Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

CYBERCRIME AWARENESS AND CYBER SECURITY PRACTICES AMONG

COLLEGE STUDENTS IN ICCT CAINTA MAIN CAMPUS S.Y 2024-2025

TRENDS AND ISSUES

Cybercrime has evolved significantly over the past decade, reflecting the rapid advancements in
technology and the increasing dependency on digital platforms. One of the most prominent trends in
cybercrime is the rise of ransomware attacks. Cybercriminals deploy malicious software to encrypt a
victim's data, demanding a ransom to restore access. These attacks have targeted a range of victims, from
small businesses to large corporations and government entities, causing significant financial losses and
operational disruptions. The sophistication of ransomware tactics has also increased, with attackers now
often threatening to release sensitive data if the ransom is not paid. Another concerning trend is the surge
in phishing attacks. Phishers use deceptive emails, messages, or websites to trick individuals into
revealing personal information, such as login credentials or financial details. These attacks have become
more sophisticated, often mimicking legitimate organizations and using personalized information to
appear more convincing.

OBJECTIVES AND CONTRIBUTIONS OF THE STUDY

This study aim to provide everyone to help us avoid expriencing trouble and problem like internet and
computer to investigate the current level of cybercrime awareness and cyber security practices among
college students in ICCT CAINTA MAIN CAMPUS.

STATEMENT OF THE PROBLEM

The problem in this study is embodied in the question: How capable is the Philippines National
Police Anti- Cybercrime Group [ PNP ACG] in implementation of anti-cybrecrime operations?

Answer the following questions:

1. How do the respondents evaluate the PNP ACG’s capability in its implementation of anti-
cybercrime operation?

2. What the problems encountered in the implementation the anti-cybercrime operations by the
PNP ACG?

3. What measures may be proposed to address the problems encountered by the PNP ACG in
its anti-cybercrime operations?

PROPOSED METHODS AND TECHNIQUES


The method of research that will be used for this study is Quantitative Method, because the
researchers will conduct survey and interviews towards to the ex victim of cyber threats, and
help them to overcome the trauma from the past experiences.

PROPOSE RESPONDENTS OF THE STUDY

The respondents of this study will be college students from diverse academic disciplines and
backgrounds. The selection criteria for the respondents will include:

The study will aim to include a diverse group of college students in terms of age, gender, academic year,
and field of study to ensure a representative sample.

The respondents will be current college students enrolled in undergraduate or postgraduate programs at
universities or colleges.

Participation in the study will be voluntary, and informed consent will be obtained from all respondents
prior to their involvement in surveys or interviews.

REFERENCES

Anderson, J. (2019). Cybersecurity for College Students: A Comprehensive Guide. Retrieved from
https://www.bestcolleges.com/blog/cybersecurity-for-college-students/

Duggan, M., & Carley, K. M. (2017). Identifying Likely Phishing Attacks in Real-Time. Journal of
Cybersecurity, 3(1), 29-45.

National Cyber Security Alliance. (2020). Data Privacy Day: Resources for College Students. Retrieved
from https://staysafeonline.org/data-privacy-day/resources-for-college-students/

Ransbotham, S., Kiron, D., & Gerbert, P. (2017). MIT Sloan Management Review and Deloitte 2017
Global Executive Study and Research Report: Cybersecurity at a Crossroads. MIT Sloan Management
Review, 58(3), 1-24.
Smith, A. (2018). The State of Cybersecurity Education in Colleges and Universities. Journal of
Cybersecurity Education, 2(2), 87-102.

United States Department of Homeland Security. (2020). Stop.Think.Connect. Cybersecurity Resources


for College Students. Retrieved from https://www.cisa.gov/stopthinkconnect-college-students

Wang, X., & Emurian, H. H. (2018). An Integrated Model of Phishing Detection Behavior. Computers
& Security, 77, 131-150.
Yeo, J., & Kim, H. (2019). Cybersecurity Awareness and Practices Among College Students: A
Qualitative Study. Journal of Information Security, 6(4), 213-228.

You might also like