You are on page 1of 43

AWARENESS AND PREPAREDNESS OF INTERNET USERS TO

DEAL WITH THREATS OF CYBER CRIME AT BARANGAY


KIBUDOC, MATALAM, COTABATO

JOSE ENRICO POSADAS ALEJANDRO

A Thesis Outline Submitted to the Department of Criminal Justice


Education College of Arts and Social Sciences, University of
Southern Mindanao, Kabacan, Cotabato in Partial
Fulfilment of the requirements for the Degree of

BACHELOR OF SCIENCE IN CRIMINOLOGY

SEPTEMBER 2021

i
UNIVERSITY OF SOUTHERN MINDANAO
Kabacan, Cotabato Philippines

Name
APPROVAL ALEJANDRO,
OF THESIS JOSE ENRICO P.
OUTLINE
Major N/A
Degree Sought BACHELOR OF SCIENCE IN CRIMINOLOGY
Specialization N/A
Thesis Title AWARENESS AND PREPAREDNESS OF
INTERNET USERS TO DEAL WITH THREATS
OF CYBER CRIME AT BARANGAY KIBUDOC,
MATALAM, COTABATO

APPROVED BY THE GUIDANCE COMMITTEE

ROWELL P. NITAFAN, MPA RICHARD T. CAMARA PhD


Adviser Department Research Coordinator

Date Date

VICENTE T. DELOS REYES, PhD


Department Chairperson

Date

ROWELL P. NITAFAN, MPA MARCOS F. MONDERIN, MA, JD


College Research Coordinator Dean

Date Date

Study No:
Index No:
Recorded
by:
RECORDED:
MA. THEODORA_N. CABASAN, PhD
Director for Research and Development

Date

Recorded by: _________


ii
USM-EDR-F05-Rev.4.2020.11.16 ii
TABLE OF CONTENTS

PRELIMINARY PAGES

APPROVAL OF THESIS OUTLINE..................................................................ii

TABLE OF CONTENTS................................................................................... iii

LIST OF APPENDICES.................................................................................... v

INTRODUCTION.............................................................................................. 1

Significance of the Study............................................................................3

Research Questions................................................................................... 6

Operational Definition of Terms..................................................................6

Theoretical Lens......................................................................................... 7

Limitations of the Study............................................................................ 12

REVIEW OF RELATED LITERATURE..........................................................13

Concept of Suicide.................................................................................... 13

Effects of Life Experiences in Suicidal People............................................15

Motivation to Suicide................................................................................. 16

Suicide Notes........................................................................................... 17

Facebook as a Medium for Writing Suicide Notes......................................22

METHODOLOGY........................................................................................... 25

Research Design...................................................................................... 25

Role of the Researcher............................................................................. 25

Research Subjects and Materials..............................................................26

Data Collection......................................................................................... 26

Data Analysis............................................................................................ 27

iii
Validity...................................................................................................... 27

Ethical Consideration................................................................................ 29

LITERATURE CITED.................................................................................... 30

APPENDICES................................................................................................ 33

CURRICULUM VITAE................................................................................... 41

iv
LIST OF APPENDICES

Appendix Title Page

A. Application for Research Adviser..............................................34

B. Application for Research Title....................................................35

C. Estimated Budget of the Research............................................37

D. Application for Thesis Outline Defense.....................................39

INTRODUCTION

Background of the Study

Begun and held in Metro Manila, on Monday the Twenty-fifth day

of July two thousand eleven. Republic Act No. 10175 an act defining

cybercrime, providing for the prevention, investigation, suppression and

the imposition of penalties therefor and for other purposes, also known

as the “Cybercrime Prevention Act of 2012”.

Finally, an act that is suitable for this modern era. An era where

smartphones and gadgets are almost used by every citizen. Where

everything is on social media, an era where the world is overrunning by

technological advancements and everything is already on the internet.

5
Nowadays, do we know how safe we are while browsing on the

internet. Does it cause harm to us, or are we even aware about the

harm we might cause to the others. Right now, cybercrime is so

rampant because of our own ignorance about it. People not being aware

of what they’ve been doing and posting on social media, might be

causing harm to someone or even putting their own safety at risk.

Currently, this law is somehow effective as it lessens the crime rate for

cyber related crimes. So, I as the researcher decided to conduct this

research to learn more about the causes and effects of cybercrime and the

level of knowledge and awareness of the people in my barangay about

these Cybercrime Offenses. I wanted to do this research in hoping that I will

be able to develop ways on how we should address or treat this problem to

create a better and safer community for us as internet users.

Furthermore, to be able to create a better or develop much more

appropriate policies and strategies when dealing with cybercrimes or

computer/technology related crimes. I say that there is definitely a need to

assess or evaluate the level of awareness and preparedness of the

residents using the internet or simply say individual users of the internet.

6
Significance of the study

This study will be considered beneficial to the following;

Internet/social media users- This study will help them be aware of

what is cybercrime, what causes cybercrime, what will be its effects on

them and how can they prevent it or not commit the crime.

Parents- The study may help them know if their child is currently

suffering cyberbullying, it can also help them by providing the right

administration on how to deal with the victims of cybercrime.

Future researchers- In case someone will be doing the same research

this study will be open for references in future researches.

7
Objectives of the study

The general objective of the study is to determine the level of awareness of

internet users on cybercrime offenses at brgy. Kibudoc, Matalam, Cotabato.

1. To determine the socio-demographic profile of the respondents in

terms of : Age, Sex, Educational attainment

2. To determine the perceived awareness of internet users in

dealing threats of Cybercrimes in terms of:

2.1 Knowledge about Computer Crimes (KCC)

2.2 Attitude to risks of Computer Crimes (ACC)

2.3 Exposure to Awareness Raising (EAR)

3. To determine the perceived Preparedness of internet users in

dealing threats of Cybercrimes in terms of:

3.1 Preparedness to Respond (PR)

3.2 Online Behavior (OB)

4. Identify the prevalence types of cybercrime offenses in the Brgy.

5. To propose a local-based cybercrime policy.

8
Operational Definition of Terms

Awareness- having or showing realization, perception, or knowledge

Cybercrime- criminal activity (such as fraud, theft, or distribution of child

pornography) committed using a computer especially to illegally access,

transmit, or manipulate

Internet- an electronic communications network that connects computer

networks and organizational computer facilities around the world

Rampant- showing no signs of being under control

Suppression- the act of putting down by authority or force

9
Theoretical Framework

The Cybercrime Prevention Act of 2012, officially recorded as Republic

Act No. 10175, is a law in the Philippines that was approved on

September 12, 2012. It aims to address legal issues concerning online

interactions and the Internet in the Philippines. Among the cybercrime

offenses included in the bill are cybersquatting, cybersex, child

pornography, identity theft, illegal access to data and libel.

Conceptual Framework

Independent variable Dependent variable

Knowledg e on

cybercrimes
Awareness raising Factors in Barangay based
determining the
about cybercrime local based policy policy
Preparedness/ the outcome

ability to respond
Demographic

characteristics

Figure1. Schematic diagram of the relationship of the Awareness

10
and Preparedness of Internet users in dealing with cyber crime threats and

it’s connection In making a baranggay or local based policy to strengthen

the law at Barangay Kibudoc,Matalam,Cotabato.

11
REVIEW OF RELATED LITERATURE

Definition of Cybercrime

Cybercrime is so diverse that it covers a wide variety of criminal offenses,

so the definition of cybercrime is not that simple. "Cybercrime, also known as

computer crime, is the use of computers as a tool for other illegal purposes

such as fraud, child pornography and trafficking of intellectual property, theft of

personal information, and invasion of privacy. With computers becoming the

center of commerce, entertainment and government, cybercrime, especially via

the Internet, is becoming more important” (Aaron, 2019). Therefore, he defined

cybercrime as a series of crimes. Now, it is important for us to really understand

the meaning and definition of cybercrime in order to gain insight and insight into

the problem. Here are some of the organization-based definitions:

Based on the 2012 Cybercrime Prevention Act of the Republic of the

Philippines. It aims to address legal issues related to online interaction and the

Internet in the Philippines. Cybercrime crimes included in the bill include

cybersquatting, cybersex, child pornography, identity theft, illegal data access,

and defamation.

According to a study of cybercrime at Jammu & Kashmir, "cybercrime is

also called subordinate crime (or" pure "cybercrime) and can only be committed

using computers, computer networks, or other forms of information and


12
communication technology. It is a crime that can be done (ICT). These actions

include the spread, hacking, and distributed denial of service (DDoS) attacks of

viruses and other malware "(Gupta, 2018).

Panda Security (2021) defines cybercrime as a crime in which a computer

is the subject of a crime or is used as a tool for committing a crime. These are

part of the definition of cybercrime to help you adequately address the threat of

cybercrime. It is important to really understand the definition of cybercrime in

order to recognize that we may not be victims or commit crimes ourselves

13
Types of Cybercrimes

According to Panda Security (2021), cybercrime falls into three main

categories: personal, property, and government.

Jigsaw Academy has classified the types of cybercrime into 20 different

types: 1. Web attack 2. SQL injection 3. Cross-site scripting 4. DDoS

attack 5. Password attack 6. Eavesdropping 7. Brute force and dictionary

network attack 8. Internal threat 9. Man-in-The-Middle attack 10. AI-based

attacks 11. Drive-by attacks 12. Phishing attacks 13. Spear phishing attacks

14. Whale fishing attacks 15. Malware 16. Ransomware 17. Trojan 18.

Teardrop Attack 19. Ping of Death Attack 20. PuP` ( Upadhyay, 2020).

Cyber crimes related to Individual

In this category of cybercrime, people disseminate malicious or

illegal information online. This includes cyberstalking, pornographic

distribution, and human trafficking.

Cyber crimes related to Property

This is similar to the actual case where a criminal illegally holds

someone's bank or credit card information. Hackers steal personal

banking information to access funds, make online purchases, and

commit phishing scams to trick people into leaking information. You can

also use malicious software to access websites that contain sensitive


14
information.

Cyber crimes related to Government

This is the most common cybercrime, but the most serious. Crime

against the government is also known as cyber terrorism. State cybercrime

includes hacking government websites, military websites, or spreading

publicity. These criminals are usually terrorists or hostile governments in

other countries.

Reality of Cybercrimes

According to a study by Gilbert C. Sosa (2015), cybercrime is one

of the fastest-growing nonviolent crimes in Asia. Addressing these

issues requires a lot of technical know-how and collaboration at home

and abroad. This crime affects different countries to varying degrees,

depending on the level of law in each country. In the Philippines,

changes in technical and electronic conditions require legislation to be

enacted or amendments to existing legislation to fully combat cyber

threats.

As Gordon, Hosmer, Siedsma, and Rebovich (2003) brought up,

“wrongdoing happens when there is an absence of skillful guardians and


15
roused culprits within the sight of reasonable targets.”. The inquiry we

need to pose to ourselves is whether this situation applies. Is there a

reasonable objective for the assault? Will guardians manage the culprits

of cybercrime? Are there any roused culprits? The nation is associated

with the internet, so we should know and be ready. In case we are not

the objective of an assault, we really want to realize that we can have

wrongdoing or assault. This is on the grounds that the assaulted PC can

be utilized by an aspiring programmer to assault, regardless of whether

the assailant isn’t close to the PC they are utilizing.

The expansion in cybercrime is disturbing. Late exploration

shows that as innovation and secrecy advance on the web, the

seriousness and number of cybercrimes will build step by step. In any

case, cybercrime is a danger to all spaces of society all throughout the

planet. Privately owned businesses like banks, framework

organizations, programming organizations, protected materials, and

government offices are definitely insusceptible to digital dangers. Karla

T. Cabel (2019) reports that cybercriminals positioned in one nation can

perpetrate wrongdoings in another.

Dangers of Cyber Crime

The quantity of 0 days being exploited withinside the wild is “off the
16
charts,” Corellium COO Matt Tait warned at some stage in Black Hat

2021 noted with the aid of using Waldman (2021). According to his

keynote, the quantity of 0 days being detected and exploited withinside

the wild is the best it's been in 8 years. Tait attributed the remarkable

boom to the offense starting off the gloves. In which it way that is each

withinside the authorities’ sector, doing espionage, and withinside the

financially encouraged crime ware industry, ransomware. It's attending to

the factor now in which it is starting to weigh down our capacity to reply

withinside the shielding sector.It is definitely true that the rapid growth in

our technology made great progress making everything faster, process

things faster and made our communication much more easier and

convenient. Thus, all this advancement didn’t only stop there and

because of it we are also constan9 inviting dangers awaiting to be

discovered. Just think about all the data that we’ve been uploading on the

internet. Makes it already extremely beneficial for those who have

criminal minds, because it would be much easier for them to accumulate

information about their target.

“Government organizations are underneath common in all forms of

vulnerabilities” Nichols (2021). Exposed servers which might be poorly

maintained, and in a few instances left untouched for months, are the

exceptional factors of access for hackers .Cyber crimes although it seems

17
to not pose an extreme threat to the real world considering it only

happens virtually through the internet, made the people think that it’s ok

and it doesn’t need to be extra cautious about it. And that’s where it all

happens, neglecting a crime because of that mind set made it even more

dangerous, this have a tendency to create a fake experience of safety

that makes humans to be a piece complacent while happening line. This

lack of understanding with the aid of using the ones net customers of the

risks lurking accessible withinside the cyber area can price a corporation

in addition to the character dearly.

Awareness on Cyber Crime

Awareness performs a huge position in stopping cybercrime or pc

associated crimes because it permits the connection among user's

movement or state of being inactive and cybercrimes assaults or fee to

grow to be clear. The consciousness makes it simpler for the customers

and gadget directors on the way to keep and display an intrusion detection

gadget that calls for investigation. The first line of protection in cybercrime

is customers' consciousness of the present risks or threats. Simply being

an internet user doesn’t exempt a person safe from being a victim or

committing the crime themselves. Ignorance of the law doesn’t exempt

those who aren’t aware just because they didn’t know for themselves that

they have committed a crime against another person or anything. The idea
18
of pc crime cognizance on this study is that the person is aware about

diverse sorts of pc crimes and their mitigations. A knowledgeable net

person could have an extra potential to apprehend and reply to dangers of

pc crimes. Computer crime cognizance will commonly have a tendency to

boom expertise and higher pc exercise with the aid of using person

customers of computers. Thus, main anybody to a higher and more secure

net surfing loose from pc associated crimes with cognizance as their

number one weapon for security.

Preparedness on Cyber Crime

Cyber crime preparedness may be taken into consideration to be the

cappotential of a person to maximize his cap potential to address cyber

threats at the same time as minimizing the fee that is sure to get up from

a successive attack. Computer customers need to be pro- energetic

whilst managing cyber threats in place of being re – energetic. They need

to be in a function to hit upon the risk earlier than intrusion or prevalence

of the event; being pro- energetic way that they've taken the vital

measures to guard themselves from cyber assaults through having the

vital information and technology to save you the assaults or protection

breaches. They need to have the vital and suitable gear in addition to the

proper system of deploying those gear in place. Thus on this studies what

19
we purpose to discover is whether or not person customers have any

focus in any respect approximately laptop crimes in addition to whether or

not they are organized in any respect.

20
METHODOLOGY

Research Design

In carrying out this research a descriptive survey design will be

used in assessing the awareness and preparedness of the internet end

user in dealing with risks of computer crimes; since it is considered the

most appropriate. This is given the fact that the researcher will have no

intention of influencing the various variables in this research. Descriptive

Research have the ability to give room for finding for more information,

exploring new ideas and at the same time generating discussions and

information on emerging concerns on the line of thought. A descriptive

study describes the existing conditions through observation and

interpretation, and this is what this study is intending to do.

Locale of the study

The study will be conducted at Kibudoc, Matalam, Cotabato. The

researcher chooses Barangay Kibudoc of Matalam due to its accessibility

and because the target respondents are exclusive to the said barangay.

20
Respondents of the Study

The study will be focusing on the internet users of barangay

Kibudoc, Matalam and there will be 50 respondents.

Sampling Procedure

The researcher will use Purposive Sampling in choosing the

respondents. Since convenience sampling makes it easier for me as a

researcher to gather my respondents in our current situation considering

the danger of the covid-19 pandemic.

Research Instrument

The research instrument that the researcher will be using is adopted from

King’Ori Peter Maina “Assessment of Awareness and Preparedness of

Cybercafé Internet Users to Deal with Threats of Cyber Crime” 2014

study questionnaire. The questionnaire itself had four sections. Section A

is dealing with the demographic information about the respondent,

section B has nine questions to gather some addition background

information about the respondent. Section C have a total of twenty-eight

questions which were used to capture information on knowledge of

computer crimes, attitude to risks of computer crimes, exposure to

awareness raising, preparation to respond to computer crimes and online

21
behavior. In this section each item is measured on five-point Likert –

type scale which is aimed at testing the level agreement with the various

indicators used. The scale has two extreme end points of “strongly agree”

(5) to “strongly disagree” (1). Section D with two question captured

information on computer incidences experienced by the internet user.

Data Gathering Procedure

To data collection multi – stage sampling will be done. This

involves randomly selecting the youths or adolescents within Kibudoc that

has access to the internet or possess gadgets capable of accessing the

internet. The researcher will ask for permission to carry out the study in

the barangay SK officials. This will be performed through a house to

house visit to the target respondents as well as a mass call out to the

youth in our barangay to be done by the SK officers. After the consent is

obtained, questionnaires will be then administered to the who were also

selected randomly. Those selected are first requested to answer the

questionnaire and in the process the purpose of the research will be

explained to them; if they agree to be respondents, the questionnaire will

be given to them. Those who are not willing to take part in the research

are left out. The exercise is expected to be done within three weeks time,

since consents and the presence of the respondents shall be considered

before proceeding into distribution of questionnaires.

22
Statistical Analysis

Data coding will be done in order to ease the derivation summaries

and meaning from it. The data collected will be analyzed using Statistical

Package for Social Scientist software version 20.0 and Excel. The data

will be presented using Descriptive statistics in terms of frequencies,

means and percentages. Descriptive Statistics generally provide a

powerful summary that can allow for comparison and conclusions to be

drawn. The analysis of the questionnaire will be done by tabulation using

simple descriptive statistical measures such as frequency tables, means

and percentages and then relevant implication of these values are noted;

For conclusions to be able to be drawn. The purpose of using frequency

tables, means and percentages is to make the work of drawing

conclusions and passing the same to interested parties.

23
LITERATURE CITED

Aaron, D.M.(2019, September 19). Cybercrime. Encyclopedia Britannica.


https://www.britannica.com/topic/cybercrime

Yap-Sulit, S. (2012, September 12)The Cybercrime Prevention Act of 2012.


Google.
https://en.m.wikipedia.org/wiki/Cybercrime_Prevention_Act_of_2012#:
~:t ext=It%20aims%20to%20address%20legal,access%20to%20data
%20an d%20libel.

Gupta, A. (2018). Geography. International Journal for Research in


Applied Science and Engineering.
Technologyhttps://www.semanticscholar.org/paper/A-Study-on-
Cybercrime-in-Jammu-%26-Kashmir-
Gupta/6ca5df78fc31c129fb217bfe463d606d6bbeb288

(2021, April 26). Types of Cybercrimes.


https://www.pandasecurity.com/en/mediacenter/panda-security/types-of-
cybercrime/

Upadhyay, I. (2020). Cyber Security. 20 Important Types of Cyber Crimes


To Know in 2021. https://www.jigsawacademy.com/blogs/cyber-
security/types-of- cyber-crime/amp/#commentform

Cabel, K.T. (2019) Combating Cybercrime in the


Philippines.
https://www.unafei.or.jp/publications/pdf/RS_No97/No97_IP_Philip
pines. pdf

24
Sosa, G.C. (2015). Country Report on Cybercrime: The Philippines.
*https://www.unafei.or.jp/publications/pdf/RS_No79/No79_12PA_Sosa.pdf

Waldman, A. (2021). Matt Tait warns of 'stolen' zero-day vulnerabilities: Search Security.
https://searchsecurity.techtarget.com/news/252504895/Matt-Tait-warns-of-stolen-zero-day-
vulnerabilities?
_gl=1*15jlclw*_ga*MTcwNDY5OTY4NS4xNjM2MTY1ODIx*_ga_TQKE4GS5P9*MTYzNjE2
NTc5OS4xLjEuMTYzNjE2NjAwNC4w&_ga=2.86948189.439679449.1636165828-
1704699685.1636165821

Nichols, S. (2021). Zscaler: Exposed servers, open ports jeopardizing enterprises

https://searchsecurity.techtarget.com/news/252502554/Zscaler-Exposed-servers-open-

ports-jeopardizing-enterprises?

_gl=1*23jm8q*_ga*MTcwNDY5OTY4NS4xNjM2MTY1ODIx*_ga_TQKE4GS5P9*MTYzNjE

2NTc5OS4xLjEuMTYzNjE2NzE2OS4w&_ga=2.118839628.439679449.1636165828-

1704699685.1636165821

25
APPENDICES

26
Appendix A. Application for Research Adviser

UNIVERSITY OF SOUTHERN MINDANAO


Kabacan, Cotabato
Philippines

APPLICATION FOR RESEARCH ADVISER


Date: October 15, 2021

ROWELL P. NITAFAN, MPA


Department of Political Science
College of Arts and Social
Sciences USM, Kabacan,
Cotabato

Sir / Madam:

I would like to request that you will be my Research adviser effective


1ST semester, SY 2020-2021. I intend to work on “AWARENESS AND PREPAREDNESS OF
INTERNET USERS TO DEAL WITH THREATS OF CYBER CRIME AT BARANGAY KIBUDOC,
MATALAM, COTABATO”.

I am hoping for your most favorable approval on this request. Thank you very much.

Very truly yours,

ALEJANDRO, JOSE ENRICO P.


Printed Name and Signature of Student

RECOMMENDING APPROVAL NOTED

RICHARD T. CAMARA, PhD VICENTE T. DELOS REYES, PhD


Department Research Coordinator Department Chairperson

_ Date _ Date

APPROVED

ROWELL P. NITAFAN,MPA
Adviser
_
Date

USM-EDR-F01-Rev.3.2020.02.24
Appendix B. Application for Research Title

UNIVERSITY OF SOUTHERN MINDANAO

Kabacan, Cotabato Philippines

APPLICATION FOR RESEARCH TITLE

Date: October 18, 2021

Vicente delos Reyes, PhD.


Chairperson, Department of Criminal Justice Education
College of Arts and Social Sciences
USM, Kabacan, North Cotabato

SIR/MAAM:
I would like to request your office to allow me to research on the study entitled
“AWARENESS AND PREPAREDNESS OF INTERNET USERS TO DEAL WITH
THREATS OF CYBER CRIME AT BARANGAY KIBUDOC, MATALAM,
COTABATO.”

This research endeavors to find the answer to the following research questions:
1. To determine the socio-demographic profile of the respondents in terms of : Age,
Sex, Educational attainment
2. To determine the perceived awareness of internet users in dealing threats of
Cybercrimes in terms of:
2.4 Knowledge about Computer Crimes (KCC)
2.5 Attitude to risks of Computer Crimes (ACC)
2.6 Exposure to Awareness Raising (EAR)
3. To determine the perceived Preparedness of internet users in dealing threats of
Cybercrimes in terms of:
a. Preparedness to Respond (PR)
b. Online Behavior (OB)

4. Identify the prevalence types of cybercrime offenses in the Brgy.

5. To propose a local-based cybercrime policy.

Very truly yours,

ALEJANDRO, JOSE ENRICO P.


Printed Name and Signature of Student

ROWELL P. NITAFAN, MPA


Adviser
Date

28
RICHARD T. CAMARA, PHD
Department Research Coordinator
Date
NOTED

ROWELL P. NITAFAN, MPA


College Research Coordinator
REMARKS: Date
APPROVED

VICENTE T. DELOS REYES, PhD


Department Chairperson
Date
Appendix C. Estimated Budget of the Research

UNIVERSITY OF SOUTHERN MINDANAO

Kabacan, Cotabato Philippines

ESTIMATED BUDGET OF THE RESEARCH

Title of Study
"AWARENESS AND PREPAREDNESS OF INTERNET USERS TO DEAL WITH THREATS OF
CYBER CRIME AT BARANGAY KIBUDOC, MATALAM, COTABATO”

ITEMS/DESCRIPTION ESTIMATED COST


I. D efense Fee

Adviser 350
Dept. Research Coordinator 125

II.MAINTAINANCE AND OPERATING EXPENSES (MOE) ITEMS


1. Travel and other expenses 350
2. Computer services and binding
a. Internet 300
b. Printing 500

Grand Total 1625 pesos


Prepared and submitted by:

ALEJANDRO, JOSE ENRICO P.


Printed Name and Signature of the Student

NOTED

ROWELL P. NITAFAN _
Adviser Date

RICHARD T. CAMARA, PhD


Department Research Coordinator Date

VICENTE T. DELOS REYES, PhD


Department Chairperson Date30
USM-EDR-F06-Rev.3.2020.02.24
Appendix D. Application for Thesis Outline Defense
UNIVERSITY OF SOUTHERN MINDANAO

Kabacan, Cotabato Philippines

APPLICATION FOR THESIS OUTLINE DEFENSE

Name Alejandro, Jose Enrico P.


Degree/Major BACHELOR OF SCIENCE IN CRIMINOLOGY
Thesis Title AWARENESS AND PREPAREDNESS OF INTERNET USERS TO
DEAL WITH THREATS OF CYBER CRIME AT BARANGAY
KIBUDOC, MATALAM, COTABATO
Date of Examination OCTOBER 18, 2021
Time 8:00 AM
Place VIA VIRTUAL PLATFORM

MEMBERS OF THE EXAMINING COMMITTEE

Name Signature Date


DATU MODEN TALANDIG
ROVILINE PAL-IWEN, PHD
VICENTE DELOS REYES,PHD

RECOMMENDING APPROVAL:

ROWELL P NITAFAN, MPA _ _ _


Adviser Co-Adviser (Optional)
APPROVED:

_ RICHARD T. CAMARA, PhD


College Statistician Department Research Coordinator
(Optional)

VICENTE T. DELOS REYES, PhD


Department Chairperson

31
REPORT ON THE RESULT OF EXAMINATION

Name Signature Remarks

DATU MODEN TALANDIG


ROVILINE PAL-IWEN, PhD
VICENTE DELOS REYES,PhD

APPROVED:

RICHARD T. CAMARA, PhD


Department Research Coordinator

Date

USM-EDR-F07-
Rev.3.2020.02.24

32
UNIVERSITY OF SOUTHERN MINDANAO
Kabacan, Cotabato
Philippines

CURRICULUM VITAE

ALEJANDRO, JOSE ENRICO P.


Kibudoc, Matalam, North Cotabato Cell Number: 0938-996-337
E-mail address: enricoalejandro23@gmail.com

PERSONAL INFORMATION:

NICKNAME: Rik

BIRTHDAY: July 23, 2000

BIRTH LACE: Kidapawan, North Cotabato

AGE: 21

NATIONALITY: Filipino

CIVIL STATUS: Single

FATHER’S NAME: Enerito U. Alejandro

MOTHER’S NAME: Merlyn P. Alejandro

EDUCATIONAL BACKGROUND:

TERTIARY: UNIVERSITY OF SOUTHERN MINDANAO

Bachelor of Science in
Criminology Kabacan, Cotabato
2019-Present

33
UNIVERSITY OF SOUTHERN MINDANAO

Kabacan, Cotabato Philippines

CURRICULUM VITAE

SECONDARY: Marbel High School

Matala
m,
North
Cotabat
o 2012-
2016
Matalam High School-Senior High School
Matalam, North Cotabato
2017-2019

PRIMARY: Kibudoc
Elementar
y School
Matalam,
North
Cotabato
2006-2012
SKILLS:

 Computer and Digital Literate

34

You might also like