Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Validated Survey Questionnaires

Validated Survey Questionnaires

Ratings: (0)|Views: 386|Likes:
Published by Anthony
Survey Instrument - Survey Questionnaire
Survey Instrument - Survey Questionnaire

More info:

Published by: Anthony on Mar 04, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less





As the convergence of Internet technology evolves, faster access to easy and dynamicvirtual communication in the cyberworld has become a greater advantage of most people aroundthe world to create and find more opportunities and to build new relationships to most humaninterests. Behind these opportunities, there are alarming threats follow behind that targetindividual in most scenarios in the cyberworld. With regard to this, this study aims to:
Identify several scenarios that one individual is vulnerable to several menace in thecyberworld.
Determine those forms of threats that are nimble to encounter in the cyber activities.
Come up standards of threats in the cyberworld that will serve as preventivemeasure to every Internet user as this study’s recommendation takes place.
Survey Questionnaire on “
Scenarios in the Cyberworld Exposing USePFourth Year IC Students to Vulnerable Menace: Assessment
Part I.
Please fill in the following information. Name (Optional):_________________________ Part II.
Survey QuestionsDirection:
Please put a check mark on your response based on your assessments with regards toyour behavior in surfing the internet treated as risky scenarios.
5Excellent. When the behavior is extremely practiced.4Very Good. When the behavior is highly practiced.3Good. When the behavior is moderate of being practiced.2Fair. When the behavior is below moderate of being practiced.1Poor. When the behavior is never being practiced.
Risky behaviors in surfing the Internet which commonly known ascyberworld54321Online-Chatting
1.Responding with messages in e-mail accounts coming fromanonymous sender 
2.Conversing with online strangers using Instant Message (IM)and other chat applications such as Yahoo Messenger (YM),iChat, skype, and other sites that has chatting features.3.Sending personal photos to strangers online.4.Placing new friends or strangers on buddy lists or list of friends
Online File sharing
5.Uploading of files to untrusted sites6.Downloading of files from untrusted or anonymous source
Online Profile Sharing
7.Posting personal information such as name, address, age,gender, e-mail, and others that do not required at all.8.Posting of personal photos/pictures and other materials thatcan be accessible by anyone9.Not using of strict privacy settings on accounts on socialnetworking sites(e.g. facebook and friendster) and gamingsites(e.g. ragnarok and pokemoncrater)
Website subscribing
10.Signing-up regardless of website's reliability and credibility11.Wanting to use only short and easy to recognize passwords
Please put a check mark on your response based on your assessments in regards withyour awareness in threats against individual posing in the cyberworld.
5Excellent. When the awareness with the threat is extremely high.4Very Good. When the awareness with the threat is high.3Good. When the awareness with the threat is average.2Fair. When the awareness with the threat is below average.1Poor. When never aware with the threat.
Forms of threats 54321
Identity theft.
It involves someone pretending to be someoneelse onilne in order to steal money or get other benefits.2.
People keep on sending junk mails and other unsolicited mails.3.
Depiction of explicit sexual subject matter for the purposes of sexual excitement.
It is a software made by a person or group of peoplethat gathers information about people without their knowledgeand it tracks your movements and habits on the Web.5.
A person who followed and pursued onlinesomeone else.6.
Internet Sales Fraud.
It refers generally to any type of fraudscheme that uses one or more components of the Internet suchas chat rooms, e-mail, message boards, or Web sites to presentfraudulent solicitations to prospective victims or to other connected with the scheme.7.
Chain Letters.
Consist of a message that attempts to inducethe recipient to make a number of copies of the letter and then pass them on to as many recipients as possible.8.
is being cruel to others by sending or  posting harmful material or engaging in other forms of socialcruelty using the Internet or other digital technologies. 
: Please put a check mark on your response based on your assessments with regards toyour assessment to cyber threats posing in the cyberworld.
5Excellent. When the confidence of being protected is extremelyhigh.4Very Good. When the confidence of being protected is high.3Good. When the confidence of being protected is uncertain.2Fair. When the confidence of being protected is low.1Poor. When the confidence of being protected is very low.
Assess of Internet users to cyber threats54321
1.Invasions of privacy can cause major damage to theconfidentiality of the users2.Exposure to material considered to be pornographic, violent,hate-filled, racist or generally offensive3.Temptation to participate in on-line gambling4.Vulnerability to exploitation, such as the physical or emotionalabuse of young individual5.Harassment, including spamming, stalking and other relatedthreats

Activity (7)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Anthony liked this
Jade Garcia liked this
fanget08 liked this
All Shouted Tama liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->