Professional Documents
Culture Documents
Final Defense
Final Defense
LAW: STUDENTS'
AWARENESS OF ITS
ENFORCEMENT
Alcazaren, Artual, Bañon, Bedona, Blancaflor, Cabarles, Cabuguason
Background of the Study
The use of electronic and different media platforms has become a fundamental part of our daily routines,
influencing how we communicate, learn, conduct business, and even find entertainment via the internet.
They have fundamentally transformed the way we approach work, education, and information access,
significantly enhancing our lives by making things more efficient, convenient, and interconnected (Team,
U., 2023).
Cyberviolence is rampant all over the world, including the Philippines. Due to the violation of unauthorized connections
on accounts and private networks, many people suffer from scams that result in money and property being lost, and
recovering them is difficult (Villanueva, 2021).
Against this backdrop, the researchers decided to conduct the present study to determine the level of awareness of the
students at the PHINMA University of Iloilo regarding the enforcement of the cybercrime prevention law in light of
their interest in the topic 4 of the implementation of this law and their adherence to it.
Problem Statement Specifically, this study seeks to answer the following questions:
The present study aims to determine What is the profile of the students in terms of sex, age,
course/college, and place of residence?
the level of awareness of the
students towards the enforcement of
What is the level of awareness of the students towards the
cybercrime prevention law at the
enforcement of cybercrime law when taken as a whole group
PHINMA University of Iloilo. and when classified according to the profile variables?
FUTURE RESEARCHERS
Researchers in the field of cybercrime, law, and public policy can use this study as a reference for future research, building
upon its findings to explore related topics and expand the body of knowledge in cybersecurity.
DEFINITION OF TERMS
AWARENESS CYBERCRIME
Denotes the state or capability of perceiving, Refers to the actions that breach legal boundaries
sensing, or being cognizant of events, objects, or and are carried out through the utilization of
sensory patterns (Gafoor, K. A., 2012). In this study, information and communication technology (ICT) to
this term pertains to the dependent variable that will target networks, systems, data, websites, and/or
be subject to manipulation by demographic profiles technology, or to aid in the commission of a
and will be measured to yield results. criminal act (UNODC, 2020).
In this study, this term refers to the violations
carried out by the public in the use of computers or
the Internet.
CYBERCRIME LAWS
It is a legislation focused on the acceptable behavioral use of technology, including computer
hardware and software, the internet, and networks (Norwich University, 2019).
In this study, it refers to the laws implemented and abided by computer and internet users.
DEFINITION OF TERMS
ENFORCEMENT PHINMA UNIVERSITY OF ILOILO
The action of compelling a party to comply with a is a for-profit private higher education institution
judgment where it has not been complied with located in the urban setting of the medium city of
voluntarily and the time ordered for compliance has Iloilo City, Western Visayas that offers courses and
expired (LexisNexis, 2023). programs leading to officially recognized higher
In this study, it refers to the active or effective education degrees such as bachelor's degrees,
application of the law. master's degrees and doctorate degrees in several
areas of study (RocketReach2004)). In this study,
this refers to the school where the study was
conducted.
STUDENT
A student is someone who has been admitted to the university to study for academic credit and has commenced
and has not otherwise exited the university (through successful completion or withdrawal) (Sterling University,
2019).
In this study, this term refers to the intended respondent to be measured and provide input in the study.
INDEPENDENT VARIABLE SCHEMATIC DIAGRAM
STUDENT’S PROFILE:
SEX
• Male
• Female
AGE CYBERCRIME
• Young (Below 21 years old) PREVENTION
• Young Adult (21 – 23 years old) LAW: STUDENTS'
• Middle Adult (Above 23 years old)
AWARENESS OF
COURSE/COLLEGE
THEIR
• College of Criminal Justice Education
• College of Education ENFORCEMENT
• College of Engineering AT THE PHINMA
• College of Information Technology UNIVERSITY OF
• College of Allied Health and Sciences ILOILO
• College of Management and
Accountancy
PLACE OF RESIDENCE
• City DEPENDENT VARIABLE
• Province
• Others
METHODOLO RESEARCH INSTRUMENT
The study utilized a custom-made survey questionnaire to
GY
RESEARCH DESIGN
The research titled "CYBERCRIME PREVENTION LAW: Students'
systematically collect data from students at PHINMA University
of Iloilo, Iloilo City. The primary focus was to assess the
Awareness of its Enforcement" adopted the descriptive research method, a students' level of awareness towards the enforcement of
type of investigation designed to gain a comprehensive understanding of a cybercrime prevention law. The questionnaire comprised three
specific phenomenon or group. Unlike studies that involve making 37 integral parts. Part I included an information sheet to set the
predictions or testing hypotheses, descriptive research focuses on collecting context and purpose of the study. Part II delved into gathering
abundant information to precisely depict the subject of inquiry. the information about the profile of the respondents. Part III, the
core section, consisted of 15 statements related to cybercrime
prevention law enforcement. These statements aimed to measure
THE RESPONDENTS OF THE STUDY
The respondents of this study are the 120 enrolled students in different the students' understanding and awareness of the relevant legal
colleges or courses of the PHINMA University of Iloilo, Iloilo City who measures in place. Each item was provided with responses on a
were selected through quota sampling. The researchers gathered an equal 4-point Likert scale with 1= Strongly Disagree, 2= Disagree, 3=
number of students to answer the survey questionnaire in each college or Agree, 4= Strongly Agree to measure all the items.
course, each item in the population had an equal and likely chance of being
picked in the sample.
VALIDITY OF THE INSTRUMENT
According to Stewart (2024) validity signifies the extent to
METHODOLO
which a study accurately reflects or assesses a specific concept,
ensuring that the study investigates precisely what it purports to
GY
RELIABILITY OF THE INSTRUMENT
As a result of the reliability analysis, the Cronbach alpha
examine.
coefficient of the 15 items test was .948 which indicated that the
To ensure the validation the questionnaire was completed in
instrument was highly reliable and ready to use for the conduct of
consecutive stages. First, the researcher consulted the validators
the study to actual respondents.
to comment on the questionnaire and suggest changes in terms of
DATA GATHERING PROCEDURE
its clarity, language accuracy, and the degree of conformity in
In gathering the data, the researchers used two techniques to
every question with the field under which were classified,
achieve the research objective: 1) personally handing out the
modified, or comment upon whatever the referee deemed
survey to students using their mobile phones: and 2) using
appropriate to validate the research questionnaire. Second, after a
Facebook Messenger, sharing the Google links with their
series of discussion sessions with the panel of validators, the
classmates who are under the same college or course. During the
validity of the questionnaire was established. Third, the revised
administration of the survey, the researcher had the opportunity to
questionnaire was reviewed and checked by the researchers’
explain to the respondents the purpose and benefits of the study,
adviser to ensure a thorough refinement of the ideas. Lastly, the
clarified each item, and assured the respondents of the
survey questionnaires were utilized for the distribution.
confidentiality of their identities and responses. All responses are
subject to statistical treatment.
DATA ANALYSIS PROCEDURE
INTERPRE-
RESPONSE DESCRIPTION SCALE
TATION
To determine the level of
awareness of the students at
the PHINMA University of
4 Strongly
Agree
3.26-4.0 Highly
Aware
1
description and interpretation
Strongly Highly Not
were used. Disagree
1.0-1.75 Aware
LEGEND
STATISTICAL TOOLS
MEAN PERCENTAGE
FREQUENCY - It represents the frequency used to calculate the required number of respondents for each profile variable. For
inferential statistics, the following statistical tools were used:
Is a statistical technique that assesses potential difference when This was used to assess the variation in the distinction
respondents were classified according to different variables
of students about their level of awareness towards the
having more than two categories. This was used to determine
significant differences in terms of the respondents’ age, enforcement of cybercrime prevention law when they
course/college, and place of residence. were classified as to sex.
TABLE 1. PROFILE
OF THE
RESPONDENTS
TABLE 2. LEVEL OF
AWARENESS OF THE
STUDENTS AT PHINMA
UNIVERSITY OF ILOILO
TOWARDS THE
ENFORCEMENT OF
CYBERCRIME PREVENTION
LAW AS A WHOLE GROUP AND
WHEN CLASSIFIED
ACCORDING TO SEX, AGE,
COURSE/COLLEGE, AND
PLACE OF RESIDENCE
TABLE 3.1. MANN-WHITNEY U TEST SHOWING THE
SIGNIFICANT DIFFERENCE IN THE LEVEL OF
AWARENESS OF THE STUDENTS AT PHINMA
UNIVERSITY OF ILOILO TOWARDS THE ENFORCEMENT
OF CYBERCRIME PREVENTION LAW WHEN CLASSIFIED
IN TERMS OF SEX
TABLE 3.2. KRUSKAL WALLIS TEST
SHOWING THE SIGNIFICANT
DIFFERENCE IN THE LEVEL OF
AWARENESS OF THE STUDENTS AT
PHINMA UNIVERSITY OF ILOILO
TOWARDS THE ENFORCEMENT OF
CYBERCRIME PREVENTION LAW
WHEN CLASSIFIED IN TERMS OF AGE,
COURSE/COLLEGE, AND PLACE OF
RESIDENCE
SUMMARY OF
PROBLEM METHOD The respondents of this study were one hundred twenty
What is the profile of the students in terms of sex, age, course/college, and place of
residence?
What is the level of awareness of the students towards the enforcement of cybercrime law
when taken as a whole group and when classified according to the profile variables?
Is there a significant difference in the level of awareness of the students towards the
enforcement of cybercrime prevention law when classified according to sex, age,
course/college, and place of residence?
FINDING
As a whole, the level of awareness towards the enforcement of
cybercrime law of the students at PHINMA University of Iloilo
was “Highly Aware”. When classified as to sex, both males and
https://doi.org/10.17577/IJERTV9IS060565 prevention+law&id=ED557216
Alharbi, T., & Tassaddiq, A. (2021). Assessment of Brush, K., Rosencrance, L., & Cobb, M. (2021). cybercrime.
02 05
Cybersecurity Awareness among Students of Security. Retrieved from
Majmaah University. Big Data and Cognitive https://www.techtarget.com/searchsecurity/def
Computing, 5(2), 23. Retrieved: inition/cybercrime
https://doi.org/10.3390/bdcc5020023
Astin, A. W. (1984). Student involvement: A Edubirdie. (2022).Cyber Crimes and Its Effects on Youth.
03 06
developmental theory for higher education. Journal Retrieved September 17, 2023, from
of College Student Personnel, 25(4), 297-308. https://edubirdie.com/examples/cyber-crimes-a nd-its-
effects-on-youth/
REFERENCES
Gravino E. & Villanueva MC. (2021). R.A. No. 10175:
10
Gafoor, K. A. (2012). Considerations in The cybercrime prevention act: the net commandments.
07
measurement of awareness. ResearchGate. Retrieved from
Methodology
Khurpaderushi143. (2022). History of Cyber
15 18 Lena, P. (2019). NBI cites roles of LGUs in cybercrime
Security. GeeksforGeeks.
prevention. Philippine News Agency. Retrieved from
https://www.geeksforgeeks.org/history-of-
https://www.pna.gov.ph
cybe r-security/
REFERENCES
Mohamad, M. M., Sulaiman, N., Sern, L. C., & Salleh, K.
22
M. (2015). Measuring the validity and reliability of
LexisNexis (2023). Published by a LexisNexis Dispute
19 research instruments. Procedia - Social and Behavioral
Resolution expert. (n.d.). Enforcement.
Sciences, 204, 164–171.
https://www.lexisnexis.co.uk/legal/glossary/e
https://doi.org/10.1016/j.sbspro.2015.08.129
nforcement
Mahawar, S. (2023). Effect of cybercrime on global Nair, R. (2022). Cybercrime and its Impacts on Younger
20 23
criminal justice system - iPleaders. Retrieved from Generation. Retrieved from
global-criminal-justice-system/ impacts-on-younger-generation
Methodology
Maryclarevillanueva, V. a. P. B. (2021). R.A. No. 24 National Defense College of the Philippines. (2023).
21 PHILIPPINE CYBERSECURITY IN RETROSPECT
10175: The Cybercrime Prevention Act: The Net
Commandments. Retrieved from (2016-2021) - NDCP. Retrieved from
https://legalresearchph.com/2021/12/05/r-a-no -10175- https://ndcp.edu.ph/philippine-cybersecurity?in-retrospect-
the-cybercrime-prevention-act-the-net?commandments/ 2016-2021/?fbclid=IwAR1CVkB1KU4
DB1d2EKbSuK9sSsPXaYHt-
0eIQSNTU2TMQbOkj9IKWFVw lr8
REFERENCES
Norwich University Online (2019). Career Paths in Pamaos, F. & Labao, J., (2010). Anti-child pornography act of 2009
25 Information Security: What is Cyber Law? (n.d.). Retrieved
28 (republic act no. 9775: full text. Retrieved from: https://pnl-
from: law.com/blog/anti-child-pornograp hy-act-of-2009-republic-act-no-
https://online.norwich.edu/academic-programs/ 9775-full-text /.
resources/cyber-law-definition
Pamaos, F., (2007). Credit cards and access devices Pnada641. (2004). Cyber Crime: Its Impact on Government, Society
26 regulation: explained. Retrieved from:
29 and the Prosecutor. United States Agency for International
https://pnl-law.com/blog/credit-cards-access?devices- Development (.gov). Retrieved from
regulation-explained/. https://pdf.usaid.gov/pdf_docs/Pnada641.pdf
Pamaos, F. & Labao, J., (2009). Anti-trafficking in persons RocketReach (2004) - Find email, phone & social media for 450M+
27 30
act of 2003 (RA 9208): a primer. Retrived from professionals. RocketReach. https://rocketreach.co/university-of-
https://pnl-law.com/blog/anti-trafficking-in?persons-act-of- iloilo-p hinma-profile_b5d5192af42e3961
2003-ra-9208-a-primer/?fbclid= IwAR0FczJYV_dfO8rj-
JebEMt1HyW_xjLFGnduGgSgY-O 2-07V2YlN_qszjTA.
REFERENCES
Singh, N. (2022). A Study On Indian Youth And Cyber
Royandoyan, R. (2022, April 26). Filipino kids are the 34
31 Crime: Vol. Volume 4 (ISSN : 2583-1895, School of Legal
second most vulnerable to online threats globally —
Studies and Governance, Career Point University, Kota; Issue
study. Philstar.com. Retrieved from
1). Retrieved:
https://www.philstar.com
http://cpijr.com/vol-4/paper-8.pdf
Sansom, R. (2022). Theory of Planned Behavior. Sirue et al.(2013). AWARENESS OF THE CYBERCRIME LAW
32 35
Change Theories Collection. AMONG CRIMINOLOGY STUDENTS OF THE UNIVERSITY
Methodology
/collection/planned_behavior.html https://www.studymode.com/essays/awareness-Of -The-
Cybercrime-Law-Among-46940775.html
Shea, V., 1994. Netiquette. San Rafael, CA: Albion
33 Stewart, L. (2024, February 21). What is the Significance of
Books, Available online: 36
http://www.albion.com/netiquette/index.html Validity in Research? ATLAS.ti. Retrieved:
https://atlasti.com/research-hub/validity-in?research
REFERENCES
Team, U. (2023). Essay on Role of Computers and Internet in Our UNDOC. (2020). Cybercrime Module 1 Key issues: Cybercrime in
37 40 brief. Retrieved September 2, 2023, from
Lives, Advantages and Disadvantages - Utopper. Utopper.
https://www.unodc.org/e4j/en/cybercrime/modul
Retrieved from
e-1/key-issues/cybercrime-in-brief.html
https://utopper.com/study-material/essay-on-r ole-of-computers-
and-internet-in-our-lives/ Unicef (2022). Philippines sees increase in cyber tip reports in 2021;
41 UNICEF calls for collective action on Safer Internet Day. (n.d.).
Toso et al., (2023). Cybercrime Awareness Among Senior High
38 Retrieved from https://www.unicef.org/philippines/press-rele
School Students (Volume 7, Issue 2, Pages 160-176). Mediterranean
ases/philippines-sees-increase-cyber-tip-repo rts-2021-unicef-calls-
Journal of Basic and Applied Sciences (MJBAS)Retrieved from: collective-actionUnit, C. S. (2013). CYBERCRIME THREAT
https://mjbas.com/data/uploads/55648.pdf?shem LANDSCAPE IN THE PHILIPPINES. Retrieved from
=ssusba&fbclid=IwAR3-mf8V0RqrPKu0RxwYG6suFAvL https://acg.pnp.gov.ph/main/about-us/20-publi cations/42-
YudvjQT1EoQmVmlFP_tvKuvLLx868t4 cybercrime-threat-landscape-in-the -philippines.html
Tosun et. al. (2020) / International Journal of Curriculum and University of Sterling (2019). Definition of University terms | About
39 42 | University of Stirling. (n.d.). Retrieved from
Instruction 12(Special Issue) (2020) 271–294 279. Retrieved from
https://www.stir.ac.uk/about/professional-ser vices/student-
https://files.eric.ed.gov/fulltext/EJ1245117. pdf academic-and-corporate-services /academic-registry/definition-of-
university-t erms/#S
REFERENCES
Welance (2023). Impact of Cybercrime on individuals,
43
businesses, and society. www.linkedin.com. Retrieved from
https://www.linkedin.com/pulse/impact-cybercr ime-
individuals-businesses-society-join-welan ce
Thank You
02 May, 2024