You are on page 1of 5

CHAPTER I

INTRODUCTION

Introduction

To define generations that are affected by information and communication

technologies, there is no explicitly preferred term and its time limits. Literature indicates

the following naming generations: Millennium Generation, Generation Y, Digital

Generation, Online Generation. As a synonym homeland generation are using the term

Generation Z, Post-Millennials, Net-Gen, digital natives. The term that best describes

today's generation of children is Generation Z, which we are referring to those children

and adolescents who have a strong bond to information and communication technology.

Mc'Crindle defines the generation Z with the help of the terms global, digital and visual .

It is a generation, which has access to smartphones, smart phone, through which They

can connect with the whole world. Turner (2015) argues that the media of the current

generation Z can help to escape from the emotional and psychological problems they

face in offline mode. Generation Z uses the Internet to retrieve information and

communication with others.

Mobile technologies, social media (internet, social networks, etc.) and the use of

the Internet has become more important in the lives of teenagers in the last decade.

Use of social media strengthens linkages with friends and helps develop new ones.

Generation Z communicates with people who would not meet in the real world through

the media. This communication and development virtual relationships and friendships

are one of the characteristics generations Z and their standard. Cyberspace on one side
provides new possibilities and forms of communication that beyond physical,

geographical and cultural communication barriers, to the other is a threat to man for his

impersonality, anonymity and declining interest in interpersonal personal

communication.

Findahl in the post Preschoolers and the internet. Will children start to use

internet when they start walking? Submit data, according to them even in countries,

which are covered by Internet connection at a low level, children are active users of

internet. For example China, where only 10% of the adult population are connected to

the Internet, yet it is used by 39% of children. In most developed countries, most

children over the age of 12 regularly enjoy the internet. It is clear, therefore, that the

generation of contemporary children grows upright contact with the Internet.

Statement of the Problem

This paper seeks to contribute to a better understanding of threats and their

attributes (motivation and capabilities) originating from various intruders like

organizations and intelligence. The process of identifying threats to systems and system

vulnerabilities is necessary for specifying a robust, complete set of security

requirements and also helps determine if the security solution is secure against

malicious attacks. As well as users, governments and IoT developers must ultimately

understand the threats and how to prevent these internet threats and have answers to

the following questions:

1. Do the students recognize the mechanism of phishing threat?


2. Do the students recognize the mechanism of identity thefts?

3. Are the students careful enough to recognize internet frauds?

4. Estimation of the personal expertise or knowledge about the present threats?

Purpose of the Study

The objective of the study was to assess the current state of awareness about

the potential exposure to the internet threats of phishing and identity theft, recognizing

of their mechanisms and personal expertise or knowledge about the present threats.

The results of the study were analysed on the differences among students of different

study programs at the level of descriptive and inferential statistics. Due to the publishers

limitations some tables with results are available online at the source (Threats, 2017i).

Significance of the Study

This study looks into malware identification. As higher education institutions look

to reduce their security risks associated with sensitive data or malware infections, many

institutions are implementing general security awareness programs to combat these

risks. Cleaning infected machines requires a substantial amount of time by IT resources

and impedes the effective work time of IoT users and IT students. This study is

significant because it uses scenarios related to the top threats in a midsize southeastern

university’s environment and common threats national security firms have identified.
Scope and Delimitation of the Study

This study was limited to senior high school students of Maximo L. Gatlabayan

Memorial National High School. The study was also limited to Windows and Macintosh

operating systems, and mobile or personal devices. These limitations were guided by

the lower to moderate level of network access permitted to IoT users and students. The

school will provides a separate help desk for students which could be used for future

studies involving students and their technology use. Although this study was limited to

one school, this research could help guide other institutions to develop their own

training programs to combat stolen or lost data and worker downtime.

Definition of Terms

 Cybersecurity- it refers to the protection of computer systems and networks from

the theft of or damage to their hardware, software, or electronic data, as well as

from the disruption or misdirection of the services they provide.

 Identity Theft- it pertains to the crime of obtaining the personal or financial

information of another person to use their identity to commit fraud, such as

making unauthorized transactions or purchases.

 Internet Frauds- it refers to a type of cybercrime fraud or deception which makes

use of the Internet and could involve hiding of information or providing incorrect

information for the purpose of tricking victims out of money, property, and

inheritance.
 Internet Threats- it pertains to are malware programs that can target you when

you're using the Internet. These browser-based threats include a range of

malicious software programs that are designed to infect victims' computers.

 Phishing- it refers to the fraudulent practice of sending emails purporting to be

from reputable companies in order to induce individuals to reveal personal

information, such as passwords and credit card numbers.

You might also like