Professional Documents
Culture Documents
In Partial Fulfillment
NAME
January 2021
LYCEUM OF THE PHILIPPINES UNIVERSITY CAVITE
ACKNOWLEDGEMENT
Abstract
TABLE OF CONTENTS
Contents Page
Acknowledgement ………………………………… ii
Bibliography …………………………………. 4
Appendices …………………………………
CHAPTER I
INTRODUCTION
This chapter presents the basic information and principles that guided the research
proposal process. It includes the objectives and concepts which serve as the framework of
the study. Moreover, it explains the significance, the scope, and the limitation of the
study; as well it provides the definition of terms used by the researchers throughout the
study.
CHAPTER II
LITERATURE REVIEW
This chapter presents a review of relevant literature, studies and concepts essential
to the development of the conceptual framework. These are the compilation of sources of
information, data, and knowledge that will help to answer the research questions and to
Key topics
Synthesis
CHAPTER III
METHODOLOGY
This chapter presents the research design, the sampling design and the description
of the respondents, research instruments, data gathering procedure, and data analysis and
statistical treatments used to attain valid and relevant results for the study.
qualitative and quantitative approaches, researchers aimed to delve deeply into the
exploration, enabling the researchers to triangulate data from diverse sources. Qualitative
data provided rich insights into students' perceptions, motivations, and contextual factors
prevalence and implications of this phenomenon. By combining these methods, the study
could offer a holistic view, bridging the qualitative nuances of student perceptions with
the quantitative data on cybersquatting's tangible consequences, thus enriching the overall
In this approach, the research begins with qualitative data collection and analysis, fol-
lowed by quantitative data collection to explain or validate the initial qualitative findings.
In this study, researchers initially conduct qualitative surveys with Legal Studies students
questions, researchers can gather rich qualitative data, capturing the nuances and underly-
ing reasons behind the students' attitudes and beliefs regarding trademark infringement.
Qualitative methods allow for a deep exploration of the topic, uncovering various per-
valuable insights into the qualitative data gathered. By utilizing this structured analytical
framework, researchers can systematically evaluate the content of the essay responses.
This methodical approach enhances the understanding of students' perceptions and allows
for tailored interventions and educational strategies to address specific areas of improve-
After analyzing the qualitative data, the researchers can identify patterns, themes,
and hypotheses. To further validate and explain these qualitative findings, quantitative
the prevalence of certain attitudes or beliefs identified during the qualitative phase, will
employing an Explanatory Sequential Design, the study can provide a comprehensive un-
derstanding of Legal Studies student perceptions of trademark infringement and its rela-
tion to cybersquatting. The qualitative phase offers depth and context, while the quantita-
tive phase validates the qualitative findings on a larger scale, enhancing the study's over-
The table below shows the variables and measures used in the study.
VARIABLES MEASURES
Perception of Legal Studies The researchers adapted questions from Khan et al.'s
students with trademark in- (2015) study, specifically tailored to explore a unique
Perception of the Legal Stud- Modified questions from Khan et al. (2015) that
ies students on their familiar- would establish the effects of their familiarity on cy-
ity with the cybercrime of cy- bersquatting and how it would affect their day to day
Perception of Legal Studies Modified questions from Khan et.al (2015) regarding
students with the effect of Cy- the trademark infringement in a cyber setting and lay
bersquatting under Cyber- out its effects under Republic Act 10175.
The research was conducted at Lyceum of the Philippines University Cavite, situ-
ated at Governor's Drive, Barangay Manggahan, City of General Trias, Cavite. The uni-
versity, established in June 2008, served as the backdrop for this study.
The participants selected for this research were students enrolled in the Legal
Studies program at Lyceum of the Philippines University-Cavite Campus during the aca-
demic year 2023-2024. The researchers gathered information from the College of Liberal
Arts and Education (CLAE) and LPU Legal Studies Society (LLSS) indicating that the
Legal Studies program comprised 67 students, both male and female, excluding the re-
searchers themselves.
These students were chosen as respondents due to their relevance to the study's
subject matter, aligning with their course of study. Furthermore, their age group repre-
sents one of the initial generations exposed to the 21st century, constituting approxi-
mately seventy percent of the Philippine population. Moreover, they possess diverse
which is particularly pertinent given that cybersquatting incidents primarily stem from
technological advancements.
For this study on the perceptions of Legal Studies students regarding cybersquat-
ting and trademark infringement, a stratified random sampling method will be employed.
The population of interest comprises 67 Legal Studies students at Lyceum of the Philip-
pines University-Cavite Campus during the academic year 2023-2024. The students will
be divided into strata based on their familiarity and experience with online activities and
intellectual property issues, which are directly relevant to the study on trademark in-
The stratification will take place by dividing the 67 Legal Studies students into
strata based on their level of engagement with online activities, such as social media us-
age, online shopping, blogging, or website ownership. This division ensures that partici-
pants have varying degrees of exposure to the online environment, where issues like cy-
Stratum 1: Students actively engaged in online activities (e.g., frequent social media
Stratum 2: Students moderately engaged in online activities (e.g., occasional social me-
Stratum 3: Students with minimal online activity (e.g., infrequent internet users, limited
For the survey administration, the researchers will administer the survey question-
naire to the randomly selected students within each stratum. The questionnaire will focus
Then the researchers will analyze the survey responses to draw conclusions about the per-
Ensure the findings are representative of the entire Legal Studies student population by
By stratifying the students based on their online activities and intellectual prop-
erty awareness, you ensure that the sampled participants represent diverse backgrounds
and experiences relevant to the study's focus on trademark infringement and cybersquat-
ting. This approach provides a nuanced understanding of how different levels of online
engagement and intellectual property awareness influence Legal Studies students' percep-
tured on the Likert scale and open-ended inquiries. These questions were fashioned based
on themes explored in the study conducted by Khan et al. (2015). These themes encom-
perceptions within a cyber context, and their influence on cybersquatting implications un-
der the Cybercrime Prevention Act of 2012. To mitigate bias, the researchers meticu-
lously consulted their research adviser, ensuring the questionnaire's integrity. Subse-
Prior to survey administration, the researchers diligently sought approval from the
Dean of the College of Liberal Arts and Education, formally addressing this request
through a letter. Upon securing consent, the survey was administered to the participants.
agreement to partake and acknowledging that their responses would be subject to the
mation, Likert scale-based queries, and subsequent open-ended questions. These elements
their perspectives on trademark infringement within a cyber context and its concomitant
steps:
3. Obtain approval to conduct the study through a formal letter signed by the Dean of the
4. To gather data, two distinct methods were employed. The first method involved data
mining, wherein the researchers explored various sources such as research articles, jour-
nals, published theses, and unpublished theses, primarily accessed through online plat-
forms. The second method encompassed a survey approach, aiming to elucidate the self-
reported characteristics of the target population. This survey method involved setting
study objectives, selecting a suitable survey frame, determining the sample design, ques-
5. The researchers will personally collect the completed survey questionnaires from the
participants.
6. Subsequent to the collection phase, the researchers will collate and analyze the gath-
ered data. They will collaborate with a statistician and utilize XLSTAT in Microsoft Ex-
7. The results of the descriptive survey will be methodically compiled, tabulated, and
computed utilizing quantitative data descriptive statistics such as frequency count, mean,
percentage, rank, and standard deviation. Additionally, the responses to open-ended ques-
tions were compared, grouped, and summarized utilizing SWOT analysis techniques.
quantitative data to evaluate the perceptions of Legal Studies students regarding the
To gauge these perceptions accurately, a refined 4-point Likert Scale was utilized.
This scale allowed participants to express their opinions clearly, with each point repre-
senting a distinct viewpoint on the topic. The Likert scale encompassed responses rang-
ing from "strongly agree" to "strongly disagree," ensuring a forced choice of opinion and
students' attitudes and viewpoints concerning cybersquatting and its implications, provid-
ing valuable insights into their perspectives on trademark infringement within the digital
realm.
Furthermore, the study delved into additional factors such as participants' aware-
hancing the depth and breadth of the data analysis and statistical treatment. By incorpo-
rating these multifaceted elements, the research aimed to yield a comprehensive under-
standing of Legal Studies students' perceptions, enriching the study's findings and impli-
cations.
REFERENCES
Berman, P. (1978). “The Study of Macro- and Micro-Implementation.” Public Policy 26,
no. 2: 157-84.
Bernat, F. P., & Makin, D. (2014). Cybercrime Theory and Discerning if there is a Crime:
99–119. http://www.jstor.org/stable/43499904
Bhusari, R., & Rampure, K. (2022, January 15). Cybersquatting: A Threat To The
Globalising World. Indian Journal of Law and Legal Research, 3(2). https://doi-
ds.org/doilink/01.2022-68535724/IJLLR/V3/I2/A221
Cabel, K. (2015). Combating Cybercrime in the Philippines. United Nations Asia and Far
http://www.unafei.or.jp/english/pdf/RS_No97/No97_IP_Philippines.pdf
Dizon, D., (2008, September 13). Cybersquatting cases in RP rising. ABS-CBN News.
https://news.abs-cbn.com/features/09/11/08/cybersquatting-cases-rp-rising
http://www.academia.edu/20823505/Strategic_Considerations_for_Philippine_Cy
ber_Security.
https://heinonline.org/HOL/LandingPage?handle=hein.journals/ijlmhs13&div=73
&id=&page=
Ivankova, N. V., Creswell, J. W., & Stick, S. L. (2006, February). Using Mixed-Methods
3–20. https://doi.org/10.1177/1525822x05282260
http://www.jstor.org/stable/3700093
2023, from
https://www.kaspersky.com/resource-center/preemptive-safety/cybersquatting
safety/cybersquatting
https://ssrn.com/abstract=1484763
https://www.techinasia.com/domain-squatting-controversy-rocks-ecommerce-
startup-scene-philippines
http://orion.luc.edu/~rmatlan/pdf/1995SynthesizingtheImplementationLiterature.p
df.
Mazmanian, D., and Sabatier, P. (1984). “Implementation and Public Policy,” Policy
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2427582
Petrosyan, A. (2022, December 13). Cybersquatting: most domain name dispute filings
https://www.statista.com/statistics/416159/domain-name-cases-filings-wipo/
Rodriguez, A., (2012, February 5). Cybersquatters Face Serious Sentences in the
https://realtimeregister.com/blog/cybersquatters-face-serious-sentences-in-the-
philippines/
Rupal, P. (2019, July 6). Jaiswal Symbisosis Law School. Volume 6. The Web of
Cybersquatting. http://penalclaims.com/wp-content/uploads/2019/07/Rupal-
Jaiswal
Saydjari, O. Sami. (2008) “Structuring for Strategic Cyber Defense: A Cyber Manhattan
12).
Shackelford, Scott, Scott Russell, and Jeffrey H. (2015) Bottoms Up: A Comparison of
Journal.
Sosa, Gilbert. (2015). Country Report On Cybercrime: The Philippines. The Criminal
Senate and House of Representatives of the Philippines. (2012, September 12). Republic
Act No. 10175. Official Gazette. Retrieved September 17, 2023, from
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
regulatory-mechanisms/
Stella, J., & Kumari, A. (2022, March). Cyber Squatting – The Digital Version of Passing
https://thelawbrigade.com/wp-content/uploads/2022/03/Jenifer-Stella-S-JLSR-
1.pdf.
Timans, R., Wouters, P., & Heilbron, J. (2019). Mixed methods research: what it is and
http://www.jstor.org/stable/45200451
Van, M., Donald S., Carl E., and Van H. (1975). “The Policy Implementation Process: A
Villanueva, V. (2021, December 5). R.A. No. 10175: The Cybercrime Prevention Act:
https://legalresearchph.com/2021/12/05/r-a-no-10175-the-cybercrime-prevention-
act-the-net-commandments/
World Intellectual Property Organization. (n.d.). WIPO Guide to the Uniform Domain
Name Dispute Resolution Policy (UDRP). WIPO. Retrieved September 17, 2023,
from https://www.wipo.int/amc/en/domains/guide/