Professional Documents
Culture Documents
CYBERCRIME
A Thesis
Presented to the Faculty of the Professional Schools
SOUTHWAY COLLEGE OF TECHNOLOGY
San Francisco, Agusan del Sur
___________________________________
In Partial Fulfillment
Course Professor:
______________________________________
NAME OF MEMBERS:
Barrios, Amylisa
Darunday, Lorie Grace
Montuerto, Haidelyn
Perez, Gomelyn
Rosales, Jeraldine
APPROVAL SHEET
PANEL OF EXAMINERS
First and foremost, we sincerely appreciate the almighty God for His
graces, strength, sustenance, and above all, His faithfulness and love from
the beginning of our academic journey. We are grateful for his tireless giving
humble adviser, at the same time our instructor in Criminology, Ms. Erika
To all people who trusted that we could handle this research even if it
was difficult, especially to our fellow students, thank you very much for your
Last but not the least, we would like to thank our parents for
assistance even in difficult times. This is all for you and we love you so much
support, love, care, and financial assistance from the beginning up to the end
of this research. We are humbly saying that we have the best parents in the
We dedicate this project to God almighty our creator, our savior, our
the source of our strength throughout this program. On his wings only have
we soared.
We also dedicate this work to our family, relatives, and friends, who
have encouraged us all the way and whose encouragement has made sure
that we give it all to finish what we have started. Thank you. Our love for you
Cybercrime, made used of the research design that involved one hundred (100)
The study was guided tested at 0.05 level of significance. The following
College of Technology in the analysis of data which are weighted mean and Pearson
reinforcement sensitivity theory and cybercrime that is based on the result of the
about the information you divulge online such as school names, email addresses,
home addresses and telephone numbers and avoid visiting unknown websites or
downloading software from untrusted sources also ensure you have antivirus
Technology
TABLE OF CONTENTS
Page
TITLE PAGE i
APPROVAL SHEET ii
ACKNOWLEDGMENT iii
DEDICATION iv
ABSTRACT v
TABLE OF CONTENTS vi
LIST OF TABLES vii
LIST OF FIGURES viii
Chapter
41 INTRODUCTION
Rationale 1
Research Objective 2
Hypothesis 3
Theoretical Framework 9
Conceptual Framework 11
Definition of Terms 14
2 METHOD
Research Design 15
Research Locale 15
Data Collection 18
Statistical Tools 19
3 RESULTS
Level of Cybercrime 21
4 DISCUSSION
Cybercrime 23
Conclusion 25
Recommendations 25
REFERENCES 27
APPENDICES
A A List of Tables 30
C Grammarian Certificate 35
D Curriculum Vitae 39
LIST OF TABLES
Table Page
2 Level of Cybercrime 21
Figure Page