You are on page 1of 7

Republic of the Philippines

Department of Education
Region III- Central Luzon
Tarlac City Schools Division
MATATALAIB HIGH SCHOOL
(formerly San Manuel High School Annex)
Sitio Buno, Matatalaib, Tarlac City

GROUP NO.: __________ SECTION: 10-SYLIANCO DATE SUBMITTED: January 13,2020


_______
Name of Members: MA.CRISTINA C. GUALDAD

Title of Research: __INTERNET SAFETY AND CYBERCRIME


___________________________________________________________

Chapter 2
REVIEW OF RELATED LITERATURE AND STUDIES
(Worksheet in English 10)

Parts of Chapter 2:
  Related Literature
  Related Studies
  Conceptual Framework

LITERATURE REVIEW
As technology improves, more and more people begin to play with computers, exploring the possibilities. As
the people become more and more curious to what the limits are with computers, they begin to break those
rules and steal information from other computers on the internet. Threatening the communities with
inappropriate content and cyberbullying. Criminal activity on the Internet is wide-ranging and can include an
assortment of offenses such as illegal interception, copyright violation, stalking, money laundering, extortion,
fraud and resource theft involving the illegal use of computers.
The focus of this review is to have a better understanding on the risks of Internet Crimes and to gain
knowledge on Cyber safety; to improve cyber safety awareness of children, youth and adolescents and to learn
basic preventive strategies which can be applied to stay safe Online, such as the following:
• Post Mindfully and Be socially conscious. Encouraging youth not to disclose any identifying information
online. Improve privacy awareness.
• Knowing Danger Zones. Utilizing IP addresses to track and block problematic visitors. Don’t Go Phishing or
being aware on scams or suspicious links.
• Parent and community involvement- attempting to teach the children and youth on the appropriate online
behaviors.

RELATED LITERATURE
This paper examines the Internet security perception of Filipinos to establish a need and sense of urgency on
the part of the government to create a culture of cybersecurity for every Filipino. Method – A quantitative
survey was conducted through traditional, online and phone interviews among 252 respondents using a two-
page questionnaire that covers basic demographic information and two key elements  (1) Internet usage and
(2) security practices.

RELATED STUDIES
Based on findings, there is a sharp increase of Internet users for the last three years (50%) and most access
the Internet through mobile (94.4%). Although at home is the most frequent location for Internet access
(94.4%), a good percentage still use free WiFi access points available in malls (22.2%), restaurants (11.1%),
and other public areas (38.9%) doing Internet services (email and downloading) that are vulnerable to cyber
attacks. The study 15 also revealed that although respondents may have good knowledge of Internet security
software, proper implementation is very limited. Conclusion – Filipinos are susceptible to cyber attacks,
particularly to phishing and malware attacks

WRITING THE REVIEW


1. Text should be brief. Avoid direct quotation.
2. Have a plan on how you are to present the review.
3. Emphasize relatedness.
4. Don’t reproduce the literature. Critical review, not mere enumeration of information.

ADDITIONAL REMINDERS
1. Locate and use only credible sources: 20 sources total, including newspaper articles, encyclopedia
entries, journal articles, credible websites, books, 1-2 interviews, 1 survey
2. Make sure that your research questions align with your thesis sentence
3. Eliminate bias in your writing and portrayal of the information you gather from the sources. Eliminate
use of personal pronouns, including first, second, and third person, such as “I,” “Me,” “My,” We,” “Our,”
“You,” etc.
4. DO NOT make an argument in the literature review. The main purpose is to REVIEW the various
perspectives in the sources you locate and use
5. Make sure you use quotations or paraphrase information from your sources in order to support your
claims and to show various perspectives on your research questions and thesis sentence

SAMPLE LITERATURE REVIEW:


RESEARCH TITLE: : INTERNET SAFETY AND CYBER CRIME
VARIABLE BEING REVIEWED BY THE LITERATURE: School Publication
AUTHOR: JAISHANKAR
YEAR PUBLISHED:2015

SAMPLE LITERATURE REVIEW:

There are many scholars who attempted to address the causation of cyber crimes with traditional theories such
as Social Learning Theory, Routine Activities Theory and Drift and Neutralization theory. However, they were
not fully successful in their explanation of cyber crimes, as the cyber space is altogether a new space and
cyber crime is a new form of crime (Yar, 2005; Jaishankar, 2007b, 2015).

ADDITIONAL REMINDERS IN WRITING YOUR LITERATURE REVIEW:


 Select materials from books, magazines, newspapers and online sites which are reliable and related to
any one of your variable.
 Select only the highlights or the parts related to your study.
 Do not copy and paste the contents but paraphrase it.
 Use in text citation and indicate too your reference by making your reference citation.

APPLICATION:

Search for at least FIVE (5) related literature from FOREIGN AUTHORS and FIVE (5) related literature from
FILIPINO AUTHORS. Write your answers in the space provided below. Attach additional papers if necessary

RELATED FOREIGN LITERATURE 1:


Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable
material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge
from the Internet as well as embracing the Internet’s global communications system to participate in virtual
communities of disguised people.
Reference Citation (Use APA format): : Armstrong, H.L. & Forde, P.J.. (2003). Internet anonymity practices in
computer crime. Information Management & Computer Security. 11. 209-215. 10.1108/09685220310500117.

RELATED FOREIGN LITERATURE 2:


This entry gives an overview of the different risks both minors and adults can encounter online. A distinction is made
between aggression risks (e.g., cyberbullying, cyberstalking), sexual risks (e.g., online pornography, sexting), value‐
related risks (e.g., pro‐anorexia sites), and commercial risks (e.g., phishing, gambling). For each risk, prevalence rates
and potential effects on the physical and psychological well‐being of Internet users are discussed.
Reference Citation (Use APA format): Kimpe, Lies & Walrave, Michel & Ponnet, Koen & Van Ouytsel, Joris.
(2019). Internet Safety. 10.1002/9781118978238.ieml00931.1110.1002/9781118978238

RELATED FOREIGN LITERATURE 3:


This paper explores the nature of groups engaged in cyber crime. It briefly outlines the definition and scope of cyber
crime, theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of
organized crime groups. The paper gives examples of known cases that illustrate individual and group behaviour, and
motivations of typical offenders, including state actors.
Reference Citation (Use APA format): Broadhurst, Roderic & Grabosky, P. & Alazab, Mamoun & Chon, Steve.
(2014). Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime. International
Journal of Cyber Criminology. 8. 1-20.
SAMPLELOCAL
RELATED RELATED STUDY REVIEW:
LITERATURE 5:
RESEARCH TITLE: : INTERNET SAFETY AND CYBERCRIME
DICT Leads Inauguration
VARIABLE of Free Public
BEING REVIEWED BY THE Wi-Fi along EDSASchool
LITERATURE: Commuters to experience free high-speed
Publication
Internet in Metro Manila’s main highway starting June 12 [12 June 2017]
TITLE OF THE RESEARCH BEING CITED: The key to information security Manila, Philippines – In line with
itsAUTHOR:
mandate to foster connectivity and improve public access to the Internet, the Department of Information
SOMMER
and Communications
YEAR PUBLISHED:2003 Technology (DICT) leads the inauguration of the ‘EDSA Wi-Fi’ project for commuters
along EDSA.
Reference Citation (Use APA format: Dodge, R. C., Carver, C., & Ferguson, A. J. (2007). Phishing for
The
user pervasive
security nature Computers
awareness. of the Internet raises the
and Security, stakes
26(1), for doi:
73-80. the value of information, which in turn
10.1016/j.cose.2006.10.009.
creates the need for information security. Information security
Government of Canada. (2010). Canada' s cyber security strategy is often perceived as revolving around
technical issues and is usually relegated to the information system entity within an organization

ADDITIONAL REMINDERS IN WRITING YOUR RELATED STUDIES REVIEW:


 Select materials from undergraduate studies, master’s theses, dissertations, researches from printed
and online research journals.
 Select only the highlights or the parts related to your study such as the respondents, variables that are
the same in your study, the method used, the findings, the conclusion and recommendation.
 Do not copy and paste the contents but paraphrase it.
 Use in text citation and indicate too your reference by making your reference citation.
 Select related studies which were published from 2009 up to present only.
 Remember to take note the similarities and differences between the studies that you have reviewed
and your present study such as similarities in variables, respondents, findings, etc.

APPLICATION:
Search for at least FIVE (5) related studies from FOREIGN AUTHORS and FIVE (5) from FILIPINO
AUTHORS. Write your answers in the space provided below. Attach additional papers if necessary. At the last
box, create a synthesis which compares the studies that you have reviewed with your study. What are the
similarities and differences? Which of the studies’ findings provide a strong support to your study?

RELATED FOREIGN STUDY 1:


Security awareness is an often-overlooked factor in an information security program. While organizations
expand their use of advanced security technology and continuously train their security professionals, very
little is used to increase the security awareness among the normal users, making them the weakest link in
any organization. As a result, today, organized cyber criminals are putting significant efforts to research and
develop advanced hacking methods that can be used to steal money and information from the general
public.
Reference Citation (Use APA format): S BarquinV Hv Barquin, S., & HV, V. (2015). security-awareness-
month Department of Information and Communications Technology
Reference Citation (Use APA format :
RELATED FOREIGN STUDY 2:
Hacker is a term commonly applied to a "Computer use who intends to gain unauthorized access to a
computer system." According to IT Act 2000 section 66 a person whoever with the intent to cause or
knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes
or alters any information residing in a computer resource or diminishes its value or utility or affects its
inuriously by any means is a hacker.
Reference Citation (Use APA format): Vibhash S. ().CYBER CRIME CHANGING EVERYTHING – AN
EMPIRICAL STUDY.
RELATED FOREIGN STUDY 3:
10 concepts of superficiality and lack of depth are relevant to cyberspace. Emergence of social networking
sites coincide with superficiality as the people who are connected through these networks lack the basic
connection and sentiments which are needed in face to face communication.
Reference Citation (Use APA format): ): Jameson’s .(2003). concepts of superficiality and lack of depth
are relevant to cyberspace.

RELATED FOREIGN STUDY 4:


opines the post-modern world as characterized by simulations and hyper reality. The era of simulations is
an era of information and signs governed by models, codes, and cybernetics. Present generation believes
more in virtual world and gives less importance to real world, because they are infatuated by hyper reality.
Reference Citation (Use APA format): Baudrillard (2003).The Era Of Simulations. Retrieved from
https://shodhganga.inflibnet.ac.in/bitstream/10603/24790/9/09_chapter%203.pdf?
fbclid=IwAR0DDmIXJBvekvZ0BAmKwtdUmx-qWFodS2H542aGKXeF6eHcgJpvVI4wI8g

RELATED FOREIGN STUDY 5:


“Technology is neither good nor bad, nor is it neutral, it is a force”. Technology has changed the societal
structure from industrial to network. Network Society is based on nodes of interaction among people all
around the globe. However, it has also brought ‘Organised global crime’.It is very easy for criminals to plan
and conduct crimes with the help of technology
Reference Citation (Use APA format): Castells (1996).Technology Is Instrumental. Retrieved from
https://shodhganga.inflibnet.ac.in/bitstream/10603/24790/9/09_chapter%203.pdf?
fbclid=IwAR0DDmIXJBvekvZ0BAmKwtdUmx-qWFodS2H542aGKXeF6eHcgJpvVI4wI8g

RELATED LOCAL STUDY 1:


This Case Study is all about the comparison of cybercrime laws in the United States and the Philippines.
Since our technology is continuously innovating, crime widespread into the cyber world. People in the world
engaged into cybercrime to victimize other people to hack, attack on computer systems, scam online, etc not just
because they wanted to do it but because of money that they wanted to earn from it.
Reference Citation (Use APA format): ): Comia, Hazel & Pascua, Kenard & Gutierrez, Shella & Llanillo,
Daniel. (2018). A Comparative Study of Cybercrime Law Between the United States and the Philippines.
10.13140/RG.2.2.29360.35846.

RELATED LOCAL STUDY 2:


A phishing attack sends malicious emails (usually claiming to be from a bank) or fake websites that appear
exactly the legitimate site devised in clever ways to fool clients into handling over valuable and sensitive
information, such as usernames and passwords, and credit card information (Dodge, Carver, & Ferguson,
2007). Preventing these attacks can be tricky as these breaches invoke the human element (Thompson,
2013), such as carelessness, ignorance, fear, curiosity, urgency, or similar behaviors.
Reference Citation (Use APA format): ): Omorog, C. D., & Medina, R. P. (2017). Internet security
awareness of Filipinos: A survey paper. International Journal of Computing Sciences Research, 1(4), 14-26.
doi: 10.25147/ijcsr.2017.001.1.18

RELATED LOCAL STUDY 3:


MANILA – Bank of the Philippines Islands has warned clients over a fake log-in site for its online banking
service, as it reminded them to be vigilant against fraud.
Reference Citation (Use APA format): ): ABS-CBN News. (Jan 2018 ).BDO warns clients against rise in
fraud cases.Retrieved from https://news.abs-cbn.com/business/01/09/18/bdo-warns-clients-against-rise-in-
fraud-cases?fbclid=IwAR1TLxwS09EHFEt12Y09prKnohb_cIaGjiJef3B92vwAgJIvNORnTahb72Y
SYNTHESIS:

_______________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
RELATED LOCAL STUDY 4:
This study expands the Uses and Gratification Theory by examining Internet use and its outcomes among Filipino
Internet users. It also tests the Social Cognitive Theory by examining the role of both self and external regulation on
Internet use outcomes. The use of Internet to express oneself and interact predicted both personal enhancement and
problematic Internet use.
Reference Citation (Use APA format): Ortega-Go, Renee & Hechanova, Gina. (2014). The Good, The Bad and
the Ugly: Internet Use, Outcomes and the Role of Regulation in the Philippines. The Electronic Journal of Information
Systems in Developing Countries. 63. 1-25. 10.1002/j.1681-4835.2014.tb00453.x.

RELATED LOCAL STUDY 5:


There are many ways in which a child can be sexually abused and exploited: in person (e.g.through
prostitution),through images (e.g.pornographic photos andvideos), and throughinternet andcommunications
technology(e.g. the internet, 3G cellphone technology,Bluetooth, etc.).The internet has increased the risk of sexual
abuse and exploitation of children due to two of its features: accessibility and anonymity.
Reference Citation (Use APA format): Ysrael C. Diloy, Advocacy and Training Officer. Stairway Foundation,
Inc.
REFERENCES:

https://www.researchgate.net/publication/
325036716_Internet_Security_Awareness_of_Filipinos_A_Survey_Paper
https://www.researchgate.net/publication/275709598_CYBER_CRIME_CHANGING_EVERYTHING_-
_AN_EMPIRICAL_STUDY
https://www.researchgate.net/publication/331010726_Literature_review_on_Cyber_Crimes_and_its_Preventio
n_Mechanisms
https://shodhganga.inflibnet.ac.in/bitstream/10603/24790/9/09_chapter%203.pdf
http://news.abscbn.com/business/01/09/18/bpi-flags-fake-online-banking-page
https://www.researchgate.net/publication/257980212_The_Need_for_Effective_Information_Security_Awarene
ss
https://www.gov.ph/web/department-of-information-and-communications-technology-office
https://www.researchgate.net/publication/222730836_Phishing_for_user_security_awareness
https://www.ncjrs.gov/pdffiles1/nij/231832.pd
https://acg.pnp.gov.ph/main/20-publications/42-cybercrime-threat-landscape-in-the-philippines
https://www.researchgate.net/publication/298673972_The_key_to_information_security
https://www.researchgate.net/publication/241703246_Internet_anonymity_practices_in_computer_crime
https://www.researchgate.net/publication/332989526_Internet_Safety
https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.researchgate.net%2Fpublication
%2F288262190_Organizations_and_cyber_crime_An_analysis_of_the_nature_of_groups_engaged_in_cyber_
crime%3Ffbclid%3DIwAR3KRmPihUPI--
bAN3cdDlZMFs5_OcG4A8M6Q_DETzyUa3_xlYOClHcNFbw&h=AT1PrRyCTTfiZ1WpIw3_9bmBkjfv1q-
NjSNmaChdK-K3lU8K7vj9nlDicQWLMKWzvGOkeHSWIThgeztEB6VxDB4XEI-
BTXKB8YNp2b6L2TInFkwuCztbuK3OI9_UJsaWZGH7
https://www.mckinsey.com/~/media/McKinsey?
fbclid=IwAR2VPZ3j7qHBcqdj2rvCcSO9l972cS1Xw3hQdqk4Mv0ibO6c8528T6DZZSM

You might also like