 2023-2024


regardless of the age, sex, and year level. In terms of the staffs, the participants must be at least

one year in service regardless of their age, sex, and department.

Research Instrument

The researchers will use a survey questionnaire in gathering the data from the

participants. The instruments has the following parts.

Part 1. The profile of the respondents.

For the students, the participants will describe their sex, year level, gadget use, and social

media application use.

For the staffs, the participants will describe their sex, age, years in service, department,

gadget use, and social media use.

Part 2. The participants will describe their compliance with R.A. 10173 in terms of securing the

grades and securing the information of the students. A 4-Point Likert Scale will use.

Part 3. The participants will describe their awareness with R.A. 10173.

Locale of the study

This study will be conducted at CELTECH College located at the Capital City of San

Fernando, Pampanga. The Institution is offering B.S. Criminology.

Data Gathering Procedure

In gathering the needed information in this study, the researchers will follow procedures

and protocol.
First the researchers need to secure a letter to the researcher adviser, teacher, and

Department head asking permission to conduct the study. Once approved, the researchers will

send a consent letter to the participants asking their willingness to participate in the study. The

consent letter include the objective of the study and the assurance of the privacy of the identity of

the participants.

Once the participants agreed to participate, they will be given a survey questionnaire.

After the participants done answering the questionnaire, it will be collected and subject for data

analysis and interpretation.

After analyzing and interpreting the data, the survey questionnaire will be burn by the

researchers to ensure the safety of the identity of the participants. There will also reporting of the

results to the participants after the conduct of the study.


References

Anderson, K. B. (2013). Consumer Fraud in the United States, 2011: The Third FTC Survey.
Washington, DC: Federal Trade Commission.

Ashton, M. C., and Lee, K. (2008). The prediction of honesty–humility-related criteria by the
HEXACO and five-factor models of personality. J. Res. Pers. 42, 1216–1228. doi:
10.1016/j.jrp.2008.03.006

BMO (2006), "Reduce Your Roaming Risks: A Portable Privacy Primer",


http://www.ipc.on.ca/images/Resources/up-bmo ipc priv.pdf

Brush (2023) Cybercrime. TechTarget.com

Carcach, C., Graycar, A., and Muscat, G. (2001). The Victimisation of Older Australians. Barton,
ACT: Australian Institute of Criminology, 1–6.

Cavoukian, Ann (2005) Identity Thef t Revisited: Security is Not Enough,


http://www.ipc.on.ca/images/Resources/idtheft-revisit.pdf

Cullen, T. (2007). The Wall Street Journal complete identity theft guidebook. New York: Three
Rivers Press.

Curley (1984) Technology Acceptance Model: A review.


https://open.ncl.ac.uk/theories/1/technology-acceptance-model/

Engeler, A. (2012). The ID theft you haven't heard of...yet.


http://www.goodhousekeeping.com/family/budget/id-theft-0807

Evans, A. D., and Lee, K. (2014). The relation between 8- to 17-year-olds’ judgments of other’s
honesty and their own past honest behaviors. Int. J. Behav. Dev. 38, 277–281. doi:
10.1177/0165025413517580

Fast Facts 101 (2023) The Impact of Technology on Privacy and Cybersecurity.
https://fastfacts101.medium.com/the-impact-of-technology-on-privacy-and-
cybersecurity-4d2037331311#:~:text=Another%20major%20impact%20of
%20technology,without%20their%20knowledge%20or%20consent.
FBI Internet Crime Record

Federal Trade Commission. (2010). Medical identity theft.


http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt10.shtm

Forgeard (2021) How Social Media Impact Our Life. Brilliantio.com

Huraj (2023) Measuring Cyber Security Awareness: A Comparison between Computer Science
and Media Science Students https://doi.org/10.18421/TEM122-

Identity Theft Resource Center. (2007). Identity theft: The aftermath 2006.
http://www.idtheftcenter.org/artman2/uploads/1/The_Aftermath_2006_2.pdf

Institute for Prospective Technological Studies (2005). Biometrics at the Frontier: Assessing the
Impact on Society, Joint Research Centre, European Commission,
ftp://fto.irc.es/pub/EURdoc/eur2 1585en.pdf

Interpol (2019) Study of Developed Countries on the Prevalence on Cybercrime among Business
Establishments: A Cross-Sectional Study. Awareness Campaign. Interpol.int

Kahn, Charles M. and Linares-Zegarra, Jose Manuel, Identity Theft and Consumer Payment
Choice: Does Security Really Matter? (2013) https://ssrn.com/abstract=2005694

Kameke (2023) National Cyber Security Index Making: Statistics on the Cyber Security of Third
World Country. APAC 2023.

Kaspersky (2023) What is Cybercrime? How to Protect Yourself From Cybercrime?


Kaspersky.com

MayoChiz (2024) Teens and Social Media Use: What the Impact? MayoChiz.com

McCoy, M. & Schmidt, S. (2008). The silent crime: What you need to know about identity theft.
Des Moines, IA: Twin Lakes Press

Palatty (2023) An Analysis 90+ Cybercrime Statistics of 2024: Cost Industries and Trends.
University of Alberta.
Pinsker, D. M., McFarland, K., and Pachana, N. A. (2009). Exploitation in older adults: social
vulnerability and personal competence factors. J. Appl. Gerontol. 29, 740–761. doi:
10.1177/0733464809346559

Poneomon, L. (2011, April 19). A billion dollar crime that needs an urgent response.
http://www.experian.com/blogs/databreach/2011/04/19/a-billion-dollar-crime-thatneeds-
an-urgent-response/

Redford, C. (n.d.). Identity theft victim arrested.


http://www.ktbs.com/news/25124509/detail.html

Republic Act No. 10175. Congress of the Philippines Official Gazette.

Ross, M., Grossmann, I., and Schryer, E. (2014). Contrary to psychological and popular opinion,
there is no compelling evidence that older adults are disproportionately victimized by
consumer fraud. Perspect. Psychol. Sci. 9, 427–442. doi: 10.1177/1745691614535935

Shadel, D., Pak, K., and Sauer, J. H. (2014). Caught in the Scammer’s Net: Risk Factors that
May Lead to Becoming an Internet Fraud Victim. Washington, DC: AARP.

Shah (2016) Investigating the Identity Theft Prevention Strategies in Mcommerce. International
Conference ITS, ICEEdutech and STE 2016

Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J., & Hutton, S. (2004). Exploring the
psychological and somatic impact of identity theft. Journal of Forensic Sciences, 49 (1),
131-136.

Snow, John (2003). United States Treasury Secretary John W. Snow: remarks advocating the
renewal of the Fair Credit Reporting Act. Washington, DC: The Treasury Department.
http://www.treasurv.gov/press-center/press-releases/Pages/js515.aspx accessed 21 Feb,
2011.

Sproule, Susan and Archer, Norm (2008). Measuring Identity Thef t in Canada 2006 Consumer
Survey, Mc Master eBusiness Research Centre (MeRC), Working Paper
http://www.merc-mcmaster.ca/working-papers/21.html accessed 17 Feb, 2010
Sullivan, K. M. (2009). But doctor, I still have both feet! Remedial problems faced by victims of
identity theft. American Journal of Law and Medicine, 35, 647-681

UNCTAD (2021) Cybercrime Legislation Worldwide. United Nations Conference on Trade and
Development.

Walden (2024) How Is Modern Technology Affecting Human Development? The internet and
digital technology may be impacting our physical and psychological development to a
larger degree than we expected. https://www.waldenu.edu/online-masters-programs/ms-
in-developmental-psychology/resource/how-is-modern-technology-affecting-human-
development
Watts (2023) The Role Of Technology In The Future And Its Impact On Society. Readers Blog.
By the Times India. https://timesofindia.indiatimes.com/readersblog/amitosh/the-role-of-
technology-in-the-future-and-its-impact-on-society-52565/

Williams, Dave Arthur (2007). Credit card fraud in Trinidad and Tobago. Journal of Financial
Crime.Vol. 1 4, 3, 340-359.

You might also like