You are on page 1of 34

SENIOR HIGH SCHOOL – ICT

AWARENESS OF ONLINE SAFETY ON SOCIAL MEDIA


PLATFORMS OF GRADE 12 ICT STUDENTS FROM
INFORMATICS COLLEGE NORTHGATE

Presented to the Faculty of Senior High School


Informatics College Northgate

In Partial Fulfillment of the


Requirements for the Research Project

By:

Abiera, Shawn Ezekiel D.


Aguila, Vincent I.
Pasatiempo, Shaquelle F.
Puyat, Danielle Anne Merielle M.
Rocaberte, Jhalyn V.
Villaflor, Carl Joshua

January 2019
SENIOR HIGH SCHOOL – ICT

Chapter 1

THE PROBLEM AND ITS BACKGROUND

Introduction

Social Media is a catchall term used to categorize websites that allow

you to interact with people online. These interactions vary from each social

media site. You can interact with your friends through instant messaging,

sharing of photos, or posting whatever you wish on an online platform. The

biggest appeal of these types of sites is that they make social interactions

much easier and much faster, especially if you're messaging a friend or

relative that lives far away.

Computers and gadgets developed over the years and a lot of

functions are formed, including social media. They are widely used in this

generation especially the millennials, who commonly use it to communicate

with their friends and families. Some people use it without thinking twice of

the risks that may happen if they were to be too careless when sharing

information online. Some problems the netizens are experiencing on social

media are identity theft, card number theft, personal information leakage,

scamming, and the likes.

Online Safety centralizes on every netizen's awareness to build one’s

personal safety against risks to private information and property that are

connected to the internet. It is also the norm to protect oneself against


SENIOR HIGH SCHOOL – ICT

unlawful acts through digital means. In uk.norton.com (2016), it was stated

by Norton-Team that with more than 1.5 billion users on Facebook, 1000

million on WhatsApp, 400 million on Instagram and 320 million on Twitter,

it’s fair to say that social networking has been globally embraced. As social

media becomes chocked with our daily lives and personal information, it’s

important to think about social safety for you and those you care for.

Background of the Study

In this study, the researchers discussed on how online safety and

information security powerfully built and if security measures and privacy

protection is reliable enough for our data or information to be safe, but any

security has weaknesses that’s a common knowledge. Information security

means confidelity which by means protecting information from any

unauthorized parties, integrity or the protection from keeping unauthorized

parties from changing information, and lastly availability the means of

information being available to anyone with permission and if requested

(Infosec.gov.hk, 2002). People like “hackers” have the ability to penetrate

security measures that laid out by any computer security expert, and

hacking is very common today. Social medias are very easy target, years

have passed from 10% claiming that they use at least one social media from

the internet and more than a decade later it increased to 84% according,

and 9 out of 10 also limit what they share online for anonymity and to avoid

being hacked but, somehow, they are outwitted by hackers, 2 out of 3 U.S
SENIOR HIGH SCHOOL – ICT

adults who have social media accounts said that their accounts have been

hacked. In short, prior to 2013, legislatures and regulators in the United

States appeared to be more concerned about the data they could glean from

social media than protecting privacy of the average citizen in the online

world (Americanbar.org, 2014). The Federal Trade Commission (FTC) and

state attorneys are the ones who protect and regulate social medias, these

enforcement are have only tended to enforce the privacy policies that social

medias to enforce, “However, if the social media site had a vague privacy

policy that never clearly disclosed all of the information it gathered, or if the

site gathered and sold massive amounts of personal data from its users, and

the site revealed its behavior in its privacy policy, then no enforcement

action would be initiated because the site was not breaking any known

laws.” (Americanbar.org, 2014). Its matter of how privacy policy is

misinterpreted, data is retrieved and how what they do about it. However, in

the Philippines, Cyber-Bullying phenomenon has emerged from different

social media using different gadgets and devices, simply because of this

raising phenomenon, Cyber-Safety is at risk. Studies about phenomena like

cyber bullying, cyber safety and online safety are very scarce or limited.

Witkus (2012; in Roman, 2005) stated that in a study among Catholic

students aged 15-24 and one-third of people interviewed in Manila

subscribed to religious text message services while the other third

subscribed to other text message service for finding friends, strangers,

romantic and sexual partners. Because of this, it drew attention of the


SENIOR HIGH SCHOOL – ICT

church ministry to send religious text messages to teens for evangelical

purposes and to remain explicit media regarding violence and nudity. A

research study among 7,388 Filipino adolescents found that bullying

victimization and physical fighting resulting victims who were bullied are less

likely to attend school. This study examined and compared traditional

bullying that cyber bullying is far more insidious, but it remains inconclusive

because of authenticity and quantity of studies conducted on this topic. This

phenomenon is still an issue in the Philippines and whether if it is even a

crime to Philippine law (Romulo, 2010). Using social media Web sites is

among the most common activity of today's children and adolescents. Any

website that allows social interaction is considered a social media site,

including social networking sites such as Facebook, MySpace, and Twitter;

gaming sites and virtual worlds such as Club Penguin, Second Life, and the

Sims; video sites such as YouTube, and blogs. Such sites offer today's

youth a portal for entertainment and communication and have grown

exponentially in recent years (Pediatrics, 2011). Nowadays social media

sites can be found anywhere and they could be used for different purposes.

They had made many improvements due to the ongoing development of

technology compared to the past years. There are activities that could be

done with a few limits. The privacy policies are properly constructed for the

netizens. Social media can easily be access in just a short period of time.

The social media affects the online environment for the millennials because

there is such common interest in the impact of the internet on people’s


SENIOR HIGH SCHOOL – ICT

relationship and their interaction with one another. As technology continues

to evolve, it is easy to feel left behind. As of now, we are in the state of

modernization where technology can make things easy for us. With the help

of the internet, we are capable of knowing or searching for our special needs

in a creative and faster way. Everyone can have an easy access on social

media may it be teenagers, adults, children, and even the elderly. Internet

can be useful and harmful to people depending on the way they use it.

There is a possibility that your information may spread due to the

hackers without your knowledge if your security is not secured, a common

problem encountered by the netizens. Maximizing your safety on social

media site(s) is important in order to ensure the security of your personal

information. Information security involves managing risk. Every risk is

considered a deceiving kind. Sensitive information must be kept and it

shouldn't have easy access when it comes to alteration and transferring. A

proper permission must be encountered before handling information

(www.technopedia.com).

The researchers would like to increase the awareness of the students

with the research in order to lessen the amount of those who are victims of

hacking and information leakage especially in the times where technology is

more advanced and more complicated compared to the past.


SENIOR HIGH SCHOOL – ICT

Conceptual Framework

INPUT PROCESS OUTPUT

Demographic Questionnaire
Profile ❖ Percentage
❖ Age Statistical of Grade 12
❖ Sex Treatment ICT students
❖ Slovin’s
Awareness of who are
Formula
the Respondents ❖ Percentage aware
❖ Security ❖ Weighted regarding
❖ User’s Mean their safety
Profile ❖ Pearson on social
❖ Privacy Correlation media
Policy Coefficient platforms
Is there a
significant effect
on the
awareness of the
students
regarding their
safety on social
media
platforms?

Feedback

Figure 1. Research Paradigm on the awareness of online safety


on social media platforms of Grade 12 ICT students from
Informatics College Northgate
SENIOR HIGH SCHOOL – ICT

Figure 1 shows the Input-Process-Output of the research. The

researchers conducted a survey in order to determine the awareness of the

students regarding their safety on social media platforms.

Statement of the Problem

The study was conducted in order to determine the awareness of the

Grade 12 ICT students regarding online safety on social media of

Informatics College Northgate school year 2018-2019.

The study answered the following questions:

1. What is the demographic profile of the respondents in terms

of:

1.1. Age

1.2. Sex

2. What are the awareness of the respondents in using social

media in terms of:

2.1. Security

2.2. User’s Profile

2.3. Privacy Policy

3. Is there a significant effect on the awareness of the students

regarding their safety on social media platforms?


SENIOR HIGH SCHOOL – ICT

Hypothesis

For better understanding of the study, the researchers formulated the

following hypotheses:

Ha: There is a significant effect on the awareness of the students regarding

their safety on social media platforms.

Ho: There is no significant effect on the awareness of the students regarding

their safety on social media platforms.

Scope and Limitation of the Study

In this study, the Grade 12 ICT students from Informatics College

Northgate are taken as subject and respondents. The researchers used the

Slovin’s formula with 5% as the margin of error in order to get the total

sample of 154 respondents, with 22 students from each section. Due to the

limited time for the research to be done, the researchers are narrowing the

study to Informatics College Northgate Inc. Indo China Drive, Northgate,

Cyberzone, Filinvest, Corporate City, Alabang, Muntinlupa City. The

researchers focus on determining the safety and awareness of the Grade 12

ICT students of Informatics College Northgate on social media platforms.

The researchers aim to inform the students the dangers that could occur on

different social media platforms and to give guidelines on how to secure

their safety. Furthermore, this study is quantitative in nature. The


SENIOR HIGH SCHOOL – ICT

researchers use survey method in order to gather the information needed in

the research.

Significance of the Study

The study would benefit the following in terms of:

a.) The students. Students would be more aware of their

safety in social media platforms thus securing their welfare.

b.) The parents. Parents would be able to know what to look

for when it comes to monitoring their children's social media

accounts.

c.) The researchers. The researchers of this paper would be

much more knowledgeable when it comes to protecting their own

data and information online.

d.) The future researchers. The future researchers would

gain more knowledge and have a reference for their research.

e.) The community. The community would be able to increase

their understanding and convey it to the public.

f.) The developers. The developers would be able to improve

the security and safety on social media platforms.

g.) The school administrators. School Administrators would

be able to help educate their students in practicing proper online

etiquette and safety.


SENIOR HIGH SCHOOL – ICT

Definition of Terms

a. Operational Definition

1. Social Media. Computers and gadgets developed over the years

and a lot of functions are formed, including social media.

2. Internet. Online Safety centralizes on every netizen's awareness

to build one's personal safety against risks to private information and

property that are connected to the internet.

3. Hackers. People like “hackers” have the ability to penetrate

security measures that laid out by any computer security expert, and

hacking is very common today.

4. Netizens. The privacy policies are properly constructed for the

netizens.

5. Online Safety. The researchers discussed on how online safety

and information security powerfully built and if security measures and

privacy protection is reliable enough for our data or information to be safe,

but any security has weaknesses that’s a common knowledge.

6. Information. There is a possibility that your information may

spread due to the hackers without your knowledge if your security is not

secured, a common problem encountered by the netizens.

7. Information Leak. Some problems the netizens are experiencing

on social media are identity theft, card number theft, personal information

leak, scamming, and the likes.


SENIOR HIGH SCHOOL – ICT

8. Scamming. However, the effects of spreading the information, or

other problems like identity theft and scamming, is unhealthy for the

person’s mental health.

9. Privacy Policy. Its matter of how privacy policy is misinterpreted,

data is retrieved and how what they do about it.

10. Identity Theft. However, the effects of spreading the information,

or other problems like identity theft and scamming, is unhealthy for the

person’s mental health.

b. Conceptual Definition

1. Social Media. Social media are websites and applications that

enable users to create and share content or to participate in social

networking.

2. Internet. The internet is an electronic communications network that

connects computer networks worldwide.

3. Hackers. A hacker is an expert at using computer who illegally

gains access to and sometimes tampers with information in a computer

system.

4. Netizens. A netizen is a person who actively uses the Internet

especially in a proper and responsible way.

5. Online Safety. Internet safety, or online safety, is the knowledge of

maximizing the user's personal safety against security risks to private


SENIOR HIGH SCHOOL – ICT

information and property associated with using the Internet, and the self-

protection from computer crime in general.

6. Information. Information is the communication or reception of

knowledge or intelligence.

7. Information Leakage. Information Leakage refers to a class of

software vulnerabilities in which application-sensitive information is

unintentionally exposed to end-users.

8. Scamming. Scamming is a fraudulent or deceptive act or

operation.

9. Privacy Policy. A privacy policy is a statement or a legal

document (in privacy law) that discloses some or all of the ways a party

gathers, uses, discloses, and manages a customer or client's data.

10. Identity Theft. Identity theft is the fraudulent acquisition and use

of a person's private identifying information, usually for financial gain.


SENIOR HIGH SCHOOL – ICT

Chapter 2

REVIEW OF RELATED LITERATURE

This chapter explores various related literature and studies in order to

give insights in the research of the present study. The researches have read

through several theses, web articles, and books published in the Philippines

and in other countries to gather information about studies conducted in the

past. Presented below are the works from the previous researchers that

have implications and significance to this particular study.

Related Literature – Foreign

“As Internet use by children and teenagers increases, so do concerns

about their online safety. Providing a safe environment requires an in-depth

understanding of the types and prevalence of online risks young Internet

users face, as well as the potential solutions for mitigating risks.

A team at the Luskin Center led by John Villasenor conducted a

review of existing research on online safety and then identified knowledge

gaps and recommendations for specific areas of research to further the

policy dialogue regarding online safety. These findings and

recommendations are summarized in a paper released today by the

Brookings Institution.
SENIOR HIGH SCHOOL – ICT

This paper is timely because, despite the significant amount of

research on these risks, improving youth Internet safety remains a

challenge. In part, this is because definitions of terms and categories

relevant to online safety, such as cyberbullying, often vary, making the

comparison of statistics and findings among sources imprecise. In addition,

there are complex overlaps among different online safety subtopics.”

(Farrukh, Sadwick, Villasenor,2014).

We all know that internet is very popular to us in the modernization

period. Many things have changed over the years. Due to modernization

many things have also been accelerated in office, agriculture, factory, and

others. However, this time many people are losing their jobs because of

machinery in every part of company. Just like in the internet. They send

letters in the early times but nowadays, people send messages over the

internet instead of sending messages through letters. There so many social

media sites that is in demand like Facebook, Twitter, Instagram, and other

social medias. In here you can send your message in just a second with the

access of the internet. Although using social media have advantage and

disadvantages because internet can access anything that could be harmful

or good for the user. One of the disadvantages is that you can access the

profile of anyone else and know their information. One of the advantages of

this is you can reach your love ones easily by using video call or chatting

with them, especially those who are abroad. They can easily get in touch

with their family in one click. But being careful of sharing our personal
SENIOR HIGH SCHOOL – ICT

information online is a must because the dangers online are the same as

offline.

“Researchers suggests some differences between social media and

the rest of ‘online media’. Social media call for a new audience relationship

framework. Some rules seem to be e

merging for environments shaped by such audiences: authenticity,

participation, transparency and relevance. There seems to be a premium in

avoiding commercial interruptions. Communications between individuals that

are potentially always connected to the Internet, and often on the move, will

be an area of growing interest for researchers.

Market research using social networks is an issue that will also

receive more attention. However, the ethical debate is already here. There

are two nontrivial issues: the consideration of these forums as public or

private and what constitutes “informed consent” in the net (Kozinets, 2002:

65). These concerns can be added to others related with online research in

general, which have generated an important conversation (Gold, 2009).

Another area with significant development is text mining in the net

(Anderson, 2009; Weare and Lin, 2000: 289). The enormous amount of

information generated in by internet users will require better analytics

techniques, with stronger mathematical tools and techniques (O. Connor et

al, 2010:8).

Consumers are driving markets, and the Internet changes the way

consumers learn, gather information and relate to each other. Advertising


SENIOR HIGH SCHOOL – ICT

tries to unleash consumer participation in all the brands’ contact points.

Social networks have become a significant research tool and a way to

communicate directly with consumers. Strategic planners in advertising use

them for consumer intelligence, trying to deepen users’ knowledge and this

is an area for further research.

In social networks, although their audience growth has been

spectacular, there are still significant business model doubts. Their early life

has been fostered by large bets by investors based in non-proven

expectations about their potential. But this market situation will not last

forever. Therefore, research about advertising effectiveness will be crucial.

We have already some indications about the low level of click-through rates

for banners in social media. How are going to be the most interesting

advertising messages in a social media environment? What is it going to be

effective? Advertising is a key source of income for social media survival but

interruption-based models are unlikely to work. And the proper measures to

track marketing ROI must be found (Gold, 2010).

Nevertheless, researchers will still be looking to understand better not

as much the ever-changing technology, but audience relationships. Markets

have become conversations and the consequences are far-reaching. It is

interesting to see to what extent we go back to the beginning. From mass

communication media the flow of messages goes back to person to-person

communication, as Lazarsfeld explains in his classic work “Personal

Influence” (1955). When Lasswell defined mass media rules, he was


SENIOR HIGH SCHOOL – ICT

indicating that a radio station or a newspaper could be compared with

persons communicating messages. But now the emphasis is again in

person-to-person communication and it is increasingly clear that an

individual that reads something and discusses it with others can’t be

considered only as a social entity, analogue to a newspaper or magazine: it

needs to be studied in its double capacity as communicator and contact

point in the mass communication network (Lazarsfeld, 1955: 1).

The need for human contact and interaction is a constant that always

finds new ways to express itself. Some could argue that the present passion

for social media will give way to some skepticism. But we seem to be

witnessing more than an ephemeral passion. Qualman (2009) already

describes a “social media revolution”. In any case, and paraphrasing

Lazarsfeld, we have person-to-person communication back again at the very

core of media, communications strategies, and academic conversations.”

(Latre, 2011).

We can’t even imagine the life without social media and internet.

Internet is nothing less than a boon for person related to any field -- be it

student, employee or anything else. We can stay updated with the latest

happenings in the world, can stay connected with the world all the time, can

get knowledge about anything we want and we can do lot other things with

the Internet. But as you know, nothing comes with ‘only’ benefits. Everything

has got its negative points as well, and so does the Internet. But all of the

negative effects that have on the social media, there is still a positive
SENIOR HIGH SCHOOL – ICT

purpose like you can easily communicate with your family or others

everywhere as it is portable and for the emergency purpose, we can use the

internet for banking work, and the teacher and student also benefit to from

being able to research any topic from library catalogues and the worldwide

web.

Barnes (1954) indicates that social network theory perspectives

social relationships in terms of nodes and ties. Social community is a social

shape made up of individuals (or agencies) called “nodes”, that are tied

(connected) by means of one or greater specific sorts of interdependency,

consisting of friendship, kinship, not unusual interest, financial trade,

likes/dislikes, or relationships of ideals, expertise or status. furthermore

Abhyankar (2011) talked about that from the very starting; humans always

related themselves to some shape of social structure as they developed

throughout generations. All people crave social life, but now not all may

have time and sources to experience social circle wherein they are able to

speak, collaborate and freely express themselves with like-minded friends

for pleasant their exclusive desires like protection, property, capabilities,

relationships, technology and technology, events, politics, records, literature,

artwork, and so on. there may be no give up to the listing of fundamental

ideas that may drive humans to create systems for verbal exchange and

interplay, together useful for the whole network.

In keeping with Abhyankar (2011), “Social media” is an online

community where humans across the globe (irrespective of demographic


SENIOR HIGH SCHOOL – ICT

and geographical differences) can develop community with distinctive

businesses or people for a particular reason. It creates a series of

linked/linked entities (individuals/corporations, communities, boards,

corporations etc.) like a tree with more than one branches and nodes. Those

branches are the numerous agencies, communities, forums and so on. that

an individual intends to sign up for. for this reason, a social community

represents relationships between nodes (humans) and flows among the

branches (businesses, communities, boards, companies etc.).

DiMicco and Millen (2007) adds that social community sites were

extensively studied from a patron attitude despite big investment by way of

many organizations in social generation, and some of high profile failures

and embarrassments stemming from their use. Of the few present

researches of social network web site use in companies, there are a couple

looking on the makes use of public social network websites (such as

Facebook and LinkedIn) in an organizational context. Skeels and Grudin

(2009), and a handful extra looking at makes use of private, inner sites

Brzozowski (2009).

A social networking carrier is an online carrier, platform, or web page

that focuses on constructing and reflecting of social networks or social

relations among human beings, who, as an example, share pursuits and/or

activities. A social community provider consists of an illustration of each user

(often a profile), his/her social links, and a ramification of additional services.

maximum social community services are net-primarily based and provide


SENIOR HIGH SCHOOL – ICT

way for customers to engage over the net and instantaneous messaging.

Online network services are now and again considered as a social network

provider, though in a broader feel, social community carrier normally method

a character-centered carrier while on line network services are institution-

focused. Social networking web sites allow customers to percentage

thoughts, activities, events, and interests inside their character networks.

Social media are becoming increasingly popular among politicians and their

organizations as a means to disseminate political messages, learn about the

interests and needs of constituents and the broader public, raise funds, and

build networks of support. These activities often take place on privately run

social networking sites that allow political figures and institutions to

communicate with the public in unmediated, high-profile fora. In Canada,

many parliamentarians have created accounts on popular sites such as

Facebook, Twitter, and MySpace and Flickr. The content posted on these

sites may relate to policy issues and the official work of politicians or to

aspects of their personal lives (Clark, 2010).


SENIOR HIGH SCHOOL – ICT

Related Literature – Local

In this Digital Age, everyone seems to make his or her presence felt

in the virtual world to validate his or her existence. Getting connected

through social networks and blog sites seems to be the norm, not just

among individuals, but also among companies and businesses. With this,

the Honor Award Program (HAP) of the Civil Service Commission (CSC) has

ventured into social media to strengthen its promotional strategies of the

Program.

Commission on Information and Communications Technology (CICT)

Chairman Ivan John E. Uy said that social networking sites can be a useful

tool in public service delivery. “The use of Facebook and Twitter in

government offices provides better access to the public,” he said in an

interview aired over DZRB. There are 24 million Internet users in the

Philippines, 51% of which use social networking sites. Social media is an

effective platform for information dissemination and engagement. “It’s about

time to engage with our stakeholders. There are 1.4 million government

workers all over the country. Filipinos should hear of the inspiring stories of

our outstanding public servants. Being on Facebook is one way to reach out

to the public that we serve,” said CSC Chairman Francisco T. Duque III. The

Pangasinan provincial government is vigorously pushing people

empowerment, including generating greater public awareness on various

government programs through the use of social networking sites. Pursuing

this thrust, the provincial government led by Gov. Amado Espino Jr.
SENIOR HIGH SCHOOL – ICT

conducted a multi-sector bloggers’ orientation seminar last June 1 at the

Pangasinan Development and Training Center here. The participants

included provincial department heads, chiefs of hospitals, administrative

officers and staff, and IT personnel of different departments of the provincial

government. Vangie Padilla, a social media specialist and resource speaker,

said Espino wanted to raise the level of quality of public service given to the

2.6 million College of Arts and Science Bachelor of Science in Foreign

Service. Since there are now some 300,000 Pangasinenses who are on

Facebook, Padilla said Espino thought of coping with the times by “switching

from the traditional to cyberspace.” “Since Pangasinan is now dubbed as

No. 1 province in many aspects, Gov.Espino opts to explore greater heights

of bringing government service closer to the people, having seen the intense

impact of social media like Facebook, Twitter and YouTube among

Pangasinenses,” Padilla said. Coinciding with the half-day orientation was

the launching of Espino’s social networking sites –

www.twitter.com/governorespino, www.youtube.com/governorespino, and

www.facebook.com/governorespino. The public is invited to get in touch with

the governor, learn more about the province and the various programs and

projects of the provincial government using these social networking sites in

just few clicks. Provincial employees lauded the project, expressing their full

support to the cause by putting their own group page so they can post their

regular activities and enable the public to keep track of the efforts of the

provincial government. A series of orientation seminars is underway for all


SENIOR HIGH SCHOOL – ICT

provincial employees, high school and college students, Sangguniang

Kabataan officials, and various sectors in the province. Tutorial for

government employees on social networking is also set to fully realize the

project.

The Philippines has been on the World Wide Web since the early

90s.MozCom was the primary commercially available Web supplier within

the Philippines, beginning in 1994. In early 2000, through the Electronic

Commerce Act or Republic Act 8792, the Philippine government

commanded that every office ought to have a nearness on the internet. This

was to permit the open get to data as well as a implies to communicate with

their properly chosen lawmakers. There are different levels of web nearness

required of the government. The hierarchy, from the foremost essential to

the most elevated, is: Developing Web Nearness level may be fair a basic

inactive site with subtle elements of the particular organization and contact

data.

The Department of Education (DepEd), in partnership with a non-

government organization advocating children’s rights, launched a manual on

online safety for public school students to prevent Internet-related child

abuse.

DepEd and the Stairway Foundation have produced the CyberSafe Project

Manuals, which contain individual lesson plans targeting Grades 5 to 6 and

junior high students.


SENIOR HIGH SCHOOL – ICT

The manual discusses online privacy and the risks students face

online, such as cyber bullying, “sexting” and child pornography.

It aims to develop students’ capacity to stay safe from online child abuse

and harm, and at the same time educate teachers and parents about online

safety.

Education Secretary Armin Luistro noted that nine out of 10 Filipino students

use the Internet.

“It is important to educate students of the risks they face online and

involve their parents and teachers in taking an active role in child

protection,” Luistro said.

Lars Jorgensen, executive director of Stairway Foundation, said the role of

parents is crucial in promoting online safety among children.

“According to our survey, 50 percent of the kids are given any kind of

advice on how to properly use this very unrestricted space. And that’s scary,

because it is full of dangers,” Jorgensen said.

“When a child is threatened, they need to have a trusted adult to go

to. That is why parents need to also know these things, so their children can

go directly to them knowing their parents can relate to them,” he said.

According to DepEd, the CyberSafe manual “will be continuously

updated to address the ever-changing landscape of online child protection

and to cover other grade levels.”


SENIOR HIGH SCHOOL – ICT

Related Studies – Local

Online security protocols are not perfectly created and can be

breached, but users also control over their security, what they share, and

information they edit. Security breaches can be cause of many things

including behavior of users, ethnic groups, and nationalities. Fidelino and

Mediavillo (2017) identified different types of privacy behavior and fall into

different kinds of categorization.

The study classified into two which what information is shared

(posting of personal details) and information control (what information,

where to post, and who can view it). it also tackled in the study of self-

withdrawal of sharing information without consent. Other behavior identified

including deleting friends, editing post or statuses, fake information, blocking

contacts.

This pilot contemplates expected to test the adjusted research

toolboxes from the EU Children Online in the Philippines and thusly, to

deliver a confined research tool compartment that can be utilized for a

national report. The investigation was led in chosen barangays in Metro

Manila and close-by territory of Pampanga.

It included accomplices from 3 look into destinations, one for the

psychological research facility consider in Malate, Manila and 2 for the pilot-

testing study – one in Sta. Ana, Manila and the other in Mexico, Pampanga.
SENIOR HIGH SCHOOL – ICT

The aftereffects of this report ought to be deciphered with alert because of

the little example of members included and in that capacity are not delegate

of the number of inhabitants in youngsters who are online in the Philippines.

Related Studies – Foreign

Youngsters begin to utilize the Web ever-prior, or, in other words it

has not been built up that youthful youngsters have the ability to connect

with online securely. In this proposition I focus on how Finnish youngsters

matured 10-12 approach and order online security, how their online

wellbeing is intervened at home and in schools, and how this intervention

could be bolstered. I utilize for the most part subjective information gathering

and examination strategies. I utilize Nexus examination as my hypothetical

focal point, as it suits inquire about where center is around complex social

activity.

Youngsters who took an interest in my examination detailed being gifted in

online security. They believe in their aptitudes; as do guardians and

instructors, to a lesser degree. Kids additionally intervene online wellbeing

inside their own gatherings.

At home, youngsters' Web utilize is observed and restricted, but

guardians support dynamic intercession, for example, talking and offering

assistance.

Specialized parental controls are disagreeable. To some degree,

youngsters and guardians differ on how much parental intercession is given.


SENIOR HIGH SCHOOL – ICT

In schools, confinement and checking are utilized, e.g., concerning cell

phones, however center is around dynamic intervention. Instructors trust the

message is best gotten when fixing to youngsters' encounters.

Kids say they like learning while at the same time doing, and seek

after a positive tone and solid guidance from online security training.

Instructors feel alone in choosing how online wellbeing is educated and wish

for help. My outcomes give suggestions with respect to how we outline

mediational implies for guaranteeing kids' online security. While interceding

on the web wellbeing, grown-ups are adjusting between essential control,

adoring trust, and contribution. While some control is called for, I urge

grown-ups to wind up associated with kids' online lives, and to manufacture

confiding seeing someone.

To help online security intervention at home, I recommend a mix of

specialized and dynamic intercession that serves the two guardians' and

youngsters' interests, gives guardians instruments for guaranteeing kids'

wellbeing, and encourages trust working between relatives. To help online

wellbeing intercession at school, I recommend a more deliberate way to deal

with online security, and additionally instructing practices that encourage

dynamic intervention, fit the kids' reality, and offer to educators.


SENIOR HIGH SCHOOL – ICT

Chapter 3

RESEARCH METHODOLOGY

The chapter contains the research design and methodology used in

the conduct of this study. It incorporated the sources of data, the research

subjects, the research locale, procedure of the study, as well as the

statistical treatment employed in processing the data. This chapter shows

how the researcher came to the necessary data for this study, and how

these data were analyzed, interpreted and presented in the easiest way

possible.

Research Design

This study is quantitative in nature. The researchers used the survey

sampling method of conducting a research, specifically the descriptive

survey. The principal purpose of the research was to determine the

awareness of safety on social media platforms of Grade 12 ICT students.

Quantitative research uses quantitative procedures where the

respondent’s traits are translated numerically. It focuses on the analysis and

interpretation of the raw numerical data gathered based on statistical

outcomes. (Colombo Plan Staff College,2009)

Cristobal (2013) cited Gay (1976) who defined descriptive research

as involving the current status of the subject of the study. This method is
SENIOR HIGH SCHOOL – ICT

designed to gather information or condition existing at a particular period. In

the same book by Cristobal, he also cited Travers (1978) who considered

the descriptive method of research as a design that describes the nature of

a situation as it exists at the time of the study and explores the causes of a

particular phenomenon.

Research Instrument

The researchers used the survey method to gather the demographic

profile of the students as well as to determine the awareness of safety on

social media platforms of Grade 12 ICT students of Informatics College

Northgate.

The tool used by the researchers consisted of two (2) parts: the

profile of the students and views of the respondents. The researchers

prepared fifteen (15) questions that will determine the awareness of the

Grade 12 ICT students regarding their safety on social media. In order to

avoid indolent answers from the respondent, the researchers used a Likert

scale type to elicit the necessary information.

The researchers used a non-probability random sampling – that is,

not all members of the population are given a chance of being selected as

samples. Particularly, the researchers used the convenience sampling,

wherein the students who were at the moment present during the research

were chosen as respondents.


SENIOR HIGH SCHOOL – ICT

It also means that anyone who answers the questionnaire given will

be gladly accepted by the researchers.

The respondents’ online safety is determined through tallying the

value for their responses to each item. The answers in which they gain the

highest score will be the determined awareness of their safety on social

media platforms. The rating system used or the questions is 5 for Always, 4

for Frequently, 3 for Sometimes, 2 for Seldom, and 1 for Never.

The instrument was validated by Sir Phil Christian T. Santos,

Research Project teacher at Informatics College Northgate, for the survey

questionnaire to be used as a research instrument.

Population and Sample Frame

The respondents of the study were the selected Grade 12 ICT

students of Informatics College Northgate since majority of the students use

social media in their everyday life. The study was conducted only for the

School Year 2018-2019. There were 243 Grade 12 ICT students in total and

using the Slovin’s formula, the sampling size is 154 respondents, with 22

students from each section. The study was conducted in Informatics College

Northgate S.Y. 2018-2019. The school is offering IT courses that is related

to the online safety on social media platforms.


SENIOR HIGH SCHOOL – ICT

Procedure of the Study

The researchers first chose a research problem related to their

strand, Information and Communication Technology (ICT). Then, the

researchers came up with three (3) research questions that would be

answered in the research and have the approval of the teacher. The next

step is to choose the data gathering method in order to determine the type

of research. The researchers then determine the number of samples and

proceeds to start the first chapter of the research up to the third chapter.

The study was carried out at Informatics College Northgate in Muntinlupa

City, Philippines. The making of the three (3) chapters lasted for 7 months.

Statistical Treatment

The researchers used the following statistical treatment:

Slovin’s Formula. It is used to calculate an appropriate sample size

from a population. The formula used to compute the Slovin’s Formula is

shown below:

𝑁
n=
1 + 𝑁(𝑒)2

Where in:

N = Sample size

Wher en = Total number of respondents


SENIOR HIGH SCHOOL – ICT

Wher ee = Sampling error

Percentage. Cristobal (2013) mentioned Calmorin (1997) who stated

that percentage is a way of expressing a population, a ratio, or fraction in

relation to a whole with 100 as the denominator.

𝐹
P= x 100
𝑁

Weighted Mean. It refers to the set of data according to Broto (2006)

taken from the average of the population (Cristobal, 2013). The formula

used to compute the weighted mean average is shown below:

𝑅𝑎𝑡𝑒𝑥𝐹𝑟𝑒𝑞𝑢𝑒𝑛𝑐𝑦
Wx =
𝑇𝑜𝑡𝑎𝑙𝑁𝑢𝑚𝑏𝑒𝑟𝑜𝑓𝑅𝑒𝑠𝑝𝑜𝑛𝑑𝑒𝑛𝑡𝑠

Where W = Weighted Mean

Wh erefx = sum of the product of the frequency with weights

Whe reN = sample size

The data for this study were gathered from the 154 students from

Grade 12 ICT students of Informatics College Northgate who were present

during the administration of the questionnaire.

The researchers employed the Likert scale which has the following

descriptions and verbal interpretations:

Value Scale Abbreviations Verbal


Interpretations
5 4.50 - 5.00 A Always
4 3.50 - 4.49 F Frequently
3 2.50 - 3.49 So Sometimes
SENIOR HIGH SCHOOL – ICT

2 1.5 - 2.49 Se Seldom


1 0.01 - 1.49 N Never
Pearson Correlation Coefficient. It is used to measure the strength

between variables and relationships. The formula used to compute Pearson

R Formula is shown below:

𝑁∑𝑥𝑦 − (∑𝑥 )(∑𝑦)


𝑟=
√[𝑁∑𝑥 2 − (∑𝑥)2 ] [𝑁∑𝑦 2 − (∑𝑦)2 ]

Where N = number of all respondents

∑ = denotes the summation of the items indicated

∑x = denotes the sum of all x scores

∑x2 = denotes the sum of all squared x scores

∑y = denotes the sum of all y scores

∑y2 = denotes the sum of all squared y scores

(∑y)2 = denotes the squares of the sum of all y scores

∑xy = denotes the sum of all xy scores

You might also like