You are on page 1of 4

Table of Contents

Page

TITLE PAGE i
ABSTRACT ii
ACKNOWLEDGEMENT iii
TABLE OF CONTENTS iv
LIST OF TABLES vi
LIST OF FIGURES vii

Chapter I - Introduction 1
Statement of the Problems 5
Significance of the Study 5
Objectives of the Study 7
Scope and Limitation of the Study 7
Definition of Terms 7

Chapter II - Review of Related Literature 10


Risky Behaviors in the Cyberworld 10
Forms of Cyber Threats against Individual 11
Assess of Internet Users to Cyber Threats 13
Assess of Internet Users to the State of Cybercrime Law Issues

Chapter III – Methodology 20


Research Design 20
Sources of Data 20
Research Instrument 20
Respondents Profile 23
Sampling Technique 23

iv
Page

Procedure of the Study 23


Statistical Treatment 24

Chapter IV - Presentation, Analysis and Interpretation of Data 25

Chapter V - Summary of Findings, Conclusions and


Recommendations 39
Findings 39
Conclusions 40
Recommendations 42

Bibliography 43

Appendices
A. Letter to Adviser 48
B. Letter to the Validators 49
C. Letter for Distribution of Questionnaires 50
D. Expert Validation Sheets 51
E. Summary of Expert Validation Sheets 52
F. Survey Questionnaire 53

Curriculum Vitae 54

v
List of Tables

Tables Page

1. Numerical Value and Description of rating


scale on Risky Behaviors in surfing the Internet. 21

2. Numerical Value and Description of rating


scale on Forms of Threats posing in the cyberworld. 21

3. Numerical Value and Description of rating


scale on Assess of Internet users to cyber threats. 22

4. Numerical Value and Description of rating


scale on Assess of Internet users to international cyber
laws issues. 22

5. Responses on Risky Behaviors in Surfing the Internet 26


6. Responses on Forms of Threats 32
7. Assess of Internet users to cyber threats 35
8. Assess of Internet users to the state of international
cybercrime law issues 37

vi
List of Figures

Figures Page

1. Schematic Diagram 9
2. Conceptual Framework 19

vii

You might also like