You are on page 1of 21

TITLE

A Research Presented to the Faculty of the College of Arts and Science

Lyceum of the Philippines University-Cavite

In Partial Fulfillment

Of The Requirements for

Fundamentals of Legal Research - LSTN14A*

and for the Degree of Bachelor of Arts in Legal Studies

NAME

Mr. Alejandro S. Nueva Jr.

January 2021
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

ACKNOWLEDGEMENT

COLLEGE OF ARTS AND SCIENCE Page | ii


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

Abstract

Key Words: Raffy Tulfo, public trial, and trial by media

TABLE OF CONTENTS

Contents Page

Title Page ………………………………… i

Acknowledgement ………………………………… ii

Abstract ………………………………… iii

Table of Contents ………………………………… iv

Chapter I: Introduction ………………………………… 1

Chapter II: Review of Related Literature ………………………………… 2

Chapter III: Methodology …………………………………. 3

Bibliography …………………………………. 4

Appendices …………………………………

COLLEGE OF ARTS AND SCIENCE Page | iii


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

CHAPTER I

INTRODUCTION

This chapter presents the basic information and principles that guided the research

proposal process. It includes the objectives and concepts which serve as the framework of

the study. Moreover, it explains the significance, the scope, and the limitation of the

study; as well it provides the definition of terms used by the researchers throughout the

study.

1.1 Background of the Study

1. 2 Statement of the Problem

1.3 Research Objectives

1.4 Significance of the Study

1.5 Scope and Delimitation

1.6 Conceptual Framework

1.7 Definition of Terms

COLLEGE OF ARTS AND SCIENCE Page | 1


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

CHAPTER II

LITERATURE REVIEW

This chapter presents a review of relevant literature, studies and concepts essential

to the development of the conceptual framework. These are the compilation of sources of

information, data, and knowledge that will help to answer the research questions and to

support the assumptions about the topic of this research.

Key topics

Synthesis

COLLEGE OF ARTS AND SCIENCE Page | 2


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

CHAPTER III

METHODOLOGY

This chapter presents the research design, the sampling design and the description

of the respondents, research instruments, data gathering procedure, and data analysis and

statistical treatments used to attain valid and relevant results for the study.

3.1 Research Design

In the research study, mixed methods were employed to gain a comprehensive

understanding of the complex relationship between Legal Studies student perceptions of

trademark infringement and the implications of cybersquatting. By incorporating both

qualitative and quantitative approaches, researchers aimed to delve deeply into the

subjective experiences and attitudes of Legal Studies students regarding trademark

infringement (qualitative) while simultaneously quantifying the extent and impact of

cybersquatting (quantitative). This mixed methods approach allowed for a multifaceted

exploration, enabling the researchers to triangulate data from diverse sources. Qualitative

data provided rich insights into students' perceptions, motivations, and contextual factors

influencing their understanding of trademark infringement, offering a nuanced

perspective. On the other hand, quantitative data pertaining to cybersquatting helped

establish statistical patterns and correlations, providing a broader perspective on the

prevalence and implications of this phenomenon. By combining these methods, the study

could offer a holistic view, bridging the qualitative nuances of student perceptions with

COLLEGE OF ARTS AND SCIENCE Page | 3


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

the quantitative data on cybersquatting's tangible consequences, thus enriching the overall

analysis and enhancing the depth of the research findings.

Consequently, Explanatory Sequential Design (ESD) will be applied to the study.

In this approach, the research begins with qualitative data collection and analysis, fol-

lowed by quantitative data collection to explain or validate the initial qualitative findings.

In this study, researchers initially conduct qualitative surveys with Legal Studies students

to explore their perceptions of trademark infringement in-depth. Through open-ended

questions, researchers can gather rich qualitative data, capturing the nuances and underly-

ing reasons behind the students' attitudes and beliefs regarding trademark infringement.

Qualitative methods allow for a deep exploration of the topic, uncovering various per-

spectives and contextual factors that might influence students' views.

Essentially, a SWOT analysis on the essay questions concerning the perceptions

of Legal Studies students on cybersquatting and trademark infringement will provide

valuable insights into the qualitative data gathered. By utilizing this structured analytical

framework, researchers can systematically evaluate the content of the essay responses.

This methodical approach enhances the understanding of students' perceptions and allows

for tailored interventions and educational strategies to address specific areas of improve-

ment, ultimately contributing to a more nuanced and informed perspective on cybersquat-

ting and trademark infringement within the Legal Studies context.

COLLEGE OF ARTS AND SCIENCE Page | 4


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

After analyzing the qualitative data, the researchers can identify patterns, themes,

and hypotheses. To further validate and explain these qualitative findings, quantitative

methods can be employed. A structured, Likert-scale based survey designed to quantify

the prevalence of certain attitudes or beliefs identified during the qualitative phase, will

be employed. In essence, researchers develop a questionnaire assessing students' aware-

ness of cybersquatting cases and their perceived impact on trademark infringement. By

employing an Explanatory Sequential Design, the study can provide a comprehensive un-

derstanding of Legal Studies student perceptions of trademark infringement and its rela-

tion to cybersquatting. The qualitative phase offers depth and context, while the quantita-

tive phase validates the qualitative findings on a larger scale, enhancing the study's over-

all reliability and validity.

3.2 Variables and Measures

The table below shows the variables and measures used in the study.

VARIABLES MEASURES

Perception of Legal Studies The researchers adapted questions from Khan et al.'s

students with trademark in- (2015) study, specifically tailored to explore a unique

fringement. set of questions to probe the respondents' perspec-

tives on cybersquatting and trademark infringement.

These questions were meticulously designed to delve

into the participants' views, shedding light on their

COLLEGE OF ARTS AND SCIENCE Page | 5


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

perceptions concerning the cybersquatting and trade-

mark infringement cases in the realm of cybercrimes.

Perception of the Legal Stud- Modified questions from Khan et al. (2015) that

ies students on their familiar- would establish the effects of their familiarity on cy-

ity with the cybercrime of cy- bersquatting and how it would affect their day to day

bersquatting. online activities.

Perception of Legal Studies Modified questions from Khan et.al (2015) regarding

students with the effect of Cy- the trademark infringement in a cyber setting and lay

bersquatting under Cyber- out its effects under Republic Act 10175.

crime Prevention Act of 2012.

3.3 Research Locale and Research Respondents

The research was conducted at Lyceum of the Philippines University Cavite, situ-

ated at Governor's Drive, Barangay Manggahan, City of General Trias, Cavite. The uni-

versity, established in June 2008, served as the backdrop for this study.

The participants selected for this research were students enrolled in the Legal

Studies program at Lyceum of the Philippines University-Cavite Campus during the aca-

demic year 2023-2024. The researchers gathered information from the College of Liberal

Arts and Education (CLAE) and LPU Legal Studies Society (LLSS) indicating that the

COLLEGE OF ARTS AND SCIENCE Page | 6


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

Legal Studies program comprised 67 students, both male and female, excluding the re-

searchers themselves.

These students were chosen as respondents due to their relevance to the study's

subject matter, aligning with their course of study. Furthermore, their age group repre-

sents one of the initial generations exposed to the 21st century, constituting approxi-

mately seventy percent of the Philippine population. Moreover, they possess diverse

knowledge about technological advancements and are well-versed in modernization,

which is particularly pertinent given that cybersquatting incidents primarily stem from

technological advancements.

3.4 Sampling Design and Technique

For this study on the perceptions of Legal Studies students regarding cybersquat-

ting and trademark infringement, a stratified random sampling method will be employed.

The population of interest comprises 67 Legal Studies students at Lyceum of the Philip-

pines University-Cavite Campus during the academic year 2023-2024. The students will

be divided into strata based on their familiarity and experience with online activities and

intellectual property issues, which are directly relevant to the study on trademark in-

fringement and cybersquatting.

The stratification will take place by dividing the 67 Legal Studies students into

strata based on their level of engagement with online activities, such as social media us-

age, online shopping, blogging, or website ownership. This division ensures that partici-

COLLEGE OF ARTS AND SCIENCE Page | 7


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

pants have varying degrees of exposure to the online environment, where issues like cy-

bersquatting and trademark infringement commonly occur.

Stratum 1: Students actively engaged in online activities (e.g., frequent social media

users, online entrepreneurs).

Stratum 2: Students moderately engaged in online activities (e.g., occasional social me-

dia users, online shoppers).

Stratum 3: Students with minimal online activity (e.g., infrequent internet users, limited

social media presence).

For the survey administration, the researchers will administer the survey question-

naire to the randomly selected students within each stratum. The questionnaire will focus

on gathering the students' perceptions of cybersquatting and trademark infringement.

Then the researchers will analyze the survey responses to draw conclusions about the per-

ceptions of Legal Studies students regarding cybersquatting and trademark infringement.

Ensure the findings are representative of the entire Legal Studies student population by

accounting for the stratified sampling method during the analysis.

By stratifying the students based on their online activities and intellectual prop-

erty awareness, you ensure that the sampled participants represent diverse backgrounds

and experiences relevant to the study's focus on trademark infringement and cybersquat-

ting. This approach provides a nuanced understanding of how different levels of online

COLLEGE OF ARTS AND SCIENCE Page | 8


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

engagement and intellectual property awareness influence Legal Studies students' percep-

tions in these areas.

3.5 Research Instrument

The researchers formulated a survey questionnaire comprising questions struc-

tured on the Likert scale and open-ended inquiries. These questions were fashioned based

on themes explored in the study conducted by Khan et al. (2015). These themes encom-

passed students' perceptions regarding trademark infringement, the ramifications of these

perceptions within a cyber context, and their influence on cybersquatting implications un-

der the Cybercrime Prevention Act of 2012. To mitigate bias, the researchers meticu-

lously consulted their research adviser, ensuring the questionnaire's integrity. Subse-

quently, following validation by experts, the questionnaire was finalized.

Prior to survey administration, the researchers diligently sought approval from the

Dean of the College of Liberal Arts and Education, formally addressing this request

through a letter. Upon securing consent, the survey was administered to the participants.

The questionnaire included a consent letter, aimed at affirming participants' voluntary

agreement to partake and acknowledging that their responses would be subject to the

Data Privacy Act. Essentially, the questionnaire encompassed socio-demographic infor-

mation, Likert scale-based queries, and subsequent open-ended questions. These elements

were strategically designed to extract pertinent insights from respondents, illuminating

COLLEGE OF ARTS AND SCIENCE Page | 9


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

their perspectives on trademark infringement within a cyber context and its concomitant

implications on cybersquatting under the Cybercrime Prevention Act of 2012.

3.6 Data Gathering Procedure

The researchers followed a systematic procedure, which included the following

steps:

1. Submit the research proposal for approval;

2. Validate the survey questionnaire meticulously by experts in the respective field.

3. Obtain approval to conduct the study through a formal letter signed by the Dean of the

College of Liberal Arts and Education.

4. To gather data, two distinct methods were employed. The first method involved data

mining, wherein the researchers explored various sources such as research articles, jour-

nals, published theses, and unpublished theses, primarily accessed through online plat-

forms. The second method encompassed a survey approach, aiming to elucidate the self-

reported characteristics of the target population. This survey method involved setting

study objectives, selecting a suitable survey frame, determining the sample design, ques-

tionnaire design, data collection, processing, analysis, distribution, and comprehensive

documentation of the survey process.

5. The researchers will personally collect the completed survey questionnaires from the

participants.

COLLEGE OF ARTS AND SCIENCE Page | 10


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

6. Subsequent to the collection phase, the researchers will collate and analyze the gath-

ered data. They will collaborate with a statistician and utilize XLSTAT in Microsoft Ex-

cel for this purpose.

7. The results of the descriptive survey will be methodically compiled, tabulated, and

computed utilizing quantitative data descriptive statistics such as frequency count, mean,

percentage, rank, and standard deviation. Additionally, the responses to open-ended ques-

tions were compared, grouped, and summarized utilizing SWOT analysis techniques.

3.7 Data Analysis and Statistical Treatment

The researchers employed a comprehensive approach, integrating qualitative and

quantitative data to evaluate the perceptions of Legal Studies students regarding the

ramifications of Cybersquatting under the Cybercrime Prevention Act of 2012.

To gauge these perceptions accurately, a refined 4-point Likert Scale was utilized.

This scale allowed participants to express their opinions clearly, with each point repre-

senting a distinct viewpoint on the topic. The Likert scale encompassed responses rang-

ing from "strongly agree" to "strongly disagree," ensuring a forced choice of opinion and

preventing neutral responses. This structured approach enabled a meticulous analysis of

students' attitudes and viewpoints concerning cybersquatting and its implications, provid-

ing valuable insights into their perspectives on trademark infringement within the digital

realm.

COLLEGE OF ARTS AND SCIENCE Page | 11


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

Furthermore, the study delved into additional factors such as participants' aware-

ness of legal regulations, prior experiences, and socio-demographic characteristics, en-

hancing the depth and breadth of the data analysis and statistical treatment. By incorpo-

rating these multifaceted elements, the research aimed to yield a comprehensive under-

standing of Legal Studies students' perceptions, enriching the study's findings and impli-

cations.

COLLEGE OF ARTS AND SCIENCE Page | 12


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

REFERENCES

Berman, P. (1978). “The Study of Macro- and Micro-Implementation.” Public Policy 26,

no. 2: 157-84.

Bernat, F. P., & Makin, D. (2014). Cybercrime Theory and Discerning if there is a Crime:

The Case of Digital Piracy. International Review of Modern Sociology, 40(2),

99–119. http://www.jstor.org/stable/43499904

Bhusari, R., & Rampure, K. (2022, January 15). Cybersquatting: A Threat To The

Globalising World. Indian Journal of Law and Legal Research, 3(2). https://doi-

ds.org/doilink/01.2022-68535724/IJLLR/V3/I2/A221

Cabel, K. (2015). Combating Cybercrime in the Philippines. United Nations Asia and Far

East Institute Resource Material Series No. 97. Tokyo, Japan.

http://www.unafei.or.jp/english/pdf/RS_No97/No97_IP_Philippines.pdf

Dizon, D., (2008, September 13). Cybersquatting cases in RP rising. ABS-CBN News.

https://news.abs-cbn.com/features/09/11/08/cybersquatting-cases-rp-rising

Domingo, F. (2016). Strategic Considerations for Philippine Cyber Security. ADR

Institute for Strategic and International Studies.

http://www.academia.edu/20823505/Strategic_Considerations_for_Philippine_Cy

ber_Security.

Hein Online. (2021, March 8). About | HeinOnline.

https://heinonline.org/HOL/LandingPage?handle=hein.journals/ijlmhs13&div=73

&id=&page=

Hjern, S., Benny, F. and Chris, H. (1987). “Implementation Research as Empirical

COLLEGE OF ARTS AND SCIENCE Page | 13


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

Constitutionalism.” European Journal of Political Research 10, no. 2: 105-16.

Ivankova, N. V., Creswell, J. W., & Stick, S. L. (2006, February). Using Mixed-Methods

Sequential Explanatory Design: From Theory to Practice. Field Methods, 18(1),

3–20. https://doi.org/10.1177/1525822x05282260

Johnson, R. B., & Onwuegbuzie, A. J. (2004). Mixed Methods Research: A Research

Paradigm Whose Time Has Come. Educational Researcher, 33(7), 14–26.

http://www.jstor.org/stable/3700093

Kaspersky. (2023). Cybersquatting Issues. www.kapersky.com. Retrieved September 16,

2023, from

https://www.kaspersky.com/resource-center/preemptive-safety/cybersquatting

Kapersky. (2023, April 19). What Is Cybersquatting? www.kaspersky.com. Retrieved

October 9, 2023, from https://www.kaspersky.com/resource-center/preemptive-

safety/cybersquatting

Krisa, J. (2013, March 19) Review of Related Literature on Cybersquatting. Jamelle

Krisa Blog Spot. http://jamellekrisa.blogspot.com/?m=1

Lipton, J. (2009). Bad Faith in Cyberspace: Grounding Domain Name Theory in

Trademark, Property and Restitution. Harvard Journal of Law and Technology,

Forthcoming, Case Legal Studies Research Paper No. 09-28.

https://ssrn.com/abstract=1484763

Lipsky, M. (1980). Street level bureaucracy: Dilemmas of the Individual in Public

Service. New York: Russel Sage Foundation.

Lipsky, M. (1978). “Standing the Study of Policy Implementation on Its Head.”

COLLEGE OF ARTS AND SCIENCE Page | 14


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

Cambridge, Massachussets: MIT Press.

Magdirila, F. (2013). Domain Squatting Controversy Rocks E-Commerce Startup Scene.

Tech in Asia – Connecting Asia’s Startup Ecosystem.

https://www.techinasia.com/domain-squatting-controversy-rocks-ecommerce-

startup-scene-philippines

Matland, R. (1995). “Synthesizing the Implementation Literature: The Ambiguity-

Conflict Model of Policy Implementation.” Journal of Public Administration

Research and Theory 5, no. 2: 145-74.

http://orion.luc.edu/~rmatlan/pdf/1995SynthesizingtheImplementationLiterature.p

df.

Matland, R. (1995). “Synthesizing the Implementation Literature: The Ambiguity-

Conflict Model of Policy Implementation.” Journal of Public Administration

Research and Theory, 5:02:145-174.

Mazmanian, D., and Sabatier, P. (1984). “Implementation and Public Policy,” Policy

Sciences 17, No. 1: 95-97.

Pantov, V. (2013, September 10). The prevention of cybersquatting in Europe: diverging

approaches and prospects for harmonization.

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2427582

Petrosyan, A. (2022, December 13). Cybersquatting: most domain name dispute filings

2022. Statista. Retrieved September 17, 2023, from

https://www.statista.com/statistics/416159/domain-name-cases-filings-wipo/

Rodriguez, A., (2012, February 5). Cybersquatters Face Serious Sentences in the

COLLEGE OF ARTS AND SCIENCE Page | 15


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

Philippines. Realtime Register. Retrieved September 17, 2023, from

https://realtimeregister.com/blog/cybersquatters-face-serious-sentences-in-the-

philippines/

Rupal, P. (2019, July 6). Jaiswal Symbisosis Law School. Volume 6. The Web of

Cybersquatting. http://penalclaims.com/wp-content/uploads/2019/07/Rupal-

Jaiswal

Saydjari, O. Sami. (2008) “Structuring for Strategic Cyber Defense: A Cyber Manhattan

Project Blueprint.” (paper presented at the Twenty-Fourth Annual Computer

Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-

12).

Shackelford, Scott, Scott Russell, and Jeffrey H. (2015) Bottoms Up: A Comparison of

Voluntary Cybersecurity Frameworks. United States: UC Davis Business Law

Journal.

Sosa, Gilbert. (2015). Country Report On Cybercrime: The Philippines. The Criminal

Justice Response To Cybercrime Course.

Senate and House of Representatives of the Philippines. (2012, September 12). Republic

Act No. 10175. Official Gazette. Retrieved September 17, 2023, from

https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/

Singh, V. (2021, December 16). Analysis of Current Global position on Cybersquatting.

Khurana And Khurana Advocates and IP Attorneys. Retrieved September 17,

2023, from https://www.khuranaandkhurana.com/2021/12/16/cybersquatting-

regulatory-mechanisms/

COLLEGE OF ARTS AND SCIENCE Page | 16


LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE

Stella, J., & Kumari, A. (2022, March). Cyber Squatting – The Digital Version of Passing

Off. The Law Brigade, 8(2).

https://thelawbrigade.com/wp-content/uploads/2022/03/Jenifer-Stella-S-JLSR-

1.pdf.

Stephan, F. F. (1941). Stratification in Representative Sampling. Journal of Marketing,

6(1), 38–46. https://doi.org/10.2307/1245763

Timans, R., Wouters, P., & Heilbron, J. (2019). Mixed methods research: what it is and

what it could be. Theory and Society, 48(2), 193–216.

http://www.jstor.org/stable/45200451

Van, M., Donald S., Carl E., and Van H. (1975). “The Policy Implementation Process: A

Conceptual Framework.” 6, no. 4: 445-88. Accessed December 20, 2016.

Villanueva, V. (2021, December 5). R.A. No. 10175: The Cybercrime Prevention Act:

The Net Commandments. Philippine Legal Research.

https://legalresearchph.com/2021/12/05/r-a-no-10175-the-cybercrime-prevention-

act-the-net-commandments/

World Intellectual Property Organization. (n.d.). WIPO Guide to the Uniform Domain

Name Dispute Resolution Policy (UDRP). WIPO. Retrieved September 17, 2023,

from https://www.wipo.int/amc/en/domains/guide/

Winter, S. (1986) “How Policy-Making Affects Implementation: The Decentralization of

the Danish Disablement Pension Administration.” Scandinavian Political Studies

9, no. 4: 361-85. Accessed December 20, 2016.

COLLEGE OF ARTS AND SCIENCE Page | 17

You might also like