Professional Documents
Culture Documents
Department of Education
Region III- Central Luzon
Tarlac City Schools Division
MATATALAIB HIGH SCHOOL
(formerly San Manuel High School Annex)
Sitio Buno, Matatalaib, Tarlac City
Chapter 2
REVIEW OF RELATED LITERATURE AND STUDIES
(Worksheet in English 10)
Parts of Chapter 2:
Related Literature
Related Studies
Conceptual Framework
LITERATURE REVIEW
As technology improves, more and more people begin to play with computers, exploring the possibilities. As
the people become more and more curious to what the limits are with computers, they begin to break those
rules and steal information from other computers on the internet. Threatening the communities with
inappropriate content and cyberbullying. Criminal activity on the Internet is wide-ranging and can include an
assortment of offenses such as illegal interception, copyright violation, stalking, money laundering, extortion,
fraud and resource theft involving the illegal use of computers.
The focus of this review is to have a better understanding on the risks of Internet Crimes and to gain
knowledge on Cyber safety; to improve cyber safety awareness of children, youth and adolescents and to learn
basic preventive strategies which can be applied to stay safe Online, such as the following:
• Post Mindfully and Be socially conscious. Encouraging youth not to disclose any identifying information
online. Improve privacy awareness.
• Knowing Danger Zones. Utilizing IP addresses to track and block problematic visitors. Don’t Go Phishing or
being aware on scams or suspicious links.
• Parent and community involvement- attempting to teach the children and youth on the appropriate online
behaviors.
RELATED LITERATURE
This paper examines the Internet security perception of Filipinos to establish a need and sense of urgency on
the part of the government to create a culture of cybersecurity for every Filipino. Method – A quantitative
survey was conducted through traditional, online and phone interviews among 252 respondents using a two-
page questionnaire that covers basic demographic information and two key elements (1) Internet usage and
(2) security practices.
RELATED STUDIES
Based on findings, there is a sharp increase of Internet users for the last three years (50%) and most access
the Internet through mobile (94.4%). Although at home is the most frequent location for Internet access
(94.4%), a good percentage still use free WiFi access points available in malls (22.2%), restaurants (11.1%),
and other public areas (38.9%) doing Internet services (email and downloading) that are vulnerable to cyber
attacks. The study 15 also revealed that although respondents may have good knowledge of Internet security
software, proper implementation is very limited. Conclusion – Filipinos are susceptible to cyber attacks,
particularly to phishing and malware attacks
ADDITIONAL REMINDERS
1. Locate and use only credible sources: 20 sources total, including newspaper articles, encyclopedia
entries, journal articles, credible websites, books, 1-2 interviews, 1 survey
2. Make sure that your research questions align with your thesis sentence
3. Eliminate bias in your writing and portrayal of the information you gather from the sources. Eliminate
use of personal pronouns, including first, second, and third person, such as “I,” “Me,” “My,” We,” “Our,”
“You,” etc.
4. DO NOT make an argument in the literature review. The main purpose is to REVIEW the various
perspectives in the sources you locate and use
5. Make sure you use quotations or paraphrase information from your sources in order to support your
claims and to show various perspectives on your research questions and thesis sentence
There are many scholars who attempted to address the causation of cyber crimes with traditional theories such
as Social Learning Theory, Routine Activities Theory and Drift and Neutralization theory. However, they were
not fully successful in their explanation of cyber crimes, as the cyber space is altogether a new space and
cyber crime is a new form of crime (Yar, 2005; Jaishankar, 2007b, 2015).
APPLICATION:
Search for at least FIVE (5) related literature from FOREIGN AUTHORS and FIVE (5) related literature from
FILIPINO AUTHORS. Write your answers in the space provided below. Attach additional papers if necessary
APPLICATION:
Search for at least FIVE (5) related studies from FOREIGN AUTHORS and FIVE (5) from FILIPINO
AUTHORS. Write your answers in the space provided below. Attach additional papers if necessary. At the last
box, create a synthesis which compares the studies that you have reviewed with your study. What are the
similarities and differences? Which of the studies’ findings provide a strong support to your study?
_______________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
_______________________________________________________________________________________________
RELATED LOCAL STUDY 4:
This study expands the Uses and Gratification Theory by examining Internet use and its outcomes among Filipino
Internet users. It also tests the Social Cognitive Theory by examining the role of both self and external regulation on
Internet use outcomes. The use of Internet to express oneself and interact predicted both personal enhancement and
problematic Internet use.
Reference Citation (Use APA format): Ortega-Go, Renee & Hechanova, Gina. (2014). The Good, The Bad and
the Ugly: Internet Use, Outcomes and the Role of Regulation in the Philippines. The Electronic Journal of Information
Systems in Developing Countries. 63. 1-25. 10.1002/j.1681-4835.2014.tb00453.x.
https://www.researchgate.net/publication/
325036716_Internet_Security_Awareness_of_Filipinos_A_Survey_Paper
https://www.researchgate.net/publication/275709598_CYBER_CRIME_CHANGING_EVERYTHING_-
_AN_EMPIRICAL_STUDY
https://www.researchgate.net/publication/331010726_Literature_review_on_Cyber_Crimes_and_its_Preventio
n_Mechanisms
https://shodhganga.inflibnet.ac.in/bitstream/10603/24790/9/09_chapter%203.pdf
http://news.abscbn.com/business/01/09/18/bpi-flags-fake-online-banking-page
https://www.researchgate.net/publication/257980212_The_Need_for_Effective_Information_Security_Awarene
ss
https://www.gov.ph/web/department-of-information-and-communications-technology-office
https://www.researchgate.net/publication/222730836_Phishing_for_user_security_awareness
https://www.ncjrs.gov/pdffiles1/nij/231832.pd
https://acg.pnp.gov.ph/main/20-publications/42-cybercrime-threat-landscape-in-the-philippines
https://www.researchgate.net/publication/298673972_The_key_to_information_security
https://www.researchgate.net/publication/241703246_Internet_anonymity_practices_in_computer_crime
https://www.researchgate.net/publication/332989526_Internet_Safety
https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.researchgate.net%2Fpublication
%2F288262190_Organizations_and_cyber_crime_An_analysis_of_the_nature_of_groups_engaged_in_cyber_
crime%3Ffbclid%3DIwAR3KRmPihUPI--
bAN3cdDlZMFs5_OcG4A8M6Q_DETzyUa3_xlYOClHcNFbw&h=AT1PrRyCTTfiZ1WpIw3_9bmBkjfv1q-
NjSNmaChdK-K3lU8K7vj9nlDicQWLMKWzvGOkeHSWIThgeztEB6VxDB4XEI-
BTXKB8YNp2b6L2TInFkwuCztbuK3OI9_UJsaWZGH7
https://www.mckinsey.com/~/media/McKinsey?
fbclid=IwAR2VPZ3j7qHBcqdj2rvCcSO9l972cS1Xw3hQdqk4Mv0ibO6c8528T6DZZSM