Professional Documents
Culture Documents
Chapter 3orig
Chapter 3orig
Chapter 3orig
C. Content-related offenses.
protection.
a best tool for them why they are acutely aware in the said
Sub-Indicators Overall
Weighte DI
d
1.Illegal Access or the access to the whole or any part of a 3.62 HA
computer system without right.
2.Illegal Interception or the interception made by technical 3.57 HA
means without right of any non-public transmission of computer
data to, from, or within a computer system.
3.Data Interference or the intentional or reckless alteration,
damaging, deletion or deterioration of computer data, electronic
document or electronic data message, without right, 3.48 HA
including the introduction or transmission of viruses.
4. System Interference or the intentional alteration or reckless
hindering or interference with the functioning of a computer or
computer network without right or authority, 3.52 HA
including the introduction or transmission of viruses.
5.Misuse of device or the use of a device, including a computer
program, designed or adapted primarily for the purpose of 3.43 HA
committing any of the offenses under the Cybercrime Prevention
Act of 2012.
6.Misuse of device or the sale of a device including a computer 3.52 HA
program designed or adapted primarily for the purpose of
committing any of the offenses under the Cybercrime Prevention
Act of 2012.
7.Misuse of device or the use of a computer password, access
code, or similar data by which the whole or any part of a 3.37 HA
computer system is capable of being accessed with intent that it
be used for the purpose of committing any of the offenses
under the Cybercrime Prevention Act of 2012.
8.Misuse of device or the sale of a computer password, access
code, or similar data by which the whole or any part of a
computer system is capable of being accessed with intent that it 3.70 HA
be used for the purpose of committing any of the offenses
under the Cybercrime Prevention Act of 2012.
9.Misuse of device or the possession of a device, including a 3.38 HA
computer program, designed or adapted primarily for the purpose
of committing any of the offenses under the Cybercrime
Prevention Act of 2012.
10.Misuse of device or the possession of a computer password,
access code, or similar data by which the whole or any part of a
computer system is capable of being accessed with intent that 3.63 HA
it be used for the purpose of committing any of the
offenses under the Cybercrime Prevention Act of 2012.
Overall Weighted Mean 3.53 HA
Legend: HA-Highly Aware A-Aware SA-Slightly Aware NA-Not Aware
Presentation, Analysis, and Interpretation of Data
57
2023)
B. Computer-related Offenses
Offenses.
resources .
computer.
Presentation, Analysis, and Interpretation of Data
60
internet.
C. Content-related Offenses
even more.
related Offenses.
others.
March 2023).
acts.
individual.
Sum of df Mean
Total 6.545 59
Total 6.396 59
ANNOVA
Presentation, Analysis, and Interpretation of Data
72
Calauan, Laguna
such factors.
2012.
3. Lack of personnel for the implementation of the
prohibited acts of Cybercrime Prevention Act of 3.30 SA
2012 in the community.
4. Unclear mode of communication to the community by
3.45 SA
the authorities.
ineffective.
Presentation, Analysis, and Interpretation of Data
75
2023)
are as follows:
data. This means that they are aware of the risks and
activities.
community.