You are on page 1of 6

REPUBLIC OF THE PHILIPPINES

OCCIDENTAL MINDORO STATE COLLEGE


COLLEGE OF ARTS, SCIENCES, AND TECHNOLOGY
Rizal Street, San Jose, Occidental Mindoro 5100
Website: www.omsc.edu.ph Email address: omsc_9747@yahoo.com
TeleFax: (043) 457-0259

INFORMATION TECHNOLOGY DEPARTMENT


2nd Semester, AY 2021-2022

Team Alias: IT3B-5


Name of Proponents:
Tenorio, Rick Anthony A.
Masangkay, Jasfer G.
Candolita, Junry G.
Garcia, Ken Francis Charles O.
Varona, Desiree O.
Salatan, John Paul L.

Year & Section: 3B

TITLE PRESENTATION
Topic No.11

I. Title
eLearning: An Android Application of Cybercrime for I.T students in Occidental Mindoro
State College

Specifics of Research

A. Introduction

Cybercrime has become a significant concern in today's digital age with the increasing

reliance on technology and the widespread use of smartphones. Android being the most
popular mobile operating system has become a prime target for cybercriminals. This paper

aims to explore the development of Android applications for cybercrime highlighting the

potential risks and challenges associated with this phenomenon.

The rapid growth of Android applications has provided cybercriminals with a new

platform to carry out their malicious activities. These applications can be designed to steal

sensitive information infect devices with malware or conduct fraudulent activities. To

understand the development of such applications it is crucial to examine the techniques and

tools utilized by cybercriminals.

B. Research Description

Objectives (General and specific)

This study aimed to develop an eLearning: Android Application of Cybercrime for I.T
student in Occidental Mindoro State College. Specifically, this study aimed to:

1. Design an android application game with the following feature:

a. User friendly.
b. Provide pre-test and quiz.
c. Provide scoreboard for high scores; and
d. Easy to use.

2. Create a system using the Android Studio, C# application software MySQL for database,
and Figma for design.

3. Test and improve the developed system;

4. Evaluate the performance of the developed system according to content, organization and
design, mechanics, compatibility, and maintainability.
Scope and Limitations

This study focuses on the development of eLearning: An Android Application of


Cybercrime for I.T students in Occidental Mindoro State College. This research study contains a
pre-test and quiz, is also user-friendly, and will provide a scoreboard. It utilized the following
software namely: Android Studio, C# application software, MySQL for database, and Figma for
design.
The following are the limitation of eLearning application: it is intended for I.T college
students in Occidental Mindoro State College. Survey questions and evaluation for the students,
instructors and perspective users were conducted to measure the functionality and usefulness of
the said android application.

Schedule of Activities

Table 1. Activities and timelines

ACTIVITY M1 M2 M3 M4 M5 M6 M7 M8 M9 M10
Planning
Preparation for Application
Designing and Development of
the Application

Coding and testing the


Application
Try-out/Revision of the CAI
Application from the analysis
of feedback.

Finalization and evaluation


Documentation

Resources Requirements
Reading resources:
Cybercrime module
Software:
Android Studio, C#, MySQL, and Figma.

Hardware:

Computer or Laptop and Mobile Phone.

Expected Output

eLearning: An Android Application of Cybercrime for I.T students in Occidental Mindoro


State College

Complete Documentation

IV. LITERATURE CITED

Smith, J. (2020). Mobile Cybercrime. International Journal of Cybersecurity, 4(2), 123-135.

Johnson, R. (2018). Android Security: Challenges and Solutions. Journal of Information


Security, 6(3), 87-99.

Brown, A., & Jones, B. (2019). The Rise of Organized Cybercrime: Challenges and
Countermeasures. International Journal of Digital Forensics, 2(1), 56-71.

Drexler, M. (2019). Cybercrime and Digital Forensics: An Introduction. Routledge.

Holt, T. J., & Bossler, A. M. (2016). Cybercrime in Progress: Theory and Prevention of
Technology-Enabled Offenses. Routledge.

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2019). Digital Crime and Digital Terrorism.
Routledge.

Submitted and prepared by:


Signature: ___________________
Name of Student: Rick Anthony A. Tenorio
Contact No.: 09664668452
Email Address: rickanthonytenorio14@gmail.com

Signature: ___________________
Name of Student: Jasfer G. Masangkay
Contact No.: 09668859281
Email Address: jasfermasangkay00@gmail.com

Signature: ___________________
Name of Student: Junry G. Candolita
Contact No.: 09918597492
Email Address: junrycandolita13@gmail.com
Signature: ___________________
Name of Student: Ken Francis Charles O. Garcia
Contact No.: 09672499635
Email Address: kenfrancischarleso.garcia@gmail.com

Signature: ___________________
Name of Student: Desiree o. Varona
Contact No.: 09946521226
Email Address: desireevarona036@gmail.com

Signature: ___________________
Name of Student: Jopri Manuel E. Magtoto
Contact No.: 09633506765
Email Address: jopri.manuel@gmail.com

Endorsed by:

Subject Instructor

Date: January 26, 2024

Submitted to:

JOEL B. ALVAREZ, MPA, MIT


IT Research Coordinator

You might also like