Title Defense Group 5

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

GROUP 5

GE 2 PURPOSIVE COMMUNICATION

Title Defense
Proponents:
Kim Ivan R. Sumagaysay
Regine Flores
Prince Anthony Tancontian
November 28, 2022
Research Problem 1: CYBERCRIMEAWARENESSAND CYBERCRIME PREVENTIONATTITUDE OF
CRIMINOLOGY STUDENTS

[Conditions] [Ideal Situation]


» Concoles, C. R., Cristobal, N., Felonia Jr, E., Tadtad, V. M., & Back, S., & Guerette, R. T. (2021)
Villafuerte, K. A. (2022)  Criminologists and professionals involved in crime prevention are aware of
the significance of geographic locations for criminal activity and the
 The Philippines has seen an information technology revolution since the potential contribution that place managers may make to successfully
country's E-Commerce Law, also known as Republic Act 8792, was preventing crime. In fact, a significant body of research over the past few
passed in 2000. Senator Nancy Binay is presently pushing for kids to decades has highlighted the tendency for crime to concentrate over a
grasp online ethics, according to a blog post from rappler Peer variety of geographic areas, where place management tends to be weak or
Reviewed Journal 21. In the interview, Binay said that rather than nonexistent. However, there hasn't been much research done on how to
enacting regulations that would restrict free expression, her plan in control places and crimes in the virtual world. The goal of this study was to
Senate Resolution 474 intended to promote appropriate Internet usage determine whether place management strategies may effectively lower
through education (Macaraig, 2013). Regarding moral principles, cybercrime events in an online environment. This study assessed the effects
privacy, and other practices that impact a person's overall well-being, of an information security breach on a large urban research institution in
the Philippines is faced with a computer ethical conundrum. Along with
cybersex, pornography, cyberstalking, identity theft, financial theft, and the United States using data from the information technology division .
other related themes, they have been explored in a variety of news
outlets things (Verecio, 2016).

[Research Gap (Discrepancy)]


» Kumbhar, M., & Gavekar, V. (2017
 This research proved that there are most users of internet. Due to less time during working hours they prefer most online transaction. But they
are not feeling secure while making online transaction. Maximum respondent give response in the favor of neutral, so we can conclude that they
are not feel secure about online banking transaction. It clears that ratio of awareness among the respondent regarding cyber crime is high for
hacking as compared to the others. There are many ways of cyber crime happened as pornography, social account hacking, bank account
hacking, etc. Among those respondents are victim of any of those cyber crime. Users feel insecure about Security of their details during Online
Transaction
BEST FOR You 2
O R G A N I C S C O M PA N Y
[Research Problem 1]

[Interventions] [Facts/Findings] [Research Questions]

» Barbola, V., & Pareek, D. L. (2021) » Lee, Y. Y., Gan, C. L., & Liew, T. W.  What is the level of Cybercrime
 -A normative survey method will (2022)
awareness?
be used in the current study to  This paper aims to provide a
describe and explain the current clear insight into the  What is the level of Cybercrime
situation. It includes some Prevention Attitude?
comparison or contrast
understanding of phishing
techniques. It looks for victimization risk using
 Is there a significant relationship
connections between already theoretical and empirical
existing, unmanipulated evidence. between cybercrime awareness
variable. One of the most popular and Cybercrime Prevention
methods for solving educational Attitude?
issues is normative study.

BEST FOR You 3


O R G A N I C S C O M PA N Y
[Research Problem 2]

[Conditions] [Ideal Situation]


» [Evidence] [Evidence]
• [statement] • [statement]

[Research Gap (Discrepancy)]


» [Evidence]
• [statement]

BEST FOR You 4


O R G A N I C S C O M PA N Y
[Research Problem 2]

[Interventions] [Facts/Findings] [Research Questions]

» [Evidence] » [Evidence] » [Question 1]


• [statement] • [statement] » [Question 2]
» [Question 3]

BEST FOR You 5


O R G A N I C S C O M PA N Y
[Research Problem 3]

[Conditions] [Ideal Situation]


» [Evidence] [Evidence]
• [statement] • [statement]

[Research Gap (Discrepancy)]


» [Evidence]
• [statement]

BEST FOR You 6


O R G A N I C S C O M PA N Y
[Research Problem 3]

[Interventions] [Facts/Findings] [Research Questions]

» [Evidence] » [Evidence] » [Question 1]


• [statement] • [statement] » [Question 2]
» [Question 3]

BEST FOR You 7


O R G A N I C S C O M PA N Y
[References]
» Concoles, C. R., Cristobal, N., Felonia Jr, E., Tadtad, V. M., & Villafuerte, K. A. (2022). CYBERCRIME AWARENESS AND
CYBERCRIME PREVENTION ATTITUDE OF CRIMINOLOGY STUDENTS. Southeast Asian Journal of Multidisciplinary Studies, 1(1).
» Back, S., & Guerette, R. T. (2021). Cyber Place Management and Crime Prevention: The Effectiveness of Cybersecurity Awareness
Training Against Phishing Attacks. Journal of Contemporary Criminal Justice, 37(3), 427-451.
» Kumbhar, M., & Gavekar, V. (2017). A study of Cyber Crime awareness for prevention and its impact. International Journal of Recent
Trends in Engineering and Research, 3, 240-246.
» Barbola, V., & Pareek, D. L. (2021). AN ANALYTICAL STUDY OF ATTITUDE OF SR. SEC SCHOOL STUDENTS TOWARDS E-
LEARNING AND THEIR AWARENES TOWARDS CYBER CRIME INHARYANA STATE. CENTUM-ISSN 2231-1475, 65.
» Lee, Y. Y., Gan, C. L., & Liew, T. W. (2022). Phishing victimization among Malaysian young adults: cyber routine activities theory and
attitude in information sharing online. The Journal of Adult Protection, (ahead-of-print).

BEST FOR You 8


O R G A N I C S C O M PA N Y

You might also like