You are on page 1of 15

Chapter IV

PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA

In this chapter, the researcher presented the analysis and interpretation of


data gathered from the distributed and answered survey questionnaires that
aimed to obtain the answer of problems of the study.

Sample

The number of sample of respondents that were taken from the number of
IC fourth year students, composed of BS Computer Science and BS Information
Technology, was approximately 69 students. The respondents of the study were
given the equal chance to answer the survey questionnaire in the process of
distribution.

Cyberworld Scenarios

These scenarios were the most commonly observed as behaviors in the


cyberworld that act in events and activities laid in the Internet where numerous
threats are hiding.

Risky Behaviors in the Cyberworld

The table 5 presented the responses of fourth year IC students on risky


behaviors in the cyberworld based on their practice in dealing with the cyberworld
activities. The respondents were able to rate each items given in the proceeding
tables. Each of the scale has the total number of responses of the students.

In the first item of risky behavior in the table, responding with messages in
e-mail accounts coming from anonymous sender; there are 6 out of 69 students

25
Table 5. Responses on Risky Behaviors in Surfing the Internet

Items Scale
5 4 3 2 1 Average Desc
Online Chatting
1. Responding with messages in e-
mail accounts coming from 6 5 11 11 36 2.04 Fair
anonymous sender
2. Conversing with online strangers
using Instant Message (IM) and other
chat applications such as Yahoo 7 14 15 20 13 2.74 Good
Messenger (YM), iChat, skype, and
other sites that have chatting features.
3. Sending personal photos to
strangers online. 0 3 10 15 41 1.64 Fair
4. Placing new friends or strangers on
buddy lists or list of friends 1 20 18 22 8 2.77 Good
Online File sharing
5. Uploading of files to untrusted sites 4 11 16 22 16 2.49 Fair
6. Downloading of files from
untrusted or anonymous source 5 21 18 13 12 2.91 Good
Online Profile Sharing
7. Posting personal information such
as name, address, age, gender, e-mail, 4 13 22 20 10 2.72 Good
and others that do not required at all.
8. Posting of personal photos/pictures
and other materials that can be 6 19 25 13 6 3.09 Good
accessible by anyone
9. Not using of strict privacy settings
on accounts on social networking
sites(e.g. facebook and friendster) and 5 16 22 14 12 2.83 Good
gaming sites(e.g. ragnarok and
pokemoncrater)
Website subscribing
10. Signing-up regardless of website's
reliability and credibility 3 13 30 18 5 2.87 Good
11. Wanting to use only short and
easy to recognize passwords 1 12 28 21 7 2.70 Good

Over All Average 2.62 Good

26
in the sample who have extremely practiced the behavior, 5 students who have
highly practiced the behavior, 11 students who have moderately practiced the
behavior, other 11 students who have below moderate of being practiced the
behavior and while the 36 students in the sample have never practiced the said
behavior. In average score of 2.04, describes as fair, responding with messages
in e-mail accounts’ coming from anonymous sender is at below moderate of
being practiced by the average of the students in the sample. The second item of
risky behavior, conversing with online strangers using Instant Message (IM) and
other chat applications; there are 7 out of 69 students who have extremely
practiced the behavior, 14 students who have highly practiced the behavior, 15
students who have moderately practiced the behavior, 20 students who have at
below moderate of being practiced the behavior, and while the other 13 students
have never practiced the behavior. The behavior, conversing with online
strangers using Instant Message (IM) and other chat applications, with the
average score of 2.74, describes as good, is moderately practiced by the
average of the students in the sample. The third item of behavior, sending
personal photos to strangers online; there are zero or no students out of 69
students who have extremely practiced the behavior, 3 students have highly
practiced the behavior, 10 students have moderately practiced the behavior, 15
students have at below moderate of being practiced the behavior while the 41
students in the sample have never practiced the behavior. With the average
score of 1.64, describes as fair, the behavior, sending personal photos to
strangers online is at below moderate of being practiced by the average of the
students in the sample. The fourth item of the risky behavior, placing new friends
or strangers on buddy lists or list of friends; there is only 1 out of 69 students in
the sample has extremely practiced the behavior, 20 students have highly
practiced the behavior, 18 students have moderately practiced the behavior, 22
students have at below moderate of being practiced the behavior while there are
only 8 students have never practiced the behavior. With the average score of
2.77, describes as good, the behavior, placing new friends or strangers on buddy

27
lists or list of friends is moderately being practiced by the average of the students
in the sample.

In the fifth item of the table risky behaviors under online file sharing,
uploading of files to untrusted sites; there are 4 out of 69 students in the sample
have extremely practiced the behavior, 11 students have highly practiced the
behavior, 16 have moderately practiced the behavior, 22 students have at below
moderate of being practiced the behavior while 16 students have never practiced
the said behavior. With the average of 2.49, describes as fair, the behavior,
uploading of files to untrusted sites is at below moderate of being practiced by
the average of the students in the sample. The sixth item, downloading of files
from untrusted or anonymous source; there are 5 students out of 69 have
extremely practiced the behavior, 21 students have highly practiced the behavior,
18 students have moderately practiced the behavior, 13 students have at below
moderate of being practiced the behavior while 12 students have never practiced
the behavior. With the average score of 2.91, describes as good, downloading of
files from untrusted or anonymous source is moderately practiced by the average
of the students in the sample. The seventh item under online profile sharing,
posting personal information such as name, address, age, gender, e-mail, and
others that do not required at all; there are 4 students out of 69 have extremely
practiced the behavior, 13 students have highly practiced the behavior, 22
students have moderately practiced the behavior, 20 students have at below
moderate of being practiced the behavior while 10 students have never practiced
the behavior. With the average score of 2.72, describes as good, posting
personal information such as name, address, age, gender, e-mail, and others
that do not required at all is moderately practiced by the average of the students
in the sample. The eighth item, posting of personal photos/pictures and other
materials that can be accessible by anyone; there are 6 students out of 69 have
extremely practiced the behavior, 19 students have highly practiced the behavior,
25 students have moderately practiced the behavior, 13 students have at below
moderate of being practiced the behavior while 6 students have never practiced

28
the behavior. With the average score of 3.09, describes as good, posting of
personal photos/pictures and other materials that can be accessible by anyone is
moderately practice by the average of the students in the sample. The ninth item,
not using of strict privacy settings on accounts on social networking sites; there
are 5 students out of 69 have extremely practiced the behavior, 16 students have
highly practiced the behavior, 22 students have moderately practiced the
behavior, 14 students have at below moderate of being practiced the behavior
while 12 students have never practiced the behavior. With the average score of
2.83, describes as good, the behavior is moderately practiced by the average of
the students in the sample.

The tenth item of behavior under websites subscribing, signing-up


regardless of website's reliability and credibility; there are 3 students out of 69
have extremely practiced the behavior, 13 students have highly practiced the
behavior, 30 students have moderately practiced the behavior, 18 students have
at below moderate of being practiced the behavior while 5 students have never
practiced the behavior. With the average score of 2.87, describes as good, the
behavior is moderately practiced by the average of the students in the sample.
The eleventh item, wanting to use only short and easy to recognize passwords;
there is only 1 student out of 69 who has extremely practiced the behavior, 12
students who have highly practiced the behavior, 28 students have moderately
practiced the behavior, 21 students have at below moderate of being practiced
the behavior while 7 students have never practiced the behavior. With the
average score of 2.70, describes as good, the behavior is moderately practiced
by the average of the students in the sample. The over all average on responses
on risky behaviors in surfing the Internet is 2.62, describes as good, the average
of the students has moderately practiced the risky behaviors in surfing the
Internet.

29
Table 5 implies that the fourth year IC students are moderately practicing
those identified risky behaviors in the cyberworld based on their own discretion in
communicating and interacting with the activities in the cyberspace.

The implication to the result of table 5 is that because of moderate


practice to risky behaviors in the cyberworld, fourth year students are moderately
vulnerable to several risks in the cyberworld. In view herewith, students are
obviously having moderate experience in involving to risky behaviors in the
cyberworld.

Forms of Cyber Threats against Individual

The table 6 presented the responses of four year IC students on their


awareness with those forms of threats in the cyberworld.

In the first item of forms of threats, Identity Theft; the awareness with the
threat of 20 students out of 69 is extremely high, awareness of 27 students with
the threat is high, 17 students’ awareness with the threat is just average, 4
students’ awareness with the threat is below average while 1 student is never
aware with the threat. With the average score of 3.88, describes as very good,
the awareness of average of the students in the sample is high. The second item
of forms of threats, Spammer; the awareness of 32 students out of 69 is
extremely high, awareness of 20 students with the threat is high, awareness of
14 students with the threat is just average, awareness of 3 students with the
threat is below average while zero or none of the students in sample is never
aware with the threat. With the average score of 4.17, describes as very good,
the awareness of average of the students in the sample is high. In the third item,
Pornography; the awareness with the threat of 28 students out of 69 is extremely
high, the awareness of 21 students with the threat is high, awareness of 15
students with the threat is just average, awareness of 5 students with the threat
is below average while zero or none of the students in sample is never aware

30
with the threat. With the average score of 4.04, describes as very good, the
awareness of average of the students in the sample is high. In the fourth item,
Spyware; the awareness with the threat of 19 students out of 69 is extremely
high, 21 students are highly aware with the threat, the awareness with the threat
of 23 students is just average, the awareness with the threat of 4 students is
below average while 2 students never aware of the threat. With the average
score of 3.74, describes as very good, the awareness with the threat of average
of the students in the sample is high. The fifth item, Cyberstalker; the awareness
with the threat of 13 students out of 69 is extremely high, awareness with the
threat of 18 students is high, awareness with the threat of 24 students is just
average, awareness with the threat of 10 students is below average while the
rest of 4 students are never aware of the threat. With the average score of 3.38,
describes as good, the awareness with the threat of average of the students in
the sample is just average.

In the sixth item of forms of threats, Internet Sales Fraud; the awareness
with the threat of 20 students out of 69 is extremely high, awareness with the
threat of 19 students is high, awareness with the threat of 23 students is just
average, awareness with the threat of 6 students is below average while only 1
student in the sample is never aware with the threat. With the average score of
3.74, describes as very good, the awareness with the threat of average of the
students is high. In the seventh item, Chain letters; the awareness with the threat
of 26 students out of 69 is extremely high, awareness with the threat of 25
students is high, awareness with the threat of 12 students is just average,
awareness with the threat of 5 students is below average while there is only 1
student in the sample never aware with the threat. With the average score of
4.01, describes as very good, the awareness with the threat of average of the
students in the sample is high. In the eighth item, Cyberbullying; the awareness
with the threat of 17 students out of 69 is extremely high, the awareness with the
threat of 16 students is high, awareness with the threat of 22 students is just
average, awareness with the threat of 13 students is below average while there

31
Table 6. Responses on Forms of Threats

Scale
Items 5 4 3 2 1 Average Desc
1. Identity theft. It involves someone
pretending to be someone else onilne 20 27 17 4 1 3.88 Very
in order to steal money or get other Good
benefits.
2. Spammers. People keep on
sending junk mails and other 32 20 14 3 0 4.17 Very
unsolicited mails. Good
3. Pornography. Depiction of
explicit sexual subject matter for the 28 21 15 5 0 4.04 Very
purposes of sexual excitement. Good
4. Spyware. It is a software made by
a person or group of people that
gathers information about people 19 21 23 4 2 3.74 Very
without their knowledge and it tracks Good
your movements and habits on the
Web.
5. Cyberstalker. A person who
followed and pursued online someone 13 18 24 10 4 3.38 Good
else.
6. Internet Sales Fraud. It refers
generally to any type of fraud scheme
that uses one or more components of
the Internet such as chat rooms, e- 20 19 23 6 1 3.74 Very
mail, message boards, or Web sites to Good
present fraudulent solicitations to
prospective victims or to other
connected with the scheme.
7. Chain Letters. Consist of a
message that attempts to induce the
recipient to make a number of copies 26 25 12 5 1 4.01 Very
of the letter and then pass them on to Good
as many recipients as possible.
8. Cyberbullying. It is being cruel to
others by sending or posting harmful Very
material or engaging in other forms of 17 16 22 13 1 3.51 Good
social cruelty using the Internet or
other digital technologies.

Over All Average 3.81 Very


Good

32
is only 1 student in the sample never aware with the threat. With the average
score of 3.51, describes as very good, the awareness with the threat of average
of the students in the sample is high. The over all average of responses of the
students with the forms of threats in cyber world is 3.81 describes as very good:
awareness with the forms of threats of average of the students in the sample is
high.

Table 6 implies that the awareness of fourth year IC students with those
forms of threats in the cyberworld is high which senses to open the possibility
that the students had have been engaged to those threats.

The implication to the result of table 6 is that because of high awareness


of the fourth year students, those forms of threats are highly nimble to encounter
in engaging with cyber activities. This makes sense that the students could
neither be the actor nor the victim of those forms of threats.

Assess of Internet Users to Cyber Threats

The table 7 presented assess of Internet users - fourth IC students to


cyber threats according their level of confidence of being protected against those
identified cyber threats.

In the first item, invasions of privacy can cause major damage to the
confidentiality of the users; there are 10 students out of 69 assess that they have
extreme high of confidence of being protected against such threat, 20 students
assess that they have high confidence of being protected against such threat, 31
students assess that they are uncertain with their confidence of being protected
against such threat, 8 students assess that their confidence of being protected
against such threat is low while zero or none of students in the sample assess
that their confidence of being protected against such threat is very low. With the
average score of 3.46, describes as good: the average of the students in the

33
sample assess that their confidence of being protected against such threat is
uncertain. In the second item, exposure to material considered to be
pornographic, violent, hate-filled, racist or generally offensive; there are 10
students out of 69 assess that they have extreme high of confidence of being
protected against such threat, 16 students assess that they have high confidence
of being protected against such threat, 29 students assess that they their
confidence of being protected against such threat is uncertain, 10 students
assess that they have low confidence of being protected against such threat
while 4 students assess that their confidence with the threat is very low. With the
average score of 3.26, describes as good: the average of the students in the
sample assess that their confidence of being protected against such threat is
uncertain. In the third item, temptation to participate in on-line gambling: there
are 10 students out of 69 assess that their confidence of being protected against
such threat is extremely high, 17 students assess that they high confidence of
being protected against such threat, 22 students assess that they are uncertain
with their confidence against such threat, 13 students assess that they have low
confidence of being protected against such threat while 7 students assess that
their confidence against such threat is very low. With the average score of 3.15,
describes as good: average of the students in the sample assess that their
confidence of being protected against such threat is uncertain.

In the fourth item, vulnerability to exploitation, such as the physical or


emotional abuse of young individual; there are 11 students assess that their
confidence of being protected against such threat is extremely high, 16 students
assess that they have high confidence of being protected against such threat, 26
students assess that their confidence of being protected against such threat is
uncertain, 11 students assess that they have low confidence of being protected
against such threat while 5 students assess that they have very low confidence
of being protected against such threat. With the average score of 3.25, describes
as good: average of the students in the sample assess that their confidence of
being protected against such threat is uncertain.

34
Table 7. Assess of Internet users to cyber threats

Scale
Items 5 4 3 2 1 Averag Desc
e
1. Invasions of privacy can cause
major damage to the 10 20 31 8 0 3.46 Good
confidentiality of the users
2. Exposure to material considered
to be pornographic, violent, hate- 10 16 29 10 4 3.26 Good
filled, racist or generally offensive
3. Temptation to participate in on-
line gambling 10 17 22 13 7 3.15 Good
4. Vulnerability to exploitation,
such as the physical or emotional 11 16 26 11 5 3.25 Good
abuse of young individual
5. Harassment, including
spamming, stalking and other 12 13 25 16 3 3.22 Good
related threats

Over All Average 3.23 Good

In the fifth item, harassment, including spamming, stalking and other


related threats: there are 12 students assess that their confidence of being
protected against such threat is extremely high, 13 students assess that they
have high confidence of being protected against such threat, 25 students assess
that they are uncertain with their confidence against such threat, 16 students
assess that they have low confidence of being protected against such threat
while 3 students assess that they have a very low confidence of being protected
against such threat. With the average score of 3.22, describes as good: average
of the students in the sample assess that their confidence of being protected
against such threat is uncertain. The over all average of 3.23, describes as good:
average of the students in the sample assess that their confidence of being
against cyber threats is uncertain.

35
Table 7 implies that the fourth year IC students are uncertain with their
confidence of being protected against those cyber threats based on their
assessment regarding on the said matter.

The implication to the result of table 7 is that because of assess of the


students that they have uncertain confidence of being protected against cyber
threats, this makes sense that the students have still issues in confronting those
threats based on the existing preventive and legal supports for the Internet users.

Assess of Internet Users to the state of International Cybercrime law


Issues

The table 8 presented assess of fourth year IC students, who are active
Internet users, to the state of international cybercrime law issues.

The first item, domestic and international law enforcers take cybercrime as
a continuous challenge; there are 14 students assess that they have extreme
agreement with the issue, 22 students out of 69 assess that they have strong
agreement with the issue, 25 students assess that they undecided to agree with
the issue, 8 students assess that they have low agreement with the issue while
zero or none of the students assess that they have a very low agreement with the
issue. With the average score of 3.61, describes as very good: average of the
students in the sample assess that they have strong agreement with the said
issue. In the second item, outdated laws and regulations, weak enforcement
mechanisms for protecting networked information and human rights are one of
missing focus of law enforcers; there are 15 students out of 69 assess that they
have extreme agreement with the issue, 23 students assess that they have
strong agreement with the issue, 26 students assess that they are undecided to
agree with the issue, 4 students assess that their agreement with the issue is low
while only 1 student assess that he/she has a very low agreement with the issue.

36
With the average score of 3.68, describes as very good: average of the students
in the sample assess that they have strong agreement with the said issue. In the
Table 8. Assess of Internet users to the state of international cybercrime law
issues

Scale
Items 5 4 3 2 1 Averag Desc
e
1. Domestic and international law
enforcers take cybercrime as a 14 22 25 8 0 3.61 Very
continuous challenge. Good
2. Outdated laws and regulations,
weak enforcement mechanisms for
protecting networked information and 15 23 26 4 1 3.68 Very
human rights are one of missing Good
focus of law enforcers.
3. Inability to prosecute the cyber
criminals is a result of disregarding Very
the immediate implementation of 13 21 26 7 2 3.52 Good
cybercrime law.
4. Improper implementations of
cybercrime laws compromise the Very
availability, authenticity, integrity 13 23 25 7 1 3.58 Good
and confidentiality of information
systems.
5. Absence of cybercrime laws
threaten to disturb the stable and 16 23 21 8 1 3.65 Very
secure activities in the Internet. Good

Over All Average 3.61 Very


Good

third item, inability to prosecute the cyber criminals is a result of disregarding the
immediate implementation of cybercrime law: there are 13 students out of 69
assess that they have extreme agreement with the issue, 21 students assess
that they strongly agree with the issue, 26 students assess that they are
undecided to agree with the issue, 7 students assess that they have low
agreement with the issue while there are 2 students assess that they have very
low agreement with the issue. With the average score of 3.52, describes as very

37
good: average of the students in the sample assess that they strongly agree with
the issue.

With the fourth item, improper implementations of cybercrime laws


compromise the availability, authenticity, integrity and confidentiality of
information systems; there are 13 students out of 69 assess that they have
extreme agreement with the issue, 23 students assess that they strongly agree
with the issue, 25 students assess that they are undecided to agree with the
issue, 7 students assess that they have low agreement with the issue while only
1 students assess that he/she has a very low agreement with the issue. With the
average score of 3.58, describes as very good: average of the students in the
sample assess that they strongly agree with the said issue. In the fifth item,
absence of cybercrime laws threatens to disturb the stable and secure activities
in the Internet: there are 16 students out of 69 assess that they have extreme
agreement with the issue, 23 students assess that they strongly agree with the
issue, 21 students assess that they are undecided to agree with the issue, 8
students assess that they have low agreement with the issue while only 1 student
assess that he/she has very low agreement with the issue. With the average
score of 3.65, describes as very good: average of the students in the sample
assess that they strongly agree with the said issue. The over all average of 3.61,
describes as very good means that the average of the students assess that they
strongly agree with the issues regarding with the state of international cybercrime
laws.

Table 8 implies that the fourth year IC students assess that they strongly
agree with the issues in the situation or state of international cybercrime law
based on their perception on the current law support for Internet users.

The implication to the result of table 8 is that because of assess of strong


agreement with the said issues in the state of international cybercrime law,

38
students feel that the existing cybercrime laws are still insufficient to address the
growing demand of cyber threats victims to fully seize those cyber predators.

39

You might also like