Professional Documents
Culture Documents
Introduction
Indeed, Internet has really a lot of tempting and interesting to offer to its
users. Using the internet, the user may be able to have its own research on a
particular subject. In socializing activities in the cyberworld, the user may be able
to join in a community of users of social networking sites like friendster,
facebook, myspace, and ect., be able to create a personal account in a web mail
site just like yahoomail and gmail, be able to join on an online chatting like yahoo
messenger, be able to do transaction in an online store or market like ebay and
many other related activies.
Over the years in the global scene, the growing community of Internet
users seemed become a normal norm as the way technology grows in technical
sense. As this growth surface, vulnerable menace to human safety such as
preserving the confidentiality of ones identity also evolves the way technology
does. This event truly raises serious issues and concerns in industries and in the
society in every country in the world and even also here in the Philippines.
1
Menaces are caused by these we call cybercrimes and they are vulnerable to
attack at any moment of time from any corner in the cyberworld. Since the word
cybercrime is such a complicated to be specific one, according to Vezina (2008)
in an article, What is Cybercrime, that cybercrimes have to be classified in to two
categories; type I and type II crime in order to understand further the behavior of
these crimes. Type I crime typically a single event of effect on the mind set of
the victim and usually enabled by crimeware programs such as viruses, Trojan
horses, and etc. while type II crime exists at the set of circumstances or series of
interaction with the victim and this is mostly observed in file sharing using FTP.
2
Here in the Philippines, according to Villafania (2008) in his news report in
inquirer.net that the Republic of the Philippines still lack in cybercrime laws that
enable to manage digital crimes as confirmed by a Filipino digital forensics
expert. Many companies are being victimized by roaming digital crimes. Yet, the
Department of Justice and the Commission on Information and Communications
Technology along with private sector groups have been working on a long-
overdue draft cybercrime bill, as stressed again by Villafania. This one step
initiative by the Philippine government will embark on serious way of as much as
possible ceasing criminal activities in the cyberworld that keep on bringing
menace to every user’s security. As Silva and Escalante (2000) reported that the
openness of the Internet is partly to blame for the vulnerability of computer
systems worldwide to cybercrimes. Part of being open and wide access to
Internet, computers and especially the user are very vulnerable to cyberworld
menace through different ways of attack done by cyber criminals.
3
damaged caused by these criminals in the cyberworld. Hence, this is now the
right time to start a wise initiative to address this growing global cyber crisis
through counducting a deeper awareness of human threats in the cyberworld
here in the USeP community. This is study will be a great help for Internet users
especially here in USeP and as well as to the outside of the community to be
more aware of what is happening behind the efficiency of Internet tools and
services.
4
Statement of the Problems
1. What are the scenarios that one individual student is vulnerable to several
menace in the cyberworld?
2. What are those forms of threats that are nimble to encounter in the cyber
activities?
3. What are the standards of threats in the cyberworld that will serve as
preventive measure to every Internet user as the study’s recommendation
takes place?
This study had also addressed the current and constant issue in
the cyberworld with regards to user's security and protection in
the cyberworld.
5
this great comprehensive awareness about the situation of
cybercrimes in the local and international scene especially to the
IC students.
The following list below would be the beneficiary of this research study:
• USeP Students
This will be able to help every student to realize about this
constant challenge in the information and communications
technology where it is truly happening in the reality. They are the
most beneficiary of this study since they spent their spare time
in the Internet.
• Educators
Since they are also subscribing the Internet, this study will be
able to help these professionals to keep up the awareness about
this roaming menace in the cyberworld.
• School Employees
This study will be able to help them be guided in surfing the
Internet and they will be going to let understand how to cope up
with any suspicious threats in the web which may be harmful in
effect them.
• Researchers
This study is truly beneficial for the researchers as they go
through along the end of this study. Their learning in the issue of
cybercrime in the cyberworld will be sharpened and be able to
contribute their knowledge and ideas to the alternative means in
6
keeping open the eye of the public about menace in the
cyberworld.
Threats in the cyberworld are yet insurmountable due to its broadness and
prevalence. Thus, this study aims to come up several ways to ascertain and
avoid those identified threats to the user in the cyberworld.
Definition of Terms
7
Internet Users – Refer to the fourth year Institute of Computing students who
are actively surfing the Internet.
Perilous Cyber Activities – Refer to surfing the Internet where different cyber
community can be created and joined with.