You are on page 1of 111

Republic of the Philippines

EULOGIO “AMANG” RODRIGUEZ


INSTITUTE OF SCIENCE AND TECHNOLOGY
1
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CYBER PHISHING AMONG TEACHERS AND EMPLOYEES OF


EDUCATIONAL INSTITUTION IN CARSIGMA:
BASIS FOR PUBLIC INFORMATION DRIVE

A Thesis
presented to the Faculty of
Eulogio “Amang” Rodriquez Institute of
Science and Technology

In Partial Fulfillment
of the Requirements for the Degree
Bachelor of Science in Criminology

by

ABBEGAIL MARIE T. ARCE


ROEL M. FRANCIA
ARVIN KYLE G. MILLAN
KARL JUSTINE G. PAGSALIGAN
KENT BRYAN S. PALAUBSANON

2022
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
2
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CERTIFICATION
This thesis entitled “CYBER PHISHING AMONG TEACHERS AND
EMPLOYEES OF EDUCATIONAL INSTITUTION IN CARSIGMA: BASIS FOR
PUBLIC INFORMATION DRIVE” prepared and submitted by
ABBEGAIL MARIE T. ARCE, ROEL M. FRANCIA, ARVIN KYLE G.
MILLAN, KARL JUSTINE G. PAGSALIGAN, and KENT BRYAN S.
PALAUBSANON in partial fulfillment of the requirements for
the degree of Bachelor of Science in Criminology has been
examined and recommended for ORAL DEFENSE.

CATHERINE D. DUMPIT,MA.Ed.
Thesis Adviser

APPROVAL SHEET
Approved by the Oral Defense Panel on March 28, 2022
with a rating of 1.75.

AGNES N. COO,Ed.D.
Chairman

SHIRLEY P. DE LEON,Ed.D. FLORDELIZA C. NAVARRO,MA.Ed.


Member Member

Accepted in partial fulfillment of the requirement for


the degree of Bachelor of Science in Criminology.

AGNES N. COO,Ed.D.
Campus Administrator
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
3
CAVITE CAMPUS
General Mariano Alvarez, Cavite
ABSTRACT

Title : CYBER PHISHING AMONG TEACHERS AND EMPLOYEES

OF EDUCATIONAL INSTITUTION IN CARSIGMA:

BASIS FOR PUBLIC INFORMATION DRIVE

Researchers : ABBEGAIL MARIE T. ARCE

ROEL M. FRANCIA

ARVIN KYLE G. MILLAN

KARL JUSTINE G. PAGSALIGAN

KENT BRYAN S. PALAUBSANON

Degree : Bachelor of Science in Criminology

Year : 2022

Adviser : MRS. CATHERINE D. DUMPIT

Rationale of the Study

As the COVID-19 pandemic began, the teacher and

employees in educational institutions shifted into an

online set up. This makes them more vulnerable to

cybercrime. Teachers and employees of educational

institutions are prone target of phishers because they have

the financial income and they often use online

transactions. This research can also be used as a basis for

public information drive in the prevention of cyber

phishing.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
4
CAVITE CAMPUS
General Mariano Alvarez, Cavite
The study aimed to assess the cyber phishing among

teachers and employees of educational institutions in

CarSiGma. Specifically, it aims to provide answers for the

following questions:

1. What are the demographic and professional profile of

the respondents in terms of:

1.1 Age;

1.2 Sex;

1.3 Position or Rank;

1.4 Family Income; and

1.5 Length of Service?

2. What are the means used by the respondents in online

transactions so as to:

2.1 Payment;

2.2 Purchase;

2.3 Cash Transfer?

3. What are the types of cyber phishing encountered by

the respondents as to:


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
5
CAVITE CAMPUS
General Mariano Alvarez, Cavite
3.1 Spear Phishing;

3.2 Whaling Phishing;

3.3 Smishing Phishing; and

3.4 Vishing Phishing?

4. What are the actions taken by the victims in terms

of:

4.1 Legal Actions; and

4.2 Personal Action?

5. Is there a significant relationship between

demographic/professional profiles and types of cyber

phishing?

6. Based on the findings, what public information drive

can be proposed and implemented?

A descriptive research method was used in this study

that was conducted in selected educational institutions

within Carmona, Silang, and G.M.A., Cavite. The respondents

are teachers and employees of educational institutions. The

researchers used a convenience sampling technique. The main

tool in this study is a survey questionnaire via Google


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
6
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Forms. The statistical tools used in this study are

frequency, percentage, weighted mean, rank, and chi-square.

The salient findings of the study are as follows:

There are 78 respondents that fall between the ages of 30

to 35 years old. There are 113 respondents for females,

and as to their position or rank, there are 49 respondents

from assistant professor 2. In terms of family income,

there are 64 respondents have family incomes ranging from

15,000 to 20,000. And for the length of service there are

111 respondents with a length of 4 to 6 years in service

of teaching.

There are 61 or 16.5 percent of the respondents used

7/11 connect as means for payment in an online

transaction; As for purchase there are 50 or 14.1 percent

respondents to used PayMaya and 50 or 14.1 percent for the

online transaction. And in terms of cash transfer, there

are 86 or 24 percent used both Gcash and 86 or 24 percent

for online bank transaction.

On the types of cyber phishing encountered by the

respondents, smishing phishing was the often encountered

which is explained in table 12 and as follows; I have seen


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
7
CAVITE CAMPUS
General Mariano Alvarez, Cavite
news articles about victims who received suspicious text

messages from an unknown number and were deceived into

giving

sensitive information.

The assessment of the actions taken by the victims in

terms of legal action is they have reported the incident

into their bank authorities. While the action taken by the

victims in terms of personal actions is they posted what

they had experienced on social media so that other people

would be aware of phishing.

There is significant relationship between age vs.

types of cyber phishing as to spear, whaling, and vishing

while it has no significant relationship to smishing

phishing. Sex vs. types of cyber phishing; Sex has

significant relationship to spear, waling, and vishing

phishing but has no significant relationship to smishing

phishing. Position/Rank vs. types of cyber phishing;

Position and rank has significant relationship to all the

types of cyber phishing. Family income vs. types of cyber

phishing; Family income has a significant relationship to

all the types of cyber phishing. As to length of service


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
8
CAVITE CAMPUS
General Mariano Alvarez, Cavite
vs. types of cyber phishing; Length of service has a

significant relationship to whaling and smishing but has

no significant relationship to spear and vishing phishing.

Based on the findings of the study, the researchers

conclude that most of the victims are females because they

have a shallow knowledge of cyber threats including cyber

phishing, though their family income is between 15,000 to

20,000 and they are not tenured in service with a length of

service of between 4-6 years.

As to the data gathered, the means used by respondents

in online transactions as to payment is 7/11 connect

because it has many options for paying. As to purchases,

the respondents use both PayMaya and online bank

transactions because they have a direct shopping option and

a dollar currency option. As to cash transfers, the

respondents use both Gcash and online bank transactions

because they were designed for cash transfers and because

they were easy and convenient to use.

Based on the data gathered, smishing phishing is the

most encountered type of cyber phishing by the respondents.

It is because smishing phishing attacks individuals through


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
9
CAVITE CAMPUS
General Mariano Alvarez, Cavite
text messages and the victims decide faster, especially if

there is an expected prize or a threat.

Based on findings, the victims are more often taking

personal actions than legal actions because it is faster

unlike legal action which takes a long process.

The researchers conclude that most of the demographic

profiles and types of cyber phishing have a significant

relationship with each other except: age and smishing

phishing, sex and smishing phishing, length of service and

vishing phishing, length of service and spear phishing.

ACKNOWLEDGEMENTS
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
10
CAVITE CAMPUS
General Mariano Alvarez, Cavite
The researchers would like to express heartfelt

gratitude and appreciation to the following good-hearted

people, who in one way or another, helped in the completion

of this research undertaking: For Dr. Agnes N. Coo, the

Campus Administrator; Mr. Edzel G. Peña, the Criminology

Chairperson; and Mrs. Catherine D. Dumpit, their thesis

adviser, for contributing to the success of this project.

They were able to complete all stages of the project thanks

to their supervision and suggestions. The researchers would

also like to express gratitude to the panelists for making

the defense enjoyable and for their insightful comments and

ideas.

The researchers also like to express their gratitude to

their friends and their entire family for the unwavering

support and understanding during the research and writing.

Your prayers for them have kept them going so far.

Finally, they want to express their gratitude to God

for allowing them to persevere in the face of adversity.

They've been following your advice on a daily basis. You are

the one who allowed them to complete their studies. They

shall continue to put their faith in you for the future

DEDICATION
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
11
CAVITE CAMPUS
General Mariano Alvarez, Cavite
The researchers would like to dedicate this research
study, above all, to our almighty God, for everything he
has done in our lives.

To the families of the researchers, PALAUBSANON Family,


MILLAN Family, FRANCIA Family, PAGSALIGAN Family, and ARCE
Family who gave us the greatest support and love that we
could ever have, for understanding how much it will cost
and how we study through day and night.

We would like to express our deep gratitude and


dedication to these people who gave us unconditional
effort, love, understanding and support.

To Dayna Palaubsanon, Kent Bryan’s mother who allows us


to study in their home and provides us with abundant food.

To Henrich Millan, Arvin Kyle’s brother, who has


sponsored our thesis and has always been willing to assist
us in our efforts to complete it.

To Regie Francia, Roel’s mother, who draws our


attention to our predicament in order for us to support and
comprehend it.

To Primitiva Pagsaligan, Karl Justine’s mother, who is


always there for us and prepares a great lunch for us.

To Rodolfo Arce, Abbegail’s father, who makes us joyful


and provides us with a stress-free day in their home.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
12
CAVITE CAMPUS
General Mariano Alvarez, Cavite
TABLE OF CONTENTS

Page

LIST OF TABLES xv

CHAPTER

1 The Problem and Its Background 1

Introduction 1

Theoretical Framework 3

Conceptual Framework 4

Statement of the Problem 5

Hypothesis 7

Scope and Limitation of the Study 7

Significance of the Study 8

Definition of Terms 10

2 Review of Related Literature and Studies 16

Local Literature 16

Foreign Literature 18

Local Studies 21

Foreign Studies 23

Page
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
13
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Synthesis 26

3 Methodology 28

Research Design 28

Population and Sampling 29

Respondents of the Study 30

Research Instrument 30

Data Gathering Procedures 31

Statistical Treatment of Data 32

4 Presentation, Analysis and Interpretation of Data 35

Sub-Problem No. 1 35

Sub-Problem No. 2 40

Sub-Problem No. 3 43

Sub-Problem No. 4 50

Sub-Problem No. 5 53

Sub-Problem No. 6 59

5 Summary, Conclusions and Recommendations 61

Summary 61

Conclusions 64

Page
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
14
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Recommendations 66

REFERENCES 68

APPENDICES

A SURVEY QUESTIONNAIRE 72

B LETTER OF INTENT 79

C PROPOSED PUBLIC INFORMATION DRIVE 83

CURRICULUM VITAE 85
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
15
CAVITE CAMPUS
General Mariano Alvarez, Cavite
LIST OF TABLES

Page

Table

1 The Distribution of Respondents 29

2 The Frequency and Percentage Distribution


of Respondents as to Age 35

3 The Frequency and Percentage Distribution


of Respondents as to Sex 36

4 The Frequency and Percentage Distribution


of Respondents as to Position/Rank 37

5 The Frequency and Percentage Distribution


of Respondents as to Family Income (Monthly) 38

6 The Frequency and Percentage Distribution


of Respondents as to Length of Service 39

7 The Frequency and Percentage Distribution


of Respondents as to Online Transaction
Used in Payment 40

8 The Frequency and Percentage Distribution


of Respondents as to Online Transaction
Used in Purchase 41

9 The Frequency and Percentage Distribution


of Respondents as to Online Transaction
Used in Cash Transfer 42

10 The Types of Cyber Phishing Encountered


by the Respondents as to Spear Phishing 43

Page
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
16
CAVITE CAMPUS
General Mariano Alvarez, Cavite
11 The Types of Cyber Phishing Encountered
by the Respondents as to Whaling Phishing 45

12 The Types of Cyber Phishing Encountered


by the Respondents as to Smishing Phishing 47

13 The Types of Cyber Phishing Encountered


by the Respondents as to Vishing Phishing 49

14 The Action Taken by the Victims in Terms


of Legal Actions 50

15 The Action Taken by the Victims in Terms


of Personal Actions 52

16 Significant Relationships between Age and


Types of Cyber Phishing 53

17 Significant Relationships between Sex and


Types of Cyber Phishing 54

18 Significant Relationships between Position


or Rank and Types of Cyber Phishing 56

19 Significant Relationships between Family


Income and Types of Cyber Phishing 57

20 Significant Relationships between Length


of Service and Types of Cyber Phishing 58

CHAPTER 1
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
17
CAVITE CAMPUS
General Mariano Alvarez, Cavite
The Problem and Its Background

Introduction

People in this generation are aware of the benefits of

using the internet for numerous activities such as internet

surfing, online shopping, and taking online classes, among

others. A fatal virus known as Corona Virus or COVID-19

began in Wuhan, China, and quickly spread throughout the

world, causing a pandemic. To stop the virus from spreading,

countries all around the world began imposing community

quarantines. Since March 15, 2020, the Philippine national

and local governments have imposed community quarantines to

prevent the virus from spreading further. Face-to-face

learning is forbidden, and all schools and institutions have

been closed. However, the government recognizes that

students must be able to continue studying despite the

pandemic, which is why the Department of Education, in

particular, has devised a "blended-learning" program that

combines modular, radio and

television, and electronic or online learning. The

Commission on Higher Education (CHED) refers to it as


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
18
CAVITE CAMPUS
General Mariano Alvarez, Cavite
"flexible learning," which includes online or e-learning,

which many Philippine schools and universities have used in

the past. This is consistent with President Rodrigo

Duterte’s stated policy of no face-to-face classes until an

anti-COVID vaccination is discovered. This conduct exposes

people, particularly students, to cyber phishing. Phishing

is the technique of sending phony emails that appear to come

from a trusted source. Email is the most commonly used

method of communication. The purpose is to steal sensitive

information such as credit card and login information or to

infect the victim's computer with malware.

People who frequently browse the internet are possibly

the victims of cybercriminals. They may be manipulated by

the criminals to provide their personal information. Simply

by clicking on harmful links or attachments and accidentally

downloading malware to their personal computer, it is

possible to lead to the taking and spreading of personal

information. As the number of people using the internet

grows cyber-criminals may be taking advantage of this

situation.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
19
CAVITE CAMPUS
General Mariano Alvarez, Cavite

This study is focused on determining the level of

victimization of teachers and employees of educational

institutions by cyber phishing. This study has also analyzed

the level of awareness of teachers and educators about cyber

phishing and its effects.

Theoretical Framework

According to this theory, Moral Disengagement and

Social Learning Theories are the most popular theories used

to explain what attracts cybercriminals to commit their

criminal activities (Rogers, 2006). That supports the

conformity to existing norms.

Routine activity theory, by Cohen and Felson (1979),

emphasizes that crime occurs when three elements converge:

(1) a motivated offender, (2) a suitable target, and (3)

the absence of a capable guardian. This theory includes

the routine activities of both the offender and victim.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
20
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Conceptual Framework

The conceptual framework uses the graph input, process,

and output. The researchers aim to determine if there is a

significant relationship between the demographic and

professional profile of respondents to types of cyber

phishing.
INPUT PROCESS OUTPUT
 Demographic and
professional profile
of the respondents
Age;
Data gathering
Sex;
Position or Rank; Internet
Family Income; and searches
Length of Service
 Means used by the
respondents in online Conduct of
transaction survey
Payment;
Purchase; Proposed
Cash Transfer Tabulation Public
 Types of cyber of data Information
phishing encountered
by the respondents
Statistical Drive
Spear Phishing;
Whaling Phishing; treatment of
Smishing Phishing; data
Vishing Phishing
 Actions taken by the
victims
Legal Action;
Personal Action
 Is there a
significant
relationship between
a demographic profile
and the types of
cyber phishing?

Figure 1. Conceptual framework


ofFeedback
the study
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
21
CAVITE CAMPUS
General Mariano Alvarez, Cavite
A conceptual framework illustrates what you expect to

find through your research. It defines the relevant

variables you have and maps out how they may relate to each

other. The input, method, and outcome of the research

investigation are all included in this research paradigm.

The first graphic depicts the input, which consists of the

study's variables. The process is depicted in the second

diagram, which shows how the researchers obtained data and

information. The output depicts the intervention program

that would serve as the study's outcome.

Statement of the Problem

The study aims to assess the cyber phishing among

teachers and employees of educational institutions in

CarSiGma. Specifically, it aims to provide answers for the

following questions:

1. What are the demographic and professional profile of the

respondents in terms of:

1.1 Age;

1.2 Sex;

1.3 Position or Rank;


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
22
CAVITE CAMPUS
General Mariano Alvarez, Cavite
1.4 Family Income; and

1.5 Length of Service?

2. What are the means used by the respondents in online

transactions so as to:

2.1 Payment;

2.2 Purchase;

2.3 Cash Transfer?

3. What are the types of cyber phishing encountered by the

respondents as to:

3.1 Spear Phishing;

3.2 Whaling Phishing;

3.3 Smishing Phishing; and

3.4 Vishing Phishing?

4. What are the actions taken by the victims in terms of:

4.1 Legal Actions; and

4.2 Personal Action?

5. Is there a significant relationship between

demographic/professional profiles and types of cyber


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
23
CAVITE CAMPUS
General Mariano Alvarez, Cavite
phishing?

6. Based on the findings, what public information drive can

be proposed and implemented?

Hypothesis

There is no significant relationship between the types

of cyber phishing and the demographic and professional

profiles of respondents.

Scope and Limitation of the Study

The study is focused on how cyber phishing attacks

usually involve teachers and employees when the crime was

committed. The study is also focused on evaluating the

knowledge of teachers and employees about cyber phishing.

The researchers conducted the research, particularly in

the CarSiGma and the respondents were teachers and employees

at any school or university. The researchers chose a total

of 214 teachers and employees who were victims of cyber

phishing.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
24
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Significance of the Study

The study aims to determine if there is a significant

relationship between the demographic and professional

profile of respondents to types of phishing and to be able

to propose public information drives regarding cyber

phishing to the teachers and employees in CarSiGma.

Student This study is beneficial for the students

because it will help them to discover the need to improve

for the students to be more prepared and ready when it comes

to cyber phishing. This study will provide knowledge to

understand cyber phishing and will serve as awareness to

avoid cyber-attacks.

Internet User This research is beneficial to all the

internet users who use the internet more often for their own

reasons because this research will give them a heads-up on

the risk of being a victim of cyber phishing that concerns

their safety and privacy. Moreover, they will be able to

understand the importance of preparedness when it comes to

cyber phishing. This study will enable them to be aware of

what they should do when they encounter it.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
25
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Law enforcer/PNP Cybercrime Division The data could be

used as a reference in cyber phishing, providing awareness,

overview, and its variants, which range from parents to

students, especially college students. It also provides ways

to prevent cyber phishing and aids the efforts of law

enforcers.

Law Makers The data present could be used to develop

regulations about cyber phishing that will assist students,

particularly those in college universities, as well as law

enforcement officers, to prevent cyber phishing.

Local Government The data can be used as a resource for

preventing cyber phishing. It contains information and ideas

that will assist local government students, particularly

those in college, in preventing cyber phishing.

Parents of Students The data has provided information

that may be used as a guide for safer internet or social

media browsing, as well as tools, software, and accounts

that can help prevent cyber phishing.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
26
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Criminology Students As for future law enforcement

officers, the data has provided information to enhance

awareness about cyber phishing among college students, as

well as law enforcement efforts to prevent it. It will also

provide ideas for a new way to combat this type of cyber

phishing.

Future Researcher The data can be used in future

research on cyber phishing. It provides information such as

awareness, overview and variants, law enforcement efforts,

and methods to prevent cyber phishing.

Definition of Terms

The following terms are defined operationally and

lexically to provide a common frame of reference.

Awareness The quality or state of being aware:

knowledge and understanding that something is happening or

exists promoting a heightened awareness of the problem

seemed to have only a slight awareness of what was going on

and an acute awareness of subtle differences. They hope to

raise awareness of endangered species, encouraging.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
27
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Cybercrime A criminal activity that either targets or

uses a computer, a computer network, or a networked device.

Data Connection Used when you are analyzing massive

amounts of data and you need to keep the underlying data in

the database (in-db.) rather than bringing it into

Spotfire’s internal data engine.

Duration of using Smart Phone or Laptop Using a

smartphone or laptop, a person spends a set amount of time

pursuing social media, websites, apps, software, or

accounts.

Duration of using Social Media A specific time of

browsing or using social media websites, apps, software, and

accounts.

Email Electronic mail is a method of exchanging

messages between people using electronic devices.

Hacker One that hacks, a person who is inexperienced or

unskilled at a particular activity a tennis hacker, an

expert at programming and solving problems with a computer,

and a person who illegally gains access to and sometimes

tampers with information in a computer system.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
28
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Internet An electronic communications network that

connects computer networks and organizational computer

facilities around the world is used with the exception of

when being used attributively.

Internet User Individuals or Organizations who use the

internet in any location through computer terminals,

computers, and other devices to access services such as

email and the World Wide Web.

Level of Awareness A person's quality of being aware of

something, especially for crimes such as cyber phishing.

Level of Victimization The rate of being victimized by

a crime like cyber phishing.

Link A connection between two people, things, or ideas:

There's a direct link between diet and heart disease. Their

links with Mexico are still strong diplomatic links between

the two countries.

Mobile Cellular Phone A mobile telephone is a type of

short-wave analog or digital telecommunication in which a


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
29
CAVITE CAMPUS
General Mariano Alvarez, Cavite
subscriber has a wireless connection from a mobile phone to

a relatively nearby transmitter.

Personal Computer A multi-purpose computer whose size,

capabilities, and price make it feasible for individual use.

Personal computers are intended to be operated directly by

an end-user rather than by a computer expert or technician.

Philippine National Police Anti Cybercrime Group

Investigates all cybercrimes and other crimes in which

Information and Communications Technology (ICT) is used in

the commission of criminal acts or as the object of attack.

Phishing The fraudulent practice of sending emails

purporting to be from reputable companies to induce

individuals to reveal personal information, such as

passwords and credit card numbers.

Smishing Phishing This is a form of phishing that uses

mobile phones as the attack platform. The criminal executes

the attack with the intent to gather personal information,

including social insurance and/or credit card numbers.

Smishing is implemented through text messages or SMS.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
30
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Spear Phishing Spear phishing is an email or electronic

communications scam targeted toward a specific individual,

organization, or business. This is how it works: An email

arrives, apparently from a trustworthy source, but instead,

it leads the unknowing recipient to a bogus website full of

malware.

Vishing Phishing Short for "voice phishing," which

involves defrauding people over the phone, enticing them to

divulge sensitive information

Website A set of related web pages located under a

single domain name, typically produced by a single person or

organization.

Whaling Phishing Whaling is a highly targeted phishing

attack aimed at senior executives masquerading as a

legitimate email. Whaling is digitally enabled fraud through

social engineering, designed to encourage victims to perform

a secondary action, such as initiating a wire transfer of

funds.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
31
CAVITE CAMPUS
General Mariano Alvarez, Cavite

World Wide Web Commonly referred to as WWW, W3, or the

Web—is an interconnected system of public webpages

accessible through the internet. The Web is not the same as

the Internet: the Web is one of many applications built on

top of the internet.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
32
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CHAPTER 2

Review of Related Literature and Studies

This chapter will provide and discuss appropriate

related literature and studies, both foreign and local that,

will help the current study.

Local Literature

According to Devanesan (2020), in the Philippines, the

pandemic has brought out the worst in some opportunists,

and in the virtual realm, it appears phishing attacks are

the cyber weapon of choice. The Philippines has been trying

to enforce legislation on engineered phishing scams for

years now, but with so many Filipinos online all the time

during the pandemic, the National Bureau of Investigation’s

Cybercrime Division recorded a 200% increase since the

lockdown started back in March.

According to Omorog and Medina (2017), Filipinos are

susceptible to cyber-attacks, particularly to phishing and

malware attacks. Also, the majority of the respondents’

internet security perception is derivative: they practice

online security measures but with a limited understanding of


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
33
CAVITE CAMPUS
General Mariano Alvarez, Cavite
the purpose. Therefore, proper education, through training

and awareness, is an effective approach to remedy the

situation.

Macairan (2020) online sexual exploitation of children

or OSEC is no longer the number one cybercrime violation

committed in the country during the coronavirus disease 2019

(COVID-19) pandemic. Based on information gathered by the

Department of Justice-office of Cybercrime (DOJ-OCC) from

March to June, OSEC has been dislodged by other cybercrime

offenses, notably phishing, online selling scams and

proliferation of information or fake news. “As of the latest

count, there are now more in absolute numbers the cases of

phishing, online (selling) scams and fake news under the

Bayanihan Law compared to OSEC.”

Fontilla (2020) stated that with the rise of the

reported cases of COVID-19 and home quarantine being

implemented, the Internet became a channel for effective

human interaction. Doing most of the work online brought an

increasing number of online fraudsters to exploit the

public’s fear of the pandemic to attack people through

cybercrime. It has a list of some of the cyber security


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
34
CAVITE CAMPUS
General Mariano Alvarez, Cavite
issues that are being faced at this time. Furthermore, it

discusses the forms of attacks being encountered and lists

recommendations on how to be safe online.

Rotas and Cahapay (2021) stated that a preliminary

study with the aim of testing if threat knowledge influences

protective behaviors of students in the context of cyber

security in remote learning amid the COVID-19 crisis.

Modified questionnaires were used in online surveys with a

sample of students from a teacher education department of a

Philippine university. The results revealed that the

students are somewhat knowledgeable about the possible

threats and they sometimes practice protective behaviors in

remote learning. This indicates a practical need to heighten

the cyber security of the students.

Foreign Literature

According to Abdelhamid (2020), phishing is a

cybercrime in which the attackers usually impersonate a

trusted source. The attackers usually send an email that

contains a link that allows them to steal the receiver’s


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
35
CAVITE CAMPUS
General Mariano Alvarez, Cavite
personal information. According to the Federal Bureau of

Investigation’s 2019

Internet crime report, phishing is the number one cybercrime

by victim count.

Akdemir et al. (2021) mentioned that phishing emails

purporting to provide information about the spread of the

disease were the most common type of unsolicited email.

Authority, liking, and commitment emerged as the most common

influence methods. Fear appeals and urgency cues were

present in almost all of the sampled phishing messages.

Finally, the analysis of coronavirus themed phishing emails

revealed a shift in the modus operandi of phishers.

Korkmaz et al. (2021) stated that recently, cyber-

attacks have increased worldwide, especially during the

pandemic period. The number of connected devices in the

world and the anonymous structure of the internet enable

this security deficit for not only computer networks but

also single computing devices. With the connected use of

computer devices in anytime and anywhere conditions, lots of

real-world activities are transferred to the digital world

by adapting them to new lifestyles. Thus, the concept of


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
36
CAVITE CAMPUS
General Mariano Alvarez, Cavite
cyber security has become more focused not only for security

admins but also for academicians and researchers. Phishing

attacks, which hackers mostly preferred to use in the last

decade, have become even more harmful because they focus on

the weakest part of the security chain: the computer user.

Therefore, it is extremely important to prevent these cyber-

attacks before they reach users.

According to Stock J. (2020), one of INTERPOL’s private

sector partners, 907,000 spam messages, 737 incidents

related to malware and 48,000 malicious URLs — all related

to COVID-19 were detected between January and April 24,

2020. Concurrently, due to the sudden and necessary global

shift to teleworking, organizations have had to rapidly

deploy remote systems, networks, and applications. As a

result, criminals are taking advantage of the increased

security vulnerabilities arising from remote work to steal

data, generate profits, and cause disruption. In light of

these events, INTERPOL’s Cybercrime Directorate produced

this Global Assessment. The report on COVID-19 related

cybercrime is based on its unique access to data from 194

member countries and private partners to provide a


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
37
CAVITE CAMPUS
General Mariano Alvarez, Cavite
comprehensive overview of the cybercrime landscape amid the

pandemic. The report is based on data collected from member

countries and INTERPOL private partners as part of the

INTERPOL Global Cybercrime Survey conducted from April to

May 2020. In total, 48 out of 194 member countries responded

to the survey, and 4 out of 13 private partners contributed

their data to the report. By deploying COVID-19 themed

phishing emails, often impersonating government and health

authorities, cyber criminals entice victims into providing

their personal data and downloading malicious content.

Online Fraud and Phishing is around two-thirds of member

countries who responded to the survey reported a significant

use of COVID-19 themes for phishing and online fraud since

the outbreak.

Local Studies

According to Statista Research Department (2021) in

2019, the number of phishing cybercrime incidents in the

Philippines was highest for those within the National

Capital region, amounting to approximately 58.2 thousand

victims. Phishing cyber-attacks also occur more.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
38
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Señora, F. (2020) mentioned that during the COVID-19

Pandemic,” National Bureau of Investigation NBI-Cyber Crimes

Division (NBI-CCD) reports of phishing cases to the agency

have increased by more than 200%. The NBI-CCD only had

around 30 phishing cases before the COVID-19 outbreak, but 3

weeks into the pandemic, they had an additional 70 cases. He

explained that people’s being on their computers during the

quarantine period has become an “opportunity for attack.”

Phishing and online selling scams are punishable under

Republic Act No. 10175 or the Cybercrime Prevention Act of

2012. Online misinformation is penalized by RA 11469 or the

Bayanihan to Heal as One Act.

According to Malasig, J. (2020), phishing pertains to

cybercrime in which a victim is contacted through e-mail,

telephone or text message by someone who is posing as a

legitimate institution to trick them into sharing sensitive

data such as credit card details and account passwords.

Guevarra (2020) mentioned that “It is expected that

during these pandemic times, where direct personal

interactions are reduced, more crimes will be committed in

cyberspace. It is therefore imperative that law enforcement


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
39
CAVITE CAMPUS
General Mariano Alvarez, Cavite
agencies beef up their cybercrime units, upgrade their

technologies and enhance their investigative capabilities.”

Foreign Studies

According to "Analysis of Student Vulnerabilities to

Phishing", Bailey et al. (2018) findings revealed that while

students are unlikely to provide personal information in

response to an email request, they can be easily tricked by

numerous other tactics. This paper reports the findings of

the study in addition to listing suggested points to include

in classroom discussions on phishing. Education is the most

powerful tool available for combating the growing phishing

security threat and student vulnerability. Phishing attacks

were responsible for $3.2 billion dollars in losses during

2007 and the number of attacks is increasing daily.

According to the United States Computer Emergency Readiness

Team, phishing was the top security threat during the first

quarter of 2007, comprising 48% of all reported incidents.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
40
CAVITE CAMPUS
General Mariano Alvarez, Cavite
The purpose of this study was to identify the level of

student awareness related to specific phishing tactics.

According to Senthilkumar et al. (2017), the aim of the

study is to analyze the awareness of cyber security among

college students in Tamil Nadu by focusing on various

security threats on the internet. In recent years,

cybercrime has become an enormous challenge in all areas,

including national security, public safety, and personal

privacy. To prevent becoming a victim of cybercrime,

everyone must know about their own security and safety

measures to protect themselves. A well-structured

questionnaire survey method will be applied to analyze the

college students’ awareness in the area of cyber security.

This survey will be conducted in major cities of Tamil Nadu

by focusing on various security threats like email, viruses,

phishing, fake advertisements, pop-up windows, and other

attacks on the internet. This survey examines the college

student’s awareness and level of awareness about security

issues, and some suggestions are set forth to overcome these

issues.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
41
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Alejandra Diaz et al. (2019) delivered phishing attacks

to 450 randomly selected students on three different days

(1,350 students total) to examine user click rates and

demographics among UMBC’s undergraduates. Participants were

initially unaware of the study. We deployed the billing

problem, contest winner, and expiration date phishing

tactics. Experiment 1 impersonated banking authorities;

Experiment 2 enticed users with monetary rewards; and

Experiment 3 threatened users with account cancellation. We

found correlations resulting in lowered susceptibility based

on college affiliation, academic year progression, cyber

training, involvement in cyber clubs or cyber scholarship

programs, time spent on the computer, and age demographics.

We found no significant correlation between gender and

susceptibility. Contrary to our expectations, we observed a

reverse correlation between phishing awareness and student

resistance to clicking. Students who identified themselves

as understanding the definition of phishing had a higher

susceptibility rate than did their peers who were merely

aware of phishing attacks, with both groups having a higher

susceptibility rate than those with no knowledge whatsoever.

Approximately 70% of survey respondents who opened a


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
42
CAVITE CAMPUS
General Mariano Alvarez, Cavite
phishing email clicked on it, with 60% of student having

clicked overall.

According to Lallie (2021), cyber-attacks are analyzed

and considered within the context of key global events to

reveal the modus operandi of cyber-attack campaigns. The

analysis shows how, following what appeared to be large gaps

between the initial outbreak of the pandemic in China and

the first COVID-19 related cyber-attack, attacks steadily

became much more prevalent to the point that on some days,

three or four unique cyber-attacks were being reported. The

analysis proceeds to utilize the UK as a case study to

demonstrate how cyber criminals leveraged salient events and

governmental announcements to carefully craft and execute

cybercrime campaigns.

According to Bernardi Pranggono et al. (2020), during

the pandemic, cyber criminals and Advanced Persistent Threat

(APT) groups have taken advantage of targeting vulnerable

people and systems. This paper emphasizes that there is a

correlation between the pandemic and the increase in cyber-

attacks targeting sectors that are vulnerable. In addition,


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
43
CAVITE CAMPUS
General Mariano Alvarez, Cavite
the growth in anxiety and fear due to the pandemic is

increasing the success rate of cyber-attacks.

Synthesis

The review of literature and studies gives light to

this research endeavor. The work of Akdemir et al. (2021),

Korkmaz et al. (2021), Stock (2020), Devanesan (2020),

Omorog and Medina (2020), Fontilla (2020), and Abdelhamid

(2020), gave the researchers ideas and information for the

conduct of the study. While the study of Statista Research

Department (2021), Elsevier (2021), Señora, F. (2020),

Guevarra (2020), Bernardi Pranggono et al. (2020). There was

a similarity in the concept and variables that the

researchers have taken into account. The studies and

literature above mentioned have similar objectives to the

current study. And the connection between the related

literature and studies to the present study is that since

the pandemic, cyber-attacks, particularly cyber phishing,

have occurred more often, especially on teachers and

employees.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
44
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CHAPTER 3

Methodology

This chapter will present the research design,

population and sampling of the study, research

instrumentation, data-gathering procedure, and statistical

treatment of data that will be used in the study.

Research Design

This study has utilized a descriptive research method

to determine if there is a significant relationship between

the demographic and professional profile of respondents in


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
45
CAVITE CAMPUS
General Mariano Alvarez, Cavite
types of cyber phishing to the teachers and employees in

CarSiGma. This research aims to describe the nature of the

situation as it exists at the time of the study and to

explore the causes of a particular phenomenon. This type of

research allows for a variety of methods to recruit

participants, collect data, and utilize various methods of

instrumentation to be able to determine the means used by

the respondents in online transaction; the types of cyber

phishing encountered by the respondents, the actions taken

by the victims; and significant relationships between

demographic and professional profiles in types of cyber

phishing.

Population and Sampling

This study has employed the convenience sampling

technique, a type of non-probability sampling that involves

the sample being drawn from the part of the population that

is close to hand. The researcher would use it because it is

convenient for our respondents. This research would intend

to figure out if there is a significant relationship between

the demographic and professional profile of respondents and

types of cyber phishing in the CarSiGma.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
46
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Table 1
The Distribution of Respondents

Educational Population Sample Percentage


Institution
STI Carmona
Campus 63 54 85.71
Cavite State
University Silang
Campus 134 54 40.3
University of
Perpetual Help
System G.M.A. 250 53 21.2
EARIST Cavite
Campus 89 53 59.6
TOTAL 214
It can be gleaned from this table that there are 54

respondents from STI Carmona Campus and in Cavite State

University Silang Campus. There were 53 respondents from

University of Perpetual Help System, GMA Campus, and EARIST

Cavite Campus. It also shows that there were 214

respondents in total.

Respondents of the Study

This study is composed of teachers and employees who

are willing and available to be respondents.

The selected respondents are teachers and employees

of CarSiGma from EARIST Cavite Campus, University of


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
47
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Perpetual Help G.M.A Cavite, STI Carmona, and the Cavite

State University of Silang who are victims of cyber

phishing. There are a large number of teachers and

employees living in CarSiGma. They are chosen since they

are teaching in online classes which are vulnerable to

cyber-attacks.

Research Instrument

The main tool in this study is that the researchers

made a survey questionnaire via Google Forms and it will be

approved by their adviser. The survey questionnaire is

composed of four parts. First, the demographic and

professional profiles of the respondents will be gathered as

to their optional name, age, sex, position or rank, family

income, and length of service. Second is the set of

questions regarding the means used by the respondents in

online transactions as to payment, purchase, and cash

transfer. The third part is the types of cyber phishing

encountered by the respondents, such as: spear phishing,

whaling phishing, smishing phishing, and vishing phishing.

And last part is the actions taken by the victims in terms

of legal action and personal action.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
48
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Data Gathering Procedures

In gathering the data, the researchers have made a

survey questionnaire via Google form. The survey

questionnaire was approved by their thesis adviser. The

researchers make the survey questionnaire and approach the

head of educational institutions to ask for permission to

have an online survey. After approval, the researchers

decided to distribute the questionnaires through a direct

message in Messenger and posted a link to the questionnaire

on various social media networks. The respondents may answer

the questionnaire for 24 hours after sending the link. For

recommendation and evaluation, the survey questionnaire

would be analyzed and tabulated for 7 to 10 days.

Statistical Treatment of Data

To answer sub-problem no. 1, the researchers will use

frequency, percentage, and rank to interpret the demographic

and professional profile of the respondents.

Frequency The number of occurrences of a repeating

event per unit of time.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
49
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Percentage Used to determine the profile of the

respondents and the response to each question provided in

the survey questionnaire.

The Formula of percentage is where:

P=f/n x 100

P=percentage

n=total number of respondents f=frequency

To answer sub-problem nos. 2,3, and 4, which are the

means used by respondents, the types of cyber phishing

encountered by the respondents, and the actions taken by the

respondents. To interpret the assessment of this study the

weighted mean, chi-square and rank will be used and

utilized.

Weighted mean The most common type of average, where

each data point contributes more than the others. The

researchers used this formula to get the average mean of the

respondent’s answers to problems no. 3 and 4, which are the

types of cyber phishing encountered by the respondents as to

spear, whaling, smishing and vishing phishing and the


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
50
CAVITE CAMPUS
General Mariano Alvarez, Cavite
actions taken by the victims in terms of legal and personal

actions.

Weighted Mean Formula:

where:

v is the repeating value

w is the number of occurrences of x (weight)

x̄ is the weighted mean

Rank It is used to show the chronological sequence of

the findings of a study.

To answer sub-problem no.1, demographic and

professional profiles of respondents.

Chi-square This is a test of the difference between the

observed frequencies and expected frequencies. It is used to

determine the types of cyber phishing encountered by the

respondents, which is problem no. 4 of this study.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
51
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Formula for Chi-square:
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
52
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CHAPTER 4

Presentation, Analysis, and

Interpretation of Data

Sub-problem No. 1. What are the demographic and

professional profiles of the respondents in terms of:

1.1 Age

Table 2

Age Frequency Percent Rank


18-23 years old 3 1.4 7
24-29 years old 30 14.0 4
30-35 years old 78 36.4 1
36-41 years old 50 23.4 2
42-47 years old 36 16.8 3
48-53 years old 11 5.1 5
54-59 years old 5 2.3 6
60 and above 1 0.5 8
Total 214 100.0
The Frequency and Percentage Distribution of Respondents as
to Age

Table 2 shows that most of the respondents are 30 to 35

years old with a total of 78 respondents which equals 36.4

percent. Rank number 2 is respondents from ages 36 to 41

years old with a total of 50 respondents which equals 23.4

percent. The least number of respondents are from the age


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
53
CAVITE CAMPUS
General Mariano Alvarez, Cavite
group of 60 and above with a total of 1 respondent which

equals 0.5 percent.

1.2 Sex

Table 3
The Frequency and Percentage Distribution of Respondents as
to Sex
Sex Frequency Percent Rank
Male 101 47.2 2
Female 113 52.8 1
Total 214 100.0

Table 3 shows that most of the respondents are female

with a total of 113 respondents which equals 52.8 percent.

Followed by male respondents with a total of 101

respondents which equals 47.2 percent.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
54
CAVITE CAMPUS
General Mariano Alvarez, Cavite
1.3 Position or Rank

Table 4
The Frequency and Percentage Distribution of Respondents as
to Position/Rank

Position/Rank Frequency Percent Rank


Instructor 1 43 20.1 2
Instructor 2 27 12.6 4
Instructor 3 33 15.4 3
Assistant Professor 1 10 4.7 6
Assistant Professor 2 49 22.9 1
Assistant Professor 3 16 7.5 5
Assistant Professor 4 7 3.3 9
Associate Professor 1 8 3.7 7.5
Associate Professor 2 3 1.4 11.5
Associate Professor 3 5 2.3 10
Associate Professor 4 3 1.4 11.5
Associate Professor 5 2 0.9 13
Others 8 3.7 7.5
Total 214 100.0

It is shown in table number 4 that most of the

respondents are working as assistant professor 2 with a

total of 49 respondents which equals 22.9 percent. Rank

number 2 are respondents working as instructor 1 with a

total of 43 respondents which equals 20.1 percent and the


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
55
CAVITE CAMPUS
General Mariano Alvarez, Cavite
least respondents are working as associate professor 5 with

a total of 2 respondents which equals 0.9 percent.

1.4 Family Income

Table 5
The Frequency and Percentage Distribution of Respondents as
to Family Income (Monthly)
Monthly Family Income Frequency Percent Rank
Below 10,000 1 0.5 6
10,000 to 15,000 30 14.0 5
15,000 to 20,000 64 29.9 1
20,000 to 25,000 36 16.8 3.5
25,000 to 30,00 47 22.0 2
Above 30,000 36 16.8 3.5
Total 214 100.0

Table 5 shows that the highest number of the

respondents have a monthly family income of 15,000 to

20,000 with a total of 64 respondents which equals 29.9

percent followed by 25,000 to 30,000 family income with a

total of 47 respondents which equals 22.0 percent. And the

least number of respondents have a monthly family income

below 10,000 with a total of 1 respondent which equals 0.5

percent.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
56
CAVITE CAMPUS
General Mariano Alvarez, Cavite

1.5 Length of Service

Table 6
The Frequency and Percentage Distribution of Respondents as
to Length of Service
Length of Service Frequency Percent Rank
Less than 1 year 10 4.7 5
1-3 years 36 16.8 3
4-6 years 111 51.9 1
7-10 years 40 18.7 2
more than 10 years 17 7.9 4
Total 214 100.0

As shown in table 6, most of the respondents’ length

of service is 4 to 6 years, with a total of 111 respondents

which equals 51.9 percent, followed by 7 to 10 years, with

40 respondents which equals 18.7 percent, and the least

respondents’ length of service is less than 1 year, with 10

respondents which equals 4.7 percent.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
57
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Sub-problem No. 2. What are the means used by the

respondents in online transaction as to:

2.1 Payment

Table 7
The Frequency and Percentage Distribution of Respondents as
to Online Transaction Used in Payment
Means of Payment Frequency Percent Rank
Gcash 42 11.4 4
PayMaya 28 7.6 7.5
Google Pay bills 22 5.9 9
Online bank
28 7.6 7.5
transaction
Smart money 34 9.2 6
Dragon pay 35 9.5 5
Wee pay 20 5.4 10
PayPal 49 13.2 2
7/11 Connect 61 16.5 1
Coins.ph (bitcoin) 51 13.8 3
Total 370 100.0

Table 7 shows that the majority of respondents use

7/11 connect as a means for payment in an online

transaction with a total of 16.5 percent, followed by


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
58
CAVITE CAMPUS
General Mariano Alvarez, Cavite
PayPal with 13.2 percent, and the least used online

transaction as to payment is Wee Pay with 5.4 percent.

2.2 Purchase

Table 8
The Frequency and Percentage Distribution of Respondents as
to Online Transaction Used in Purchase
Means of Purchase Frequency Percent Rank
Gcash 33 9.3 6.5
PayMaya 50 14.1 1.5
Google Pay bills 47 13.3 3
Online bank
50 14.1 1.5
transaction
Smart money 33 9.3 6.5
Dragon pay 37 10.5 4
Wee pay 34 9.6 5
PayPal 23 6.5 9
7/11 Connect 26 7.3 8
Coins.ph (bitcoin) 21 5.9 10
Total 354 100.0

Table 8 shows that PayMaya and online bank transactions

are the most used means in online transactions as for

purchase with a total of 14.1 percent, followed by Google


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
59
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Pay bills with 13.3 percent, and the least used online

transaction for purchase is Bitcoin with 5.9 percent.

2.3 Cash Transfer

Table 9
The Frequency and Percentage Distribution of Respondents as
to Online Transaction Used in Cash Transfer
Means of Cash Transfer Frequency Percent Rank
Gcash 86 24.0 1.5
Paymaya 60 16.7 2
Google Pay bills 8 2.2 9.5
Online bank
86 24.0 1.5
transaction
Smart money 52 14.5 4
Dragon pay 10 2.8 8
Wee pay 21 5.8 5
PayPal 13 3.6 7
7/11 Connect 15 4.2 6
Coins.ph (bitcoin) 8 2.2 9.5
Total 359 100.0

As shown in Table 9 Gcash and online bank transactions

are the most commonly used means of online transactions in

cash transfers. A total of 172 respondents answered which

is equivalent to 24.0 percent, followed by Pay Maya with

16.7 percent. 16 respondents answered Google Pay and


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
60
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Bitcoin, which is equivalent to 2.2 percent making this the

least used online transaction in terms of cash transfer.

Sub-problem No.3. What are the types of cyber phishing

encountered by the respondents as to:

3.1 Spear Phishing

Table 10
The Types of Cyber Phishing Encountered by the Respondents as
to Spear Phishing
Spear Phishing Weighted VI Rank
Mean

I have received a malicious email,


apparently from an untrustworthy source. 2.83 S 4

I have received an email that persuades


me to click the link provided in the
malicious email. 3.32 S 3

I have received an email that encourages


me to log-in to my bank account on a
specific website. 3.42 S 1

I received a spam email that instructed


me to give my personal information
needed for verification. 3.36 S 2

I was deceived into giving information


to a malicious email, which apparently
coming from a suspicious source. 2.81 S 5

Weighted Average Mean 3.15 S


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
61
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Legend: 4.50-5.0=(A) Always, 3.50-4.49=(O) Often, 2.50-
3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 =(N)Never

Table 10 shows that the assessment of types of cyber

phishing encountered by the respondents as to spear

phishing is as follows: I have received an email that

encourages me to log-in to my bank account on a specific

website with the weighted mean of 3.42 with the verbal

interpretation of “sometimes”, I received a spam email

that instructed me to give my personal information needed

for verification with the weighted mean of 3.36 with the

verbal interpretation of “sometimes”, I have received an

email that persuades me to click the link provided in the

malicious email with the weighted mean 3.32 with the verbal

interpretation of “sometimes”, I have received a malicious

email, apparently from an untrustworthy source with the

weighted mean 2.83 with the verbal interpretation of

“sometimes”. Lastly, I was deceived into giving information

to a malicious email, which apparently coming from a

suspicious source with a weighted mean of 2.81 with the

verbal interpretation of “sometimes”. The general weighted

average mean is 3.15 with a verbal interpretation of

“Sometimes”.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
62
CAVITE CAMPUS
General Mariano Alvarez, Cavite

3.2 Whaling Phishing

Table 11
The Types of Cyber Phishing Encountered by the Respondents as
to Whaling Phishing
Whaling Phishing Weighted VI Rank
Mean

My institution was targeted by whale


phishing specifically that the
administration staff received a 3.23 S 4
malicious email.

I have been encouraged to take


secondary actions such as initiating a
wire transfer fund. 3.17 S 5

The senior executives at my institution


have received an email apparently
masquerading as a legitimate email. 3.57 O 1

My institution’s system has been


infected by malware due to an email
apparently a whaling phishing attack. 3.54 O 1

The finance office of my institution


was attacked by whale phishing through
malicious emails masquerading as
legitimate emails. 3.42 S 3
Weighted Average Mean 3.39 S
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
63
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-
3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never
Table 11 shows that the assessment of types of cyber

phishing encountered by the respondents as to whaling

phishing is as follows: The senior executives at my

institution have received an email apparently masquerading

as a legitimate email with a weighted mean of 3.57 with the

verbal interpretation of “often”, and My institution’s

system has been infected by malware due to an email

apparently a whaling phishing attack with a weighted mean

3.54 with the verbal interpretation of “often”, The finance

office of my institution was attacked by whale phishing

through malicious emails masquerading as legitimate emails

with the weighted mean of 3.42 with the verbal

interpretation of “sometimes”, My institution was targeted

by whale phishing specifically that the administration

staff received a malicious email with the weighted mean of

3.23 with the verbal interpretation of “sometimes”. Lastly,

I have been encouraged to take secondary actions such as

initiating a wire transfer fund with a weighted mean of

3.17 with the verbal interpretation of “sometimes”. Whaling


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
64
CAVITE CAMPUS
General Mariano Alvarez, Cavite
phishing got a general weighted average mean of 3.39 which

is interpreted as “Sometimes”.

3.3 Smishing Phishing

Table 12
The Types of Cyber Phishing Encountered by the Respondents as
to Smishing Phishing
Smishing Phishing Weighted VI Rank
Mean

I received suspicious text messages


from an unknown number. 3.76 O 4

I received a text message instructing


me to give my personal information,
which was said to be used for 3.78 O 3
security matters.

I received a text message that I


needed to give my bank account
password to claim a prize for a raffle 3.85 O 2
promo.

I have seen news articles about


victims who received suspicious text
messages from an unknown number and
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
65
CAVITE CAMPUS
General Mariano Alvarez, Cavite
were deceived into giving sensitive
information.
3.93 O 1

I was deceived into giving sensitive


information to suspicious text
messages from an unknown number. 3.52 O 5

Weighted Average Mean 3.77 O

Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-


3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never

Table 12 shows that the assessment of types of cyber

phishing encountered by the respondents as to smishing

phishing is as follows: I have seen news articles about

victims who received suspicious text messages from an

unknown number and were deceived into giving sensitive

information with the weighted mean of 3.93 with the verbal

interpretation of “often”, I received a text message that I

needed to give my bank account password to claim a prize

for a raffle promo with the weighted mean of 3.85 with the

verbal interpretation of “often”, I received a text message

instructing me to give my personal information, which was

said to be used for security matters with the weighted mean

3.78 with the verbal interpretation of “often”, I received

suspicious text messages from an unknown number with the

weighted mean 3.76 with the verbal interpretation of


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
66
CAVITE CAMPUS
General Mariano Alvarez, Cavite
“often”. Lastly, I was deceived into giving sensitive

information to suspicious text messages from an unknown

number with a weighted mean of 3.52 and a verbal

interpretation of “often”. The teachers and employees rated

their cyber phishing encountered in terms of smishing

phishing with a weighted mean of 3.77 on “Often”.

3.4 Vishing Phishing

Table 13
The Types of Cyber Phishing Encountered by the Respondents as
to Vishing Phishing
Vishing Phishing Weighted VI Rank
Mean

I received a call about my bank


account that someone was trying to 3.32 S 3
access.
I received a call that I should
transfer my money to another bank. 3.20 S 4

Someone called my number and


encouraged me to give my personal
information apparently used as a 3.14 S 5
fraud.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
67
CAVITE CAMPUS
General Mariano Alvarez, Cavite
I answered a call from an unregistered
number that asked for my bank account
password. 3.46 S 2
I have shared my personal information
with an unknown caller. 3.99 O 1

Weighted Average Mean 3.42 S

Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-


3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never

Table 13 shows that the assessment of types of cyber

phishing encountered by the respondents as to vishing

phishing is as follows: I have shared my personal

information with an unknown caller mean 3.99 with the

verbal interpretation of “often”, and I answered a call

from an unregistered number that asked for my bank account

password with the weighted mean 3.46 with the verbal

interpretation of “sometimes”, I received a call about my

bank account that someone was trying to access with the

weighted mean 3.32 with the verbal interpretation of

“sometimes”, I received a call that I should transfer my

money to another bank with the weighted mean 3.20 with the

verbal interpretation of “sometimes”. Lastly, someone

called my number and encouraged me to give my personal

information apparently used as a fraud 3.14 with the verbal


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
68
CAVITE CAMPUS
General Mariano Alvarez, Cavite
interpretation of “sometimes” with the overall weighted

mean of 3.42 which means “Sometimes”.

Sub-problem No. 4. What are the actions taken by the


victims in terms of:

4.1 Legal Actions

Table 14
The Action Taken by the Victims in Terms of Legal Actions
Legal Action Weighted VI Rank
Mean

I reported the incident to my bank’s


authorities. 3.82 O 1

I reported the incident to the local


authorities in my area. 3.64 O 2

I reported the incident to the PNP


anti-cybercrime group. 2.83 S 4

I reported the incident to the NBI


anti-cybercrime division. 2.77 S 5

I am ready to file a lawsuit once the


culprit is identified. 3.05 S 3

Weighted Average Mean 3.22 S

Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-


3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never

Table 14 shows that the assessment of the actions taken

by the victims in terms of legal actions is as follows: I

reported the incident to my bank’s authorities with a

weighted mean of 3.82 and a verbal interpretation of

“often”. I reported the incident to the local authorities


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
69
CAVITE CAMPUS
General Mariano Alvarez, Cavite
in my area with a weighted mean of 3.64 and a verbal

interpretation of “often”. I reported the incident to the

PNP anti-cybercrime group with a weighted mean of 2.83 and

a verbal interpretation of “sometimes”. I reported the

incident to the NBI anti-cybercrime division with a

weighted mean of 2.77 and a verbal interpretation of

“sometimes”. I am ready to file a lawsuit once the culprit

is identified with a weighted mean of 3.05 and a verbal

interpretation of “Sometimes”.

4.2 Personal Actions

Table 15
The Action Taken by the Victims in Terms of Personal Actions
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
70
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Personal Action Weighted VI Rank
Mean

I posted what I had experienced on


social media so that other people
would be aware of phishing. 3.73 O 5
I changed my passwords and secured my
financial accounts. 4.25 O 1.5

I blocked the user who contacted me


and initiated the phishing attack. 4.14 O 3.5

After the experience of a phishing


attack, I am more vigilant than
before. 4.14 O 3.5

I always check the source before


giving important information. 4.25 O 1.5

Weighted Average Mean 4.10 O

Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-


3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never
Table 15 shows that the assessment of the actions taken

by the victims in terms of personal actions is as follows:

I posted what I had experienced on social media so that

other people would be aware of phishing with a weighted

mean of 3.73 and a verbal interpretation of “often”. I

changed my passwords and secured my financial accounts with

the weighted mean of 4.25 and a verbal interpretation of

“often”. I blocked the user who contacted me and initiated

a phishing attack with a weighted mean of 4.14 and a verbal

interpretation of “often”. After the experience of a


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
71
CAVITE CAMPUS
General Mariano Alvarez, Cavite
phishing attack, I am more vigilant than before with the

weighted mean of 4.14 and a verbal interpretation of

“often”. I always check the source before giving important

information with a weighted mean of 4.25 and a verbal

interpretation of “Often”.

Sub-problem No. 5. Is there significant relationship

between demographic profile and types of cyber phishing:

Table 16
Significant Relationships between Age and Types of Cyber
Phishing
Relationship X2 df p- Decision Interpretation
between age and value
types of cyber
phishing
Age vs Spear
Phishing 65.099 32 0.000 Reject Significant
Age vs Whaling
Phishing 77.930 32 0.000 Reject Significant

Age vs Smishing
Phishing 36.646 32 0.262 Accept Not Significant

Age vs Vishing
Phishing 86.653 32 0.000 Reject Significant
Legend: df (32) =43.773
Table 16 shows that the X2 computed value of age and

smishing phishing is 36.646 with a p-value of 0.262, which

is less than the X2 tabular value of 43.773 at a 0.05 level

of significance with 32 degrees of freedom. The null

hypothesis is accepted. This means that there is no


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
72
CAVITE CAMPUS
General Mariano Alvarez, Cavite
significant relationship between a demographic profile and

the types of cyber phishing. The X2 computed value of age

and spear phishing is 65.099 with a p-value of 0.000, age

and whaling phishing is 77.930 with a p-value of 0.000, and

age and vishing phishing is 86.653 with a p-value of 0.000,

which is greater than the X2 tabular value of 43.773 at 0.05

level of significance with 32 degrees of freedom, the null

hypothesis is rejected. This means that there is a

significant relationship between a demographic profile and

the types of cyber phishing.

Table 17
Significant Relationships between Sex and Types of Cyber
Phishing
Relationship X2 df p- Decision Interpretation
between sex and value
types of cyber
phishing
Sex v Spear
Phishing 33.334 12 0.001 Reject Significant

Sex vs Whaling
Phishing 40.371 12 0.000 Reject Significant

Sex vs Smishing
Phishing 15.375 12 0.222 Accept Not Significant

Sex vs Vishing
Phishing 21.312 12 0.045 Reject Significant

Legend: df (12) =21.026


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
73
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Table 17 shows that the X2 computed value of sex and

smishing phishing is 15.375 with a p-value of 0.222, which

is less than the X2 tabular value of 43.773 at a 0.05 level

of significance with 32 degrees of freedom. The null

hypothesis is accepted. This means that there is no

significant relationship between a demographic profile and

the types of cyber phishing. However, the X 2 computed value

of sex and spear phishing is 33.334 with a p-value of

0.001, sex and whaling phishing is 21.312 with a p-value of

0.045, and sex and vishing phishing is 86.653 with a p-

value of 0.000, which is greater than the X2 tabular value

of 43.773 at 0.05 level of significance with 32 degrees of

freedom, the null hypothesis is rejected. This means that

there is a significant relationship between a demographic

profile and the types of cyber phishing.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
74
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Table 18
Significant Relationships between Position or Rank and Types
of Cyber Phishing
Relationship X2 df p- Decision Interpretation
between position value
or rank and
types of cyber
phishing
Position or Rank
vs Spear 89.696 48 0.000 Reject Significant
Phishing
Position or Rank
vs Whaling
Phishing 138.877 48 0.000 Reject Significant

Position or Rank
vs Smishing
Phishing 78.891 48 0.003 Reject Significant

Position or Rank
vs Vishing
Phishing 88.294 48 0.000 Reject Significant
Legend: df (48) =67.50

Table 18 shows that the X2 computed value of position

or rank and spear phishing is 89.696 with a p-value of

0.000, position or rank and whaling phishing is 138.877

with a p-value of 0.000, position or rank and smishing

phishing is 78.891 with a p-value of 0.003, and position or

rank and vishing phishing is 88.294 with a p-value of 0.000

is greater than the X2 tabular value of 67.50 at 0.05 level

of significance with 48 degrees of freedom, the null

hypothesis is rejected. This means that there is a


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
75
CAVITE CAMPUS
General Mariano Alvarez, Cavite
significant relationship between a demographic profile and

the types of cyber phishing.

Table 19
Significant Relationships between Family Income and Types of
Cyber Phishing
Relationship X2 df p- Decision Interpretation
between family value
income and types
of cyber phishing
Family Income vs
Spear Phishing 92.805 20 0.000 Reject Significant

Family Income vs
Whaling Phishing 33.282 20 0.031 Reject Significant

Family Income vs
Smishing Phishing 59.625 20 0.000 Reject Significant

Family Income vs
Vishing Phishing 69.001 20 0.000 Reject Significant

Legend: df (20) =31.410


Table 19 shows that the X2 computed value of family

income and spear phishing is 92.805 with a p-value of

0.000, family income and whaling phishing is 33.282 with a

p-value of 0.031, family income and smishing phishing is

59.625 with a p-value of 0.000, and family income and

vishing phishing is 69.001 with a p-value of 0.000, which

is greater than the X2 tabular value of 31.40 at 0.05 level

of significance with 20 degrees of freedom, the null

hypothesis is rejected. This means that there is a


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
76
CAVITE CAMPUS
General Mariano Alvarez, Cavite
significant relationship between a demographic profile and

the types of cyber phishing.

Table 20
Significant Relationships between Length of Service and Types
of Cyber Phishing
Relationship X2 df p- Decision Interpretation
between length of value
service and types
of cyber phishing
Length of Service
vs Spear Phishing 19.195 16 0.259 Accept Not Significant

Length of Service
vs Whaling
Phishing 34.925 16 0.004 Reject Significant

Length of Service
vs Smishing
Phishing 29.930 16 0.018 Reject Significant

Length of Service
vs Vishing
Phishing 20.726 16 0.189 Accept Not Significant
Legend: df (16) =26.296

Table 20 shows that the X2 computed value of the length

of service and spear phishing is 19.195 with a p-value of

0.259, Length of Service and length of service and vishing

phishing is 20.726 with a p-value of 0.189, which is

greater than the X2 tabular value of 26.296 at 0.05 level of

significance with 16 degrees of freedom. The null

hypothesis is rejected. This means that there is a

significant relationship between a demographic profile and


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
77
CAVITE CAMPUS
General Mariano Alvarez, Cavite
the types of cyber phishing. However, the X2 computed value

of whaling phishing is 34.925 with a p-value of 0.004,

length of service and smishing phishing is 29.930 with a p-

value of 0.018, which is greater than the X2 tabular value

of 26.296 at 0.05 level of significance with 16 degrees of

freedom, the null hypothesis is rejected. This means that

there is a significant relationship between a demographic

profile and types the of cyber phishing.

Sub-problem No. 6. Based on findings, what public

information drive can be proposed and implemented:

The proposed public information drive title is “Cyber

phishing prevention and awareness campaign” and the

persons/institutions/organizations responsible are PNP

anti-cybercrime division, NBI anti-cybercrime unit, and

local government units. The objective of this public

information drive is to strengthen the knowledge of the

public individuals in the prevention of cyber phishing

victimization. Also, to raise awareness about cyber

phishing through disseminating information to the public

For the program/project activities, as per information

dissemination flyers, leaflets, info graphs, and other


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
78
CAVITE CAMPUS
General Mariano Alvarez, Cavite
printed materials would be distributed in public places

around CarSiGma. Also, banners, tarpaulins, and screen

monitor ads will be posted inside or near the banks and

financial institutions. The expected outcome of this

program that the citizens of Carmona, Silang, and GMA will

be more vigilant about the types of cyber phishing. The

probability of them being victimized by these cyber-attacks

will decrease.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
79
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CHAPTER 5

Summary, Conclusions, and Recommendations

This chapter presents a summary of the findings,

conclusion and recommendations.

Summary

The salient findings of the study are as follows;

1. Demographic and professional profiles of the

respondents

There are 78 respondents that fall between the

ages of 30 to 35 years old. There are 113 respondents for

females, and as to their position or rank, there are 49

respondents from assistant professor 2. In terms of family

income, there are 64 respondents have family incomes

ranging from 15,000 to 20,000. And for the length of

service there are 111 respondents with a length of 4 to 6

years in service of teaching.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
80
CAVITE CAMPUS
General Mariano Alvarez, Cavite
2. Means used by the respondents in online transaction, as

payment, purchase and cash transfer

The method is explained in tables 6,7 & 8 that 61

of the respondents use 7/11 connect as means for payment

in an online transaction, as for purchase there are 50

respondents to purchase PayMaya and 50 respondents for the

online transaction. And in terms of cash transfer, there

are 86 respondents for using Gcash and 86 respondents for

online bank transaction.

3. Types of cyber phishing encountered by the respondents

The assessment of types of cyber phishing

encountered by the respondents is that the smishing

phishing is the most often encountered which is explained

in table 12 and as follows; I have seen news articles

about victims who received suspicious text messages from

an unknown number and were deceived into giving sensitive

information.

4. Actions taken by the victims

The assessment of the actions taken by the victims

in terms of legal action is they have reported the

incident into their bank authorities. While the action


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
81
CAVITE CAMPUS
General Mariano Alvarez, Cavite
taken by the victims in terms of personal actions is they

posted what they had experienced on social media so that

other people would be aware of phishing.

5. Is there significant relationship between

demographic/professional profile and types of cyber

phishing?

The significant relationship between

demographic/professional profile and types of cyber

phishing are as follows; Age vs. types of cyber phishing;

Age has a significant relationship to spear, whaling, and

vishing while it has no significant relationship to

smishing phishing. Sex vs. types of cyber phishing; Sex

has significant relationship to spear, waling, and vishing

phishing but has no significant relationship to smishing

phishing. Position/Rank vs. types of cyber phishing;

Position and rank has significant relationship to all the

types of cyber phishing. Family income vs. types of cyber

phishing; Family income has a significant relationship to

all the types of cyber phishing. As to length of service

vs. types of cyber phishing; Length of service has a


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
82
CAVITE CAMPUS
General Mariano Alvarez, Cavite
significant relationship to whaling and smishing but has

no significant

relationship to spear and vishing phishing.

Conclusions

Based on the findings the following conclusions were

drawn:

1. Based on the findings of the study, the researchers

conclude that most of the victims are females because

they have a shallow knowledge about cyber threats

including cyber phishing, though their family income

is between 15 to 20 thousand and they are not tenured

in service with a length of service between 4-6 years.

2. As to the data gathered, the means used by

respondents in online transaction as to payment is

7/11 connect because it has many options for paying.

As to purchase, the respondents use both PayMaya and

online bank transaction because it has a direct

shopping option and a dollar currency option. As to

cash transfer, the respondents use both Gcash and


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
83
CAVITE CAMPUS
General Mariano Alvarez, Cavite
online bank transaction because it is designed for

cash transfers also it is easy and convenient to use.

3. Based on the data gathered, smishing phishing is the

most encountered type of cyber phishing by the

respondents. It is because smishing phishing attacks

individual thru text messages and the victims decides

faster especially if there is an expected prize or a

threat.

4. Based on findings, the victims are more often doing

personal actions than legal actions because it is

faster unlike the legal action which takes a long

process.

5. Therefore the researchers conclude that most of the

demographic profile and types of cyber phishing has a

significant relationship to each other except:

between age and smishing phishing, sex and smishing

phishing, length of service and vishing phishing,

length of service and spear phishing.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
84
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Recommendations

Based on the findings and conclusions presented, the

following recommendations are suggested.

1. The teachers and employees especially the females

should be more vigilant and cautious on what they

post on social Medias and they should have more

knowledge about cyber phishing to be able to prevent

them for being victimized.

2. The researchers recommend that they should be more

careful on using their preferred means in online

transaction such as in using 7/11 connect they should

ask the store clerk for assistance, in using paymaya,

online bank transaction and Gcash be meticulous on

choosing your password and do not share this to


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
85
CAVITE CAMPUS
General Mariano Alvarez, Cavite
anyone. Verify the website before entering your

account.

3. The researchers recommend that to avoid being a

victim of smishing phishing, do not trust the text

messages who came from unknown number or contact.

Verify the message before giving something.

4. The researchers recommend that it should be customary

to take legal actions such as to inform the

authorized officers of the case of cyber phishing

because P.N.P. and N.B.I. anti-cybercrime division

has sufficient capabilities to control and

investigate the case, provide adequate actions in

response to this cybercrime.

5. The researchers recommend that the authorities should

conduct a public information drive to inform the

citizens regarding cyber phishing and provide

knowledge to minimize or eradicate cyber phishing

victimization.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
86
CAVITE CAMPUS
General Mariano Alvarez, Cavite

REFERENCES

A. Thesis/Dissertation

Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola,


A.,Epiphaniou, G., Maple, C., & Bellekens, X.
(2021). Cyber security in the age of covid-19: A
timeline and analysis of cyber-crime and cyber-
attacks during the pandemic. (Published Master’s
Thesis). Abertay University. Retrieved from
https://doi.org/10.1016/j.cose.2021.102248

Omorog, C. D., & Medina, R. P. (2017). Internet


security awareness of Filipinos: A survey paper.
International Journal of Computing Sciences
Research. (Unpublished Master’s Thesis). Camarines
Sur Polytechnic Colleges. 1(4), 14-26. doi:
10.25147/ijcsr.2017.001.1.18.

Senthilkumar, K. & Easwaramoorthy, Sathishkumar.


(2017). A Survey on Cyber Security awareness among
college students in Tamil Nadu. (Unpublished
Master’s Thesis). Vellore Institute of Technology,
Tamil Nadu, India. 042043.
10.1088/1757-899X/263/4/042043.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
87
CAVITE CAMPUS
General Mariano Alvarez, Cavite

B. Online Source

Abdelhamid (2020). The role of health concerns in


phishing susceptibility: Survey design study.
Journal of medical Internet research. Retrieved
from https://pubmed.ncbi.nlm.nih.gov/32364511/.

Akdemir, N. S. Y. (2021). How phishers exploit the


coronavirus pandemic: A content analysis of covid-
19 themed phishing emails - Naci Akdemir, Serkan
Yenal, 2021. SAGE Journals. Retrieved from
https://tinyurl.com/2keata83.

Bailey, Ph.D., Janet L.; Mitchell, DBA, Robert B.; and


Jensen, Ph.D., Bradley K., "Analysis of Student
Vulnerabilities to Phishing" (2018). AMCIS 2008
Proceedings. 271.
http://aisel.aisnet.org/amcis2008/271

Devanesan, J. (2020). Phishing scams dominate the


Philippines Cybercrime Landscape. Tech Wire Asia.
Retrieved from https://tinyurl.com/d9nu63aw

Diaz, A. & Sherman, A. & Joshi, A. (2019). Phishing in


an academic community: A study of user
susceptibility and behavior. Cryptologia. 44. 1-
15. 10.1080/01611194.2019.1623343.

Fontanilla, M. V. (2020). Cybercrime pandemic. Eubios


Journal of Asian and International Bioethics 30
(4):161-165.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
88
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Guevarra, M. (2020). Phishing is top ph cybercrime
during pandemic – authorities. Retrieved from
https://www.rappler.com/nation/266364-phishing-top-
ph-cybercrime-during-pandemic/

Korkmaz, M. E. Kocyigit, O. K. Sahingoz and Diri, B.


(2021). Phishing Web Page Detection Using N-gram
Features Extracted From URLs," 2021 3rd
International Congress on Human-Computer
Interaction, Optimization and Robotic Applications
(HORA), 2021, pp. 1-6, doi:
10.1109/HORA52670.2021.9461378

Macairan, E. (2020). Phishing top cybercrime during


quarantine. Philstar.com. Retrieved from https://
shorturl.at/dkmvz.

Malasig, J. (2020). Fake emails on Netflix billing


information are circulating in the Philippines,
Cyber Security Group warns. Interaksyon. Retrieved
from https://interaksyon.philstar.com/

Pranggono, B., & Arabo, A. (2020). Covid‐19 Pandemic


Cybersecurity issues. Wiley Online Library.
Retrieved from https:// shorturl.at/jnoTW.

Rotas, E., & Cahapay, M. (2021). Does threat knowledge


influence protective behaviors of students in the
context of cyber security in remote learning amid
covid-19 crisis? Journal of Pedagogical Sociology
and Psychology. Retrieved from
https://tinyurl.com/25v3ffz9.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
89
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Señora, F. (2020). Phishing is top ph cybercrime
during pandemic – authorities. Rappler. Retrieved
from https:// shorturl.at/uOPRV.

Statista Research Department, & 3, S. (2021).


Philippines: Number of phishing incidents by
region. Statista. Retrieved from
https://www.statista.com/statistics/1136171

Stock, J. (2020). Interpol report shows alarming rate


of cyberattacks during COVID-19. INTERPOL.
Retrieved from https://tinyurl.com/4wj8a8p8.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
90
CAVITE CAMPUS
General Mariano Alvarez, Cavite

APPEDNDIX A

SURVEY QUESTIONNAIRE

Dear Respondents,

The undersigned is currently conducting a thesis


entitled “Cyber pshishing among teachers and employees of
educational institutions in Carsigma: Basis for public
information drive”. In this regard, the undersigned is
requesting for your time in answering the survey
questionnaire in order to generate data for the said study.
Rest assured that any information you will provide shall
only be used for purpose of the study and will be treated
with utmost confidentiality.

Your cooperation in this endeavour will be very much


appreciated. Thank you.

Abbegail Marie T. Arce


Roel M. Francia
Arvin Kyle G. Millan
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
91
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Karl Justine G. Pagsaligan
Kent Bryan S. Palaubsanon
Researchers

Part I. Demographic profile of the respondent.

Privacy Content: I understand and agree that filling out


this form, I am allowing the Researchers to collect, use
and disclose my personal information for the purpose of
their study and store it as necessary for the fulfillment
of the stated purpose in accordance with the applicable
laws, including Data Privacy Act of 2012 and it
implementing rules and regulation. The purpose and extent
of collection, use, sharing and disclose, and the storage
of data subjects’ personal information were clearly stated.

Direction: Kindly select the circle that corresponds to


your answer. All information will be treated with strict
confidentiality.

Name: (optional): ___________________________________

Age: 18-23 years old 24-29 years old 30-35 years old

36-41 years old 42-47 years old 48-53 years old

54-59 years old 60 and above

Sex: Male Female

Position or Rank:

Instructor 1 Assistant Professor 1 Associate Professor 1


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
92
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Instructor 2 Assistant Professor 2 Associate Professor 2

Instructor 3 Assistant Professor 3 Associate Professor 3

Assistant Professor 4 Associate Professor 4

Associate Professor 5

others, please specify: ______________

Family Income (Monthly):

Below 10,000 10,000 to 15,000 15,000 to 20,000

20,000 to 25,000 25,000 to 30,00 Above 30,000

Length of Service:

Less than 1 year 1-3 years 4-6 years

7-10 years more than 10 years

Part II. What are the means used by the respondents in online
transactions?

Direction: Please select the means that you are often using in
online transactions in terms of: paying, purchasing,
transferring cash.

Payment Purchase Cash Transfer

Gcash

Paymaya

Google Paybills

Online bank transaction

Smart money
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
93
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Dragon pay

Wee pay

PayPal

7/11 Connect

Coins.ph (bitcoin)

Others please specify:

Part III. What type of cyber phishing activities you have


encountered?

Direction: Please rate the degree of your occurrence to the


following statements. Select the circle that corresponds to your
answer.

(5) Always (4) Often (3) Sometimes (2) Rarely (1) Never

A. Spear phishing (an email or electronic


communications scam targeted towards a specific
individual, organization or business.)

5 4 3 2 1
1. I have received a malicious email,
apparently from an untrustworthy source.

2. I have received an email that


persuades me to click the link provided in
the malicious email.

3. I have received an email that


encourages me to log-in to my bank account
on a specific website.

4. I received a spam email that


instructed me to give my personal
information needed for verification.

5. I was deceived into giving information


to a malicious email, which apparently
coming from a suspicious source.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
94
CAVITE CAMPUS
General Mariano Alvarez, Cavite
B. Whaling phishing (a highly targeted phishing attack
aimed at senior executives masquerading as a
legitimate email.)

5 4 3 2 1
1. My institution was targeted by whale
phishing specifically that the
administration staff received a malicious
email.

2. I have been encouraged to take


secondary actions such as initiating a
wire transfer fund.

3. The senior executives at my


institution have received an email
apparently masquerading as a legitimate
email.

4. My institution’s system has been


infected by malware due to an email
apparently a whaling phishing attack.

5. The finance office of my institution


was attacked by whale phishing through
malicious emails masquerading as
legitimate emails.

5 4 3 2 1
1. I received suspicious text messages
from an unknown number.

2. I received a text message instructing


me to give my personal information, which
was said to be used for security matters.

3. I received a text message that I


needed to give my bank account password to
claim a prize for a raffle promo.

4. I have seen news articles about


victims who received suspicious text
messages from an unknown number and were
deceived into giving sensitive
information.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
95
CAVITE CAMPUS
General Mariano Alvarez, Cavite
5. I was deceived into giving sensitive
information to suspicious text messages
from an unknown number.

D. Vishing Phishing (is a voice phishing, involves a


malicious caller purporting to be from tech support.)

5 4 3 2 1
1. I received a call about my bank
account that someone was trying to access.

2. I received a call that I should


transfer my money to another bank.

3. Someone called my number and


encouraged me to give my personal
information apparently used as a fraud.

4. I answered a call from an unregistered


number that asked for my bank account
password.

5. I have shared my personal information


with an unknown caller.

Part IV. What are the actions you have taken when you encountered
cyber phishing?

Direction: Please rate the degree of your occurrence to the


following statements. Select the circle that corresponds to your
answer.

(5) Always (4) Often (3) Sometimes (2) Rarely (1) Never

A. Legal actions
5 4 3 2 1
1. I reported the incident to my bank’s
authorities.
2. I reported the incident to the local
authorities in my area.

3. I reported the incident to the PNP


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
96
CAVITE CAMPUS
General Mariano Alvarez, Cavite
anti-cybercrime group.

4. I reported the incident to the NBI


anti-cybercrime division.

5. I am ready to file a lawsuit once the


culprit is identified.

B. Personal actions

5 4 3 2 1
1. I posted what I had experienced on
social media so that other people will be
aware of phishing.

2. I changed my passwords and secured my


financial accounts.

3. I blocked the user who contacted me


and initiated the phishing attack.

4. After the experience of a phishing


attack, I am more vigilant than before.

5. I always check the source before


giving important information.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
97
CAVITE CAMPUS
General Mariano Alvarez, Cavite

APPENDIX B
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
98
CAVITE CAMPUS
General Mariano Alvarez, Cavite
LETTER OF INTENT
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
99
CAVITE CAMPUS
General Mariano Alvarez, Cavite
APPENDIX C

Proposed Public Information Drive

Many public individuals in CarSiGma are being

victimized by cyber phishing and one of the main reasons is

the lack of knowledge about these crimes. Therefore, the

researchers would like to propose a public information

drive entitled “Cyber phishing prevention and awareness

campaign” to be conducted by the authorities such as PNP

anti-cybercrime division, NBI anti-cybercrime unit, and

local government units. The program activity is information

dissemination through flyers, leaflets, info graphs, and

other printed materials would be distributed within public

places around CarSiGma. Also, banners, tarpaulins, and

screen monitor ads will be posted inside or near the banks

and financial institutions.

The general objective of this public information

drive is to strengthen the knowledge of the public

individuals in the prevention of cyber phishing

victimization. Also, to raise awareness about cyber

phishing through disseminating


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
100
CAVITE CAMPUS
General Mariano Alvarez, Cavite
information to the public.

This program will be conducted within the locality of

Carmona, Silang, and G.M.A., Cavite.

Proposed Public Information Drive

Key Program/ Persons Target Expected


Result Project Involve/ location Outcome
Objective Responsible
Areas
Activities

Cyber -To -Cyber Phishing -PNP anti- -Municipalities


phishing strengthen prevention and of Carmona, -The
cybercrime citizens of
in terms the knowledge awareness division Silang, and
of; of the public campaign GMA. Carmona,
individuals Silang, and
-NBI anti- GMA will be
Spear in the  Information cybercrime
prevention of more aware
Phishing dissemination division about cyber
cyber of flyers and
phishing phishing.
Smishing leaflets to -Cyber
Phishing victimization the people. Security
. Also, to officers -The
raise probability
Vishing  Giving info of them
Phishing awareness graphs -Local
about cyber government being
containing victimized
phishing information units
Whaling through by these
Phishing about cyber cyber-
disseminating phishing.
information attacks
and by will
conducting  Posting decrease.
seminars. tarpaulin,
banners, and
screen
monitor ads
in key areas
around the
municipality
of CarSiGma.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
101
CAVITE CAMPUS
General Mariano Alvarez, Cavite

ARVIN KYLE G. MILLAN


#201 Blk 43 Lot 5 Brgy. Memije
General Mariano Alvarez, Cavite
kylemillan31@gmail.com
09503503465

PERSONAL INFORMATION
Date of Birth : August 31, 2000
Place of Birth : San Carlos, Pangasinan
Sex : Male
Civil Status : Single
Height : 5’7”
Weight : 65 kls.
Citizenship : Filipino
Religion : Iglesia Ni Cristo
EDUCATIONAL BACKGROUD
Tertiary Level:
 Eulugio “Amang” Rodriquez Institute of Science
and Technology
(Bachelor of Science in Criminology)
(2019 - Present)
Secondary Level:
 General Mariano Alvarez Technical High School
(2012 - 2018)
Primary Level:
 San Gabriel II Elementary School
(2006 - 2012)
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
102
CAVITE CAMPUS
General Mariano Alvarez, Cavite

SKILLS:
Has good communication skills.
Can work independently or in a team.
Highly motivated and willing to learn.
Versatile and can adopt in any kinds of job.
Can use Microsoft word/PowerPoint/Excel
WORK EXPERIENCE

 Work immersion/On job training at General Mariano Alvarez


Municipal of Police Station. (November-December 2017)

 Factory worker (twister) at Grand Asia lighting corporation


(June – August 2019)

 Special Project for the Employment of Students at General


Mariano Alvarez Municipal town hall. (June 2021-August 2021)

CHARACTER REFERRENCE
Ms. KARIZZA ABOLENCIA Mrs. DORIS F. MAGHIRANG
PROFESSOR, GMATHS PROFESSOR, GMATHS

I hereby certify that the above information is true and


correct to the best of my knowledge and belief.

ARVIN KYLE G. MILLAN


Researcher
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
103
CAVITE CAMPUS
General Mariano Alvarez, Cavite

KENT BRYAN S. PALAUBSANON


Blk 8 Lot 161 Barangay Poblacion 5
General Mariano Alvarez, Cavite
kpalaubsanon06@gmail.com
09358102757

PERSONAL INFORMATION
Date of Birth : May 02, 1999
Place of Birth : General Mariano Alvarez, Cavite
Sex : Male
Civil Status : Single
Height : 5’7”
Weight : 65 kls.
Citizenship : Filipino
Religion : Roman Catholic

EDUCATIONAL BACKGROUD
Tertiary Level:
 Eulugio “Amang” Rodriquez Institute of Science
and Technology
(Bachelor of Science in Criminology)
(2019 - Present)
Secondary Level:
 General Mariano Alvarez Technical High School
(2012 - 2018)
Primary Level:
 San Gabriel II Elementary School
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
104
CAVITE CAMPUS
General Mariano Alvarez, Cavite
(2006 - 2012)

Training and Seminars attended:


 Special Program for Employment of Students
(Municipality of the G.M.A)
(2017)
 Work Immersion (Office of the Vice Mayor)
(2018 - 2019)
SKILLS:
Excellent written and communication skills.
Computer literate.
Highly organized and efficient.
Ability to work independently or as part of the team.
WORK EXPERIENCE

 Special Project for the Employment of Students at General


Mariano Alvarez Municipal town hall. (June 2017-August 2018)

 Work immersion/On job training at General Mariano Alvarez


Municipal of Vice Mayor Office. (December-January 2017)

 Factory worker (twister) at Grand Asia lighting corporation


(June – August 2019)

CHARACTER REFERRENCE
Mr. ALVIN REJUSO Mr. LUCKY BOY NOTORIO
PROFESSOR, EARIST PROFESSOR, EARIST

I hereby certify that the above information is true and


correct to the best of my knowledge and belief.

_________________________
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
105
CAVITE CAMPUS
General Mariano Alvarez, Cavite
KENT BRYAN S. PALAUBSANON
Researcher

ROEL M. FRANCIA
Blk 30 Lot 21Paris Street Phase II
San Mariano City Salawag
Dasmariñas, Cavite
franciaroelmecccrim@gmail.com
09707668081

PERSONAL INFORMATION
Date of Birth : July 25, 1999
Place of Birth : San Jose, Camariñes Sur
Sex : Male
Civil Status : Single
Height : 5’7
Weight : 60 kls.
Citizenship : Filipino
Religion : Roman Catholic
EDUCATIONAL BACKGROUD
Tertiary Level:
 Eulugio “Amang” Rodriquez Institute of Science
and Technology
(Bachelor of Science in Criminology)
(2019 - Present)
Secondary Level:
 Paliparan II National High School
(2012 - 2016)
 Paliparan III National High School
(2016 - 2018)
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
106
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Primary Level:
 Pintong Gubat Elementary School
(2006 - 2012)

Training and Seminars attended:


 Webinars about Criminology and Criminal Justice
(2021)
 On the Job Training 1 (Criminology)
(2021)
SKILLS:
Proficient in MS Office Application such as Ms Word.
Excel and Power Point.
Internet and E-mail application.

WORK EXPERIENCE

 Waiter at Taal Vista Hotel. (2022)

 Crew at McDonald’s. (2018-2019)

CHARACTER REFERRENCE
Ms.GRACE MORGA Mr.PROCESO PAITON
PROFESSOR, S.H.S PROFESSOR, S.H.S

I hereby certify that the above information is true and


correct to the best of my knowledge and belief.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
107
CAVITE CAMPUS
General Mariano Alvarez, Cavite
_________________________
ROEL M. FRANCIA
Researcher

ABBEGAIL MARIE T. ARCE


112 Cong. Road Blk 12 Lot 3 Brgy. Memije
General Mariano Alvarez, Cavite
arceabbegailmarietecccrim@gmail.com
09128324666

PERSONAL INFORMATION
Date of Birth : May 25, 1998
Place of Birth : Manila, Pasay
Sex : Female
Civil Status : Single
Height : 5’3”
Weight : 57 kls.
Citizenship : Filipino
Religion : Roman Catholic
EDUCATIONAL BACKGROUD
Tertiary Level:
 Eulugio “Amang” Rodriquez Institute of Science
and Technology
(Bachelor of Science in Criminology)
(2019 - Present)
Secondary Level:
 General Mariano Alvarez Technical High School
(2012 - 2018)
Primary Level:
 San Gabriel II Elementary School
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
108
CAVITE CAMPUS
General Mariano Alvarez, Cavite
(2006 - 2012)

Training and Seminars attended:


 Webinars about Criminology and Criminal Justice
(2021)
 On the Job Training (CRIMINOLOGY)
(2021)
SKILLS:
Multi-tasking.
Ability to plan and prioritize work.
Hardworking and capable to work multiple task.
I have knowledge in Microsoft Office Application such as:
Microsoft Word
Microsoft PowerPoint
Microsoft Excel

CHARACTER REFERRENCE
Mr. GIAN CARLO VILLAGRACIA Mr. MAT CARPIO
PROFESSOR, GMATHS PROFESSOR, GMATHS

I hereby certify that the above information is true and


correct to the best of my knowledge and belief.

_________________________
ABBEGAIL MARIE T. ARCE
Researcher
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
109
CAVITE CAMPUS
General Mariano Alvarez, Cavite

KARL JUSTINE G. PAGSALIGAN


Sitio Hanupol Kaong, Silang Cavite
pagsaligankarljutineecccrim@gmail.com
09069770152

PERSONAL INFORMATION
Date of Birth : October 14, 1999
Place of Birth : Kaong Silang, Cavite
Sex : Male
Civil Status : Single
Height : 5’8”
Weight : 60 kls.
Citizenship : Filipino
Religion : Roman Catholic
EDUCATIONAL BACKGROUD
Tertiary Level:
 Eulugio “Amang” Rodriquez Institute of Science
and Technology
(Bachelor of Science in Criminology)
(2019 - Present)
Secondary Level:
 Philippine Christian University Senior High
School
(2016-2018)
 Kaong National High School
(2012 - 2016)
Primary Level:
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
110
CAVITE CAMPUS
General Mariano Alvarez, Cavite
 Kaong Elementary School
(2006 - 2012)

Training and Seminars attended:


 Webinars about Criminology and Criminal Justice
(2021)
 On the Job Training (CRIMINOLOGY)
(2021)
SKILLS:
Proficient in MS Office Application such as Ms Word.
Excel and Power Point.
Internet and E-mail application.

CHARACTER REFERRENCE
Mr. RANCEL ERAS Mr. GREG DE LA TONGA
PROFESSOR, PCU PROFESSOR, PCU

I hereby certify that the above information is true and


correct to the best of my knowledge and belief.

KARL JUSTINE G. PAGSALINGAN


Researcher
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
111
CAVITE CAMPUS
General Mariano Alvarez, Cavite

You might also like