You are on page 1of 110

Republic of the Philippines

EULOGIO “AMANG” RODRIGUEZ


INSTITUTE OF SCIENCE AND TECHNOLOGY
1
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CYBER PHISHING AMONG TEACHERS AND EMPLOYEES OF


EDUCATIONAL INSTITUTION IN CARSIGMA:
BASIS FOR PUBLIC INFORMATION DRIVE

A Thesis
presented to the Faculty of
Eulogio “Amang” Rodriquez Institute of
Science and Technology

In Partial Fulfillment
of the Requirements for the Degree
Bachelor of Science in Criminology

by

ABBEGAIL MARIE T. ARCE


ROEL M. FRANCIA
ARVIN KYLE G. MILLAN
KARL JUSTINE G. PAGSALIGAN
KENT BRYAN S. PALAUBSANON

2022
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
2
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CERTIFICATION
This thesis entitled “CYBER PHISHING AMONG TEACHERS AND
EMPLOYEES OF EDUCATIONAL INSTITUTION IN CARSIGMA: BASIS FOR
PUBLIC INFORMATION DRIVE” prepared and submitted by
ABBEGAIL MARIE T. ARCE, ROEL M. FRANCIA, ARVIN KYLE G.
MILLAN, KARL JUSTINE G. PAGSALIGAN, and KENT BRYAN S.
PALAUBSANON in partial fulfillment of the requirements for
the degree of Bachelor of Science in Criminology has been
examined and recommended for ORAL DEFENSE.

CATHERINE D. DUMPIT,MA.Ed.
Thesis Adviser

APPROVAL SHEET
Approved by the Oral Defense Panel on March 28, 2022
with a rating of 1.75.

AGNES N. COO,Ed.D.
Chairman

SHIRLEY P. DE LEON,Ed.D. FLORDELIZA C. NAVARRO,MA.Ed.


Member Member

Accepted in partial fulfillment of the requirements for


the degree of Bachelor of Science in Criminology.

AGNES N. COO,Ed.D.
Campus Administrator
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
3
CAVITE CAMPUS
General Mariano Alvarez, Cavite
ABSTRACT

Title : CYBER PHISHING AMONG TEACHERS AND EMPLOYEES

OF EDUCATIONAL INSTITUTION IN CARSIGMA:

BASIS FOR PUBLIC INFORMATION DRIVE

Researchers : ABBEGAIL MARIE T. ARCE

ROEL M. FRANCIA

ARVIN KYLE G. MILLAN

KARL JUSTINE G. PAGSALIGAN

KENT BRYAN S. PALAUBSANON

Degree : Bachelor of Science in Criminology

Year : 2022

Adviser : MRS. CATHERINE D. DUMPIT

Rationale of the Study

As the COVID-19 pandemic began, teachers and employees

in educational institutions shifted an online setting. This

made them more vulnerable to cybercrime. Teachers and

employees of educational institutions were targets of

phishers because they have financial income and often use

online transactions. This research could also be used as a

basis for public information drive in the prevention of

cyber phishing.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
4
CAVITE CAMPUS
General Mariano Alvarez, Cavite
The study aimed to assess cyber phishing among

teachers and employees of educational institutions in

CarSiGma. Specifically, it aimed to provide answers to the

following questions: 1. What is the demographic and

professional profiles of the respondents in terms of age,

sex, position and rank, family income and length of

service? 2. What are the means used by the respondents in

online transactions as to payment, purchase, and cash

transfer? 3. What are the types of cyber phishing

encountered by the respondents as to spear phishing,

whaling phishing, smishing phishing, and vishing phishing?

4. What are the actions taken by the victims in terms of

legal action and personal action? 5. Is there a significant

relationship between demographic profiles and types of

cyber phishing? 6. Based on findings, what information

drive can be proposed and implemented?

A descriptive research method was used in this study

that was conducted in selected educational institutions

within Carmona, Silang, and G.M.A., Cavite. The respondents

were teachers and employees of educational institutions.

The researchers used a convenience sampling technique. The


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
5
CAVITE CAMPUS
General Mariano Alvarez, Cavite
main tool in this study was a survey questionnaire via

Google Forms. The statistical tools used in this study were

frequency, percentage, weighted mean, rank, and chi-square.

The salient findings of the study were as follows:

There were 78 respondents between the ages of 30 to 35

years old. There are 113 respondents for females, and as

to their position or rank, there were 49 respondents from

assistant professor 2. In terms of family income, 64

respondents have family incomes ranging from 15,000 to

20,000. And for the length of service there were 111

respondents with a length of 4 to 6 years in the service

of teaching.

There are 61 respondents or 16.5 percent, who used

7/11 connect as means of payment in an online transaction;

As for purchases, 50 respondents or 14.1 percent used

PayMaya and 50 respondents or 14.1 percent, used PayMaya

for the online transaction. And in terms of cash

transfers, 86 or 24 percent used both Gcash and Online

Bank Transaction.

On the types of cyber phishing encountered by the

respondents, smishing phishing was the most commonly


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
6
CAVITE CAMPUS
General Mariano Alvarez, Cavite
encountered, as follows; I have seen news articles about

victims who received suspicious text messages from an

unknown number and were deceived into giving

sensitive information.

The assessment of the actions taken by the victims in

terms of legal action was that they had reported the

incident their bank authorities. While the action taken by

the victims in terms of personal actions was that they

posted what they had experienced on social media so that

other people would be aware of phishing.

There was a significant relationship between age vs.

types of cyber phishing as to spear, whaling, and vishing

while there was no significant relationship to smishing

phishing. Sex vs. types of cyber phishing; Sex has

significant relationship to spear, waling, and vishing

phishing but has no significant relationship to smishing

phishing. Position/Rank vs. types of cyber phishing;

Position and rank had significant relationship to all the

types of cyber phishing. Family income vs. types of cyber

phishing; Family income has a significant relationship to

all the types of cyber phishing. As to length of service


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
7
CAVITE CAMPUS
General Mariano Alvarez, Cavite
vs. types of cyber phishing; Length of service has a

significant relationship to whaling and smishing but has

no significant relationship to spear and vishing phishing.

The researchers conclude that most of the victims are

females because they have a shallow knowledge of cyber

threats including cyber phishing, though their family

income is between 15,000 to 20,000 and they are not tenured

in service with a length of service of between 4-6 years.

The means used by respondents in online transactions as to

payment is 7/11 connect because it has many options for

paying. As to purchases, the respondents use both PayMaya

and online bank transactions because they have a direct

shopping option and a dollar currency option. As to cash

transfers, the respondents use both Gcash and online bank

transactions because they were designed for cash transfers

and because they were easy and convenient to use. Smishing

phishing is the most encountered type of cyber phishing by

the respondents. It is because smishing phishing attacks

individuals through text messages and the victims decide

faster, especially if there is an expected prize or a

threat. The victims are more often taking personal actions


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
8
CAVITE CAMPUS
General Mariano Alvarez, Cavite
than legal actions because it is faster unlike legal action

which takes a long process. The researchers conclude that

most of the demographic profiles and types of cyber

phishing have a significant relationship with each other

except: age and smishing phishing, sex and smishing

phishing, length of service and vishing phishing, length of

service and spear phishing.

Based on their findings, the researchers conclude that

a public information drive should be proposed with the

purpose of enhancing community awareness. With the

significant growth of internet usage, people increasingly

share their personal information. As a result, an enormous

amount of personal information and financial transactions

become vulnerable to cybercriminals. A cyber phishing

prevention and awareness campaign whose main objective is

to strengthen the knowledge of the public in the prevention

of cyber phishing victimization. The said campaign will

include the dissemination of information through flyers,

infographics, tarpaulins, and other printed materials

distributed in public places around CarSiGma. This will be


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
9
CAVITE CAMPUS
General Mariano Alvarez, Cavite
possible with the PNP anti-cybercrime division, the NBI

anti-cybercrime units, and local government units.

ACKNOWLEDGEMENTS

The researchers would like to express heartfelt

gratitude and appreciation to the following good-hearted

people, who in one way or another, helped in the completion

of this research undertaking: For Dr. Agnes N. Coo, the

Campus Administrator; Mr. Edzel G. Peña, the Criminology

Chairperson; and Mrs. Catherine D. Dumpit, their thesis

adviser, for contributing to the success of this project.

They were able to complete all stages of the project thanks

to their supervision and suggestions. The researchers would

also like to express gratitude to the panelists for making

the defense enjoyable and for their insightful comments and

ideas.

The researchers also like to express their gratitude to

their friends and their entire family for their unwavering

support and understanding during the research and writing.

Your prayers for them have kept them going so far.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
10
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Finally, they wanted to express their gratitude to God

for allowing them to persevere in the face of adversity.

They've been following your advice on a daily basis. You are

the one who allowed them to complete their studies. They

will continue to put their faith in you for the future

DEDICATION

The researchers would like to dedicate this research


study, above all, to our almighty God, for everything he
has done in our lives.

To the families of the researchers, PALAUBSANON Family,


MILLAN Family, FRANCIA Family, PAGSALIGAN Family, and ARCE
Family who gave us the greatest support and love that we
could ever have, for understanding how much it will cost
and how we study day and night.

We would like to express our deep gratitude and


dedication to these people who gave us unconditional
effort, love, understanding and support.

To Dayna Palaubsanon, Kent Bryan’s mother who allows us


to study in their home and provides us with abundant food.

To Henrich Millan, Arvin Kyle’s brother, who has


sponsored our thesis and has always been willing to assist
us in our efforts to complete it.

To Regie Francia, Roel’s mother, who draws our


attention to our predicament in order for us to support and
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
11
CAVITE CAMPUS
General Mariano Alvarez, Cavite
comprehend it.

To Primitiva Pagsaligan, Karl Justine’s mother, is


always there for us and prepares a great lunch for us.

To Rodolfo Arce, Abbegail’s father, who makes us joyful


and provides us with a stress-free day in their home.

TABLE OF CONTENTS

Page

LIST OF TABLES xv

CHAPTER

1 The Problem and Its Background 1

Introduction 1

Theoretical Framework 3

Conceptual Framework 4

Statement of the Problem 5

Hypothesis 7

Scope and Limitation of the Study 7

Significance of the Study 8

Definition of Terms 10
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
12
CAVITE CAMPUS
General Mariano Alvarez, Cavite
2 Review of Related Literature and Studies 16

Local Literature 16

Foreign Literature 18

Local Studies 21

Foreign Studies 23

Page

Synthesis 26

3 Methodology 28

Research Design 28

Population and Sampling 29

Respondents of the Study 30

Research Instrument 30

Data Gathering Procedures 31

Statistical Treatment of Data 32

4 Presentation, Analysis and Interpretation of Data 35

Sub-Problem No. 1 35

Sub-Problem No. 2 40

Sub-Problem No. 3 43

Sub-Problem No. 4 50
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
13
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Sub-Problem No. 5 53

Sub-Problem No. 6 59

5 Summary, Conclusions and Recommendations 61

Summary 61

Conclusions 64

Page

Recommendations 66

REFERENCES 69

APPENDICES

A SURVEY QUESTIONNAIRE 73

B LETTER OF INTENT 80

C PROPOSED PUBLIC INFORMATION DRIVE 84

CURRICULUM VITAE 86
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
14
CAVITE CAMPUS
General Mariano Alvarez, Cavite

LIST OF TABLES

Page

Table

1 The Distribution of Respondents 29

2 The Frequency and Percentage Distribution


of Respondents as to Age 35

3 The Frequency and Percentage Distribution


of Respondents as to Sex 36

4 The Frequency and Percentage Distribution


of Respondents as to Position/Rank 37

5 The Frequency and Percentage Distribution


of Respondents as to Family Income (Monthly) 38

6 The Frequency and Percentage Distribution


of Respondents as to Length of Service 39

7 The Frequency and Percentage Distribution


of Respondents as to Online Transaction
Used in Payment 40
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
15
CAVITE CAMPUS
General Mariano Alvarez, Cavite
8 The Frequency and Percentage Distribution
of Respondents as to Online Transaction
Used in Purchase 41

9 The Frequency and Percentage Distribution


of Respondents as to Online Transaction
Used in Cash Transfer 42

10 The Types of Cyber Phishing Encountered


by the Respondents as to Spear Phishing 43

Page

11 The Types of Cyber Phishing Encountered


by the Respondents as to Whaling Phishing 45

12 The Types of Cyber Phishing Encountered


by the Respondents as to Smishing Phishing 47

13 The Types of Cyber Phishing Encountered


by the Respondents as to Vishing Phishing 49

14 The Action Taken by the Victims in Terms


of Legal Actions 50

15 The Action Taken by the Victims in Terms


of Personal Actions 52

16 Significant Relationships between Age and


Types of Cyber Phishing 53

17 Significant Relationships between Sex and


Types of Cyber Phishing 54

18 Significant Relationships between Position


or Rank and Types of Cyber Phishing 56

19 Significant Relationships between Family


Income and Types of Cyber Phishing 57

20 Significant Relationships between Length


of Service and Types of Cyber Phishing 58
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
16
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CHAPTER 1

The Problem and Its Background

Introduction

People in this generation are aware of the benefits of

using the internet for numerous activities such as internet

surfing, online shopping, and taking online classes, among

others. A fatal virus known as the Corona Virus or COVID-19

began in Wuhan, China, and quickly spread throughout the

world, causing a pandemic. To stop the virus from spreading,

countries all around the world began imposing community

quarantines. Since March 15, 2020, the Philippine national

and local governments have imposed community quarantines to


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
17
CAVITE CAMPUS
General Mariano Alvarez, Cavite
prevent the virus from spreading further. Face-to-face

learning is forbidden, and all schools and institutions have

been closed. However, the government recognizes that

students must be able to continue studying despite the

pandemic, which is why the Department of Education, in

particular, has devised a "blended-learning" program that

combines modular, radio and

television, and electronic or online learning. The

Commission on Higher Education (CHED) refers to it as

"flexible learning," which includes online or e-learning,

which many Philippine schools and universities have used in

the past. This is consistent with President Rodrigo

Duterte’s stated policy of no face-to-face classes until an

anti-COVID vaccination is discovered. This conduct exposes

people, particularly students, to cyber phishing. Phishing

is the technique of sending phony emails that appear to come

from a trusted source. Email is the most commonly used

method of communication. The purpose is to steal sensitive

information such as credit card and login information or to

infect the victim's computer with malware.

People who frequently browse the internet are possibly

victims of cybercriminals. They may be manipulated by the


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
18
CAVITE CAMPUS
General Mariano Alvarez, Cavite
criminals to provide their personal information. Simply by

clicking on harmful links or attachments and accidentally

downloading malware to their personal computer, it is

possible to lead to the taking and spreading of personal

information. As the number of people using the internet

grows cyber-criminals may be taking advantage of this

situation.

This study was focused on determining the level of

victimization of teachers and employees of educational

institutions by cyber phishing. This study also analyzed the

level of awareness of teachers and educators about cyber

phishing and its effects.

Theoretical Framework

According to this theory, Moral Disengagement and

Social Learning Theories are the most popular theories used

to explain what attracts cybercriminals to commit their

criminal activities (Rogers, 2006). That supports conformity

to existing norms.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
19
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Routine activity theory, by Cohen and Felson (1979),

emphasizes that crime occurs when three elements converge:

(1) a motivated offender, (2) a suitable target, and (3)

the absence of a capable guardian. This theory includes

the routine activities of both the offender and victim.

the absence of a capable guardian. This theory

includes the routine activities of both


 Demographic and
professional profile
of the respondents the offender and victim.
Age;
Sex;
Position or Rank; Conceptual Framework
Family Income; and
Length of Service
 Means used by the The conceptual framework used the
respondents in online
transaction
Payment; graph input, process, and output. The
Purchase;
Cash Transfer
 Types of cyber researchers aimed to determine if there
phishing encountered
by the respondents was a significant relationship between
Spear Phishing;
Whaling Phishing;
Smishing Phishing; the demographic and professional
Vishing Phishing
INPUT PROCESS OUTPUT
 Actions taken by the
victims
Legal Action;
Personal Action
Data gathering
 Is there a
significant
relationship between Internet
a demographic profile searches
and the types of
cyber phishing?
Conduct of
survey
profiles of Proposed
Tabulation Public
respondents to types of data Information
of cyber phishing. Statistical Drive
treatment of
data
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
20
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Figure 1. Conceptual framework


of the study

A conceptual framework illustrates what you expect to

find through your research. It defines the relevant

variables you have and maps out how they may relate to each

other. The input, method, and outcome of the research

investigation were all included in this research paradigm.

The first graphic depicts the input, which consisted of the

study's variables. The process was depicted in the second

diagram, which showed how the researchers obtained data and

information. The output depicted the intervention program

Feedback
that would serve as the study's outcome.

Statement of the Problem

The study aimed to assess cyber phishing among

teachers and employees of educational institutions in

CarSiGma. Specifically, it aimed to provide answers to the

following questions:

1. What is the demographic and professional profile of

the respondents in terms of:


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
21
CAVITE CAMPUS
General Mariano Alvarez, Cavite
1.1 Age;

1.2 Sex;

1.3 Position or Rank;

1.4 Family Income; and

1.5 Length of Service?

2. What are the means used by the respondents in online

transactions so as to:

2.1 Payment;

2.2 Purchase;

2.3 Cash Transfer?

3. What are the types of cyber phishing encountered by

the respondents as to:

3.1 Spear Phishing;

3.2 Whaling Phishing;

3.3 Smishing Phishing; and

3.4 Vishing Phishing?

4. What are the actions taken by the victims in terms of:


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
22
CAVITE CAMPUS
General Mariano Alvarez, Cavite
4.1 Legal Actions; and

4.2 Personal Action?

5. Is there a significant relationship between

demographic/professional profiles and types of cyber

phishing?

6. Based on the findings, what public information drive

can be proposed and implemented?

Hypothesis

There was no significant relationship between the types

of cyber phishing and the demographic and professional

profiles of respondents.

Scope and Limitation of the Study

The study focused on how cyber phishing attacks usually

involve teachers and employees when the crime was committed.

The study was also focused on evaluating the knowledge of

teachers and employees about cyber phishing.

The researchers conducted the research, particularly in

the CarSiGma and the respondents were teachers and employees

at any school or university. The researchers chose a total


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
23
CAVITE CAMPUS
General Mariano Alvarez, Cavite
of 214 teachers and employees who were victims of cyber

phishing.

Significance of the Study

The study aimed to determine if there was a significant

relationship between the demographic and professional

profile of respondents to types of phishing and to be able

to propose public information drives regarding cyber

phishing to the teachers and employees in CarSiGma.

Student This study is beneficial for the students

because it will help them discover the need to improve in

order to be more prepared and ready when it comes to cyber

phishing. This study will provide knowledge to understand

cyber phishing and will raise to avoid cyberattacks.

Internet User This research is beneficial to all the

internet users who use the internet more often for their own

reasons because this research will give them a heads-up on

the risk of being a victim of cyber phishing that concerns


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
24
CAVITE CAMPUS
General Mariano Alvarez, Cavite
their safety and privacy. Moreover, they will be able to

understand the importance of preparedness when it comes to

cyber phishing. This study will enable them to be aware of

what they should do when they encounter it.

Law enforcer/PNP Cybercrime Division The data could be

used as a reference in cyber phishing, providing awareness,

an overview, and its variants, which range from parents to

students, especially college students. It also provides ways

to prevent cyber phishing and aids the efforts of law

enforcers.

Law Makers The data presented could be used to develop

regulations about cyber phishing that will assist students,

particularly those in college universities, as well as law

enforcement officers, to prevent cyber phishing.

Local Government The data can be used as a resource for

preventing cyber phishing. It contains information and ideas

that will assist local government students, particularly

those in college, in preventing cyber phishing.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
25
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Parents of Students The data has provided information

that may be used as a guide for safer internet or social

media browsing, as well as tools, software, and accounts

that can help prevent cyber phishing.

Criminology Students As for future law enforcement

officers, the data has provided information to enhance

awareness about cyber phishing among college students, as

well as law enforcement efforts to prevent it. It will also

provide ideas for a new way to combat this type of cyber

phishing.

Future Researcher The data can be used in future

research on cyber phishing. It provides information such as

awareness, overview and variants, law enforcement efforts,

and methods to prevent cyber phishing.

Definition of Terms

The following terms are defined operationally and

lexically to provide a common frame of reference:

Awareness The quality or state of being aware:

knowledge and understanding that something is happening or


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
26
CAVITE CAMPUS
General Mariano Alvarez, Cavite
exists promoting a heightened awareness of the problem

seemed to have only a slight awareness of what was going on

and an acute awareness of subtle differences. They hope to

raise awareness about endangered species, which is

encouraging.

Cybercrime A criminal activity that either targets or

uses a computer, a computer network, or a networked device.

Data Connection Used when you are analyzing massive

amounts of data and you need to keep the underlying data in

the database (in-db.) rather than bringing it into

Spotfire’s internal data engine.

Duration of using Smart Phone or Laptop Using a

smartphone or laptop, a person spends a set amount of time

pursuing social media, websites, apps, software, or

accounts.

Duration of using Social Media A specific time of

browsing or using social media websites, apps, software, and

accounts.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
27
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Email Electronic mail is a method of exchanging

messages between people using electronic devices.

Hacker One that hacks, a person who is inexperienced or

unskilled at a particular activity, such as a tennis hacker,

an expert at programming and solving problems with a

computer, or a person who illegally gains access to and

sometimes tampers with information in a computer system.

Internet An electronic communications network that

connects computer networks and organizational computer

facilities around the world is used with the exception of

when being used attributively.

Internet User Individuals or Organizations that use the

internet in any location through computer terminals,

computers, and other devices to access services such as

email and the World Wide Web.

Level of Awareness A person's quality of being aware of

something, especially for crimes such as cyber phishing.

Level of Victimization The rate of being victimized by

a crime like cyber phishing.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
28
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Link A connection between two people, things, or ideas:

There's a direct link between diet and heart disease. Their

links with Mexico are still strong diplomatic links between

the two countries.

Mobile Cellular Phone A mobile telephone is a type of

short-wave analog or digital telecommunication in which a

subscriber has a wireless connection from a mobile phone to

a relatively nearby transmitter.

Personal Computer A multi-purpose computer whose size,

capabilities, and price make it feasible for individual use.

Personal computers are intended to be operated directly by

an end-user rather than by a computer expert or technician.

Philippine National Police Anti Cybercrime Group

Investigates all cybercrimes and other crimes in which

Information and Communications Technology (ICT) is used in

the commission of criminal acts or as the object of attack.

Phishing The fraudulent practice of sending emails

purporting to be from reputable companies to induce

individuals to reveal personal information, such as

passwords and credit card numbers.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
29
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Smishing Phishing This is a form of phishing that uses

mobile phones as the attack platform. The criminal executes

the attack with the intent to gather personal information,

including social insurance and/or credit card numbers.

Smishing is implemented through text messages or SMS.

Spear Phishing Spear phishing is an email or electronic

communications scam targeted at a specific individual,

organization, or business. This is how it works: An email

arrives, apparently from a trustworthy source, but instead,

it leads the unknowing recipient to a bogus website full of

malware.

Vishing Phishing Short for "voice phishing," which

involves defrauding people over the phone, enticing them to

divulge sensitive information

Website A set of related web pages located under a

single domain name, typically produced by a single person or

organization.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
30
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Whaling Phishing Whaling is a highly targeted phishing

attack aimed at senior executives masquerading as a

legitimate email. Whaling is digitally enabled fraud through

social engineering, designed to encourage victims to perform

a secondary action, such as initiating a wire transfer of

funds.

World Wide Web Commonly referred to as WWW, W3, or the

Web—is an interconnected system of public webpages

accessible through the internet. The Web is not the same as

the Internet: the Web is one of many applications built on

top of the internet.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
31
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CHAPTER 2

Review of Related Literature and Studies

This chapter provided and discussed appropriate related

literature and studies, both foreign and local, that will

helped the current study.

Local Literature

According to Devanesan (2020), in the Philippines, the

pandemic has brought out the worst in some opportunists,

and in the virtual realm, it appears phishing attacks are

the cyber weapon of choice. The Philippines has been trying

to enforce legislation on engineered phishing scams for

years now, but with so many Filipinos online all the time
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
32
CAVITE CAMPUS
General Mariano Alvarez, Cavite
during the pandemic, the National Bureau of Investigation’s

Cybercrime Division recorded a 200% increase since the

lockdown started back in March.

According to Omorog and Medina (2017), Filipinos are

susceptible to cyberattacks, particularly phishing and

malware attacks. Also, the majority of the respondents’,

perception of internet security is derivative: they practice

online security measures but with a limited understanding of

their purpose. Therefore, proper education, through training

and awareness, is an effective approach to remedying the

situation.

Macairan’s (2020) online sexual exploitation of

children or OSEC is no longer the number one cybercrime

violation committed in the country during the coronavirus

disease 2019 (COVID-19) pandemic. Based on information

gathered by the Department of Justice Office of Cybercrime

(DOJ-OCC) from March to June, OSEC has been dislodged by

other cybercrime offenses, notably phishing, online selling

scams and the proliferation of information or fake news. “As

of the latest count, there are now more cases in absolute of


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
33
CAVITE CAMPUS
General Mariano Alvarez, Cavite
phishing, online (selling) scams and fake news under the

Bayanihan Law compared to OSEC.”

Fontilla (2020) stated that with the rise of reported

cases of COVID-19 and home quarantine being implemented, the

Internet became a channel for effective human interaction.

Doing most of the work online brought an increasing number

of online fraudsters to exploit the public’s fear of the

pandemic to attack people through cybercrime. It has a list

of some of the cyber security issues that are being faced at

this time. Furthermore, it discusses the forms of attacks

being encountered and lists recommendations on how to be

safe online.

Rotas and Cahapay (2021) stated that a preliminary

study with the aim of testing if threat knowledge influences

protective behaviors of students in the context of cyber

security in remote learning amid the COVID-19 crisis.

Modified questionnaires were used in online surveys with a

sample of students from the teacher education department of

a Philippine university. The results revealed that the

students are somewhat knowledgeable about possible threats

and they sometimes practice protective behaviors in remote


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
34
CAVITE CAMPUS
General Mariano Alvarez, Cavite
learning. This indicates a practical need to heighten

students’ the cyber security.

Foreign Literature

According to Abdelhamid (2020), phishing is a

cybercrime in which the attackers usually impersonate a

trusted source. The attackers usually send an email that

contains a link that allows them to steal the receiver’s

personal information. According to the Federal Bureau of

Investigation’s 2019

Internet crime report, phishing is the number one cybercrime

by victim count.

Akdemir et al. (2021) mentioned that phishing emails

purporting to provide information about the spread of the

disease were the most common type of unsolicited email.

Authority, liking, and commitment emerged as the most common

influence methods. Fear appeals and urgency cues were

present in almost all of the sampled phishing messages.

Finally, the analysis of coronavirus themed phishing emails

revealed a shift in the modus operandi of phishers.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
35
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Korkmaz et al. (2021) stated that recently, cyber-

attacks have increased worldwide, especially during the

pandemic period. The number of connected devices in the

world and the anonymous structure of the internet enable

this security deficit for not only computer networks but

also single computing devices. With the connected use of

computer devices in anytime and anywhere conditions, lots of

real-world activities are transferred to the digital world

by adapting them to new lifestyles. Thus, the concept of

cyber security has become more focused not only for security

admins but also for academicians and researchers. Phishing

attacks, which hackers mostly preferred to use in the last

decade, have become even more harmful because they focus on

the weakest part of the security chain: the computer user.

Therefore, it is extremely important to prevent these cyber-

attacks before they reach users.

According to Stock J. (2020), one of INTERPOL’s private

sector partners, 907,000 spam messages, 737 incidents

related to malware and 48,000 malicious URLs — all related

to COVID-19 were detected between January and April 24,

2020. Concurrently, due to the sudden and necessary global


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
36
CAVITE CAMPUS
General Mariano Alvarez, Cavite
shift to teleworking, organizations have had to rapidly

deploy remote systems, networks, and applications. As a

result, criminals are taking advantage of the increased

security vulnerabilities arising from remote work to steal

data, generate profits, and cause disruption. In light of

these events, INTERPOL’s Cybercrime Directorate produced

this Global Assessment. The report on COVID-19 related

cybercrime is based on its unique access to data from 194

member countries and private partners to provide a

comprehensive overview of the cybercrime landscape amid the

pandemic. The report is based on data collected from member

countries and INTERPOL private partners as part of the

INTERPOL Global Cybercrime Survey conducted from April to

May 2020. In total, 48 out of 194 member countries responded

to the survey, and 4 out of 13 private partners contributed

their data to the report. By deploying COVID-19 themed

phishing emails, often impersonating government and health

authorities, cyber criminals entice victims into providing

their personal data and downloading malicious content.

Online Fraud and Phishing: around two-thirds of member

countries that responded to the survey reported a


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
37
CAVITE CAMPUS
General Mariano Alvarez, Cavite
significant use of COVID-19 themes for phishing and online

fraud since the outbreak.

Local Studies

According to the Statista Research Department (2021) in

2019, the number of phishing cybercrime incidents in the

Philippines was highest for those within the National

Capital Region, amounting to approximately 58.2 thousand

victims. Phishing cyberattacks also occur more frequently.

Señora, F. (2020) mentioned that during the COVID-19

Pandemic,” National Bureau of Investigation NBI-Cyber Crimes

Division (NBI-CCD) reports of phishing cases to the agency

have increased by more than 200%. The NBI-CCD only had

around 30 phishing cases before the COVID-19 outbreak, but 3

weeks into the pandemic, they had an additional 70 cases. He

explained that people’s being on their computers during the

quarantine period has become an “opportunity for attack.”

Phishing and online selling scams are punishable under

Republic Act No. 10175 or the Cybercrime Prevention Act of

2012. Online misinformation is penalized by RA 11469 or the

Bayanihan to Heal as One Act.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
38
CAVITE CAMPUS
General Mariano Alvarez, Cavite
According to Malasig, J. (2020), phishing pertains to

cybercrime in which a victim is contacted through e-mail,

telephone or text message by someone posing as a legitimate

institution to trick them into sharing sensitive data such

as credit card details and account passwords.

Guevarra (2020) mentioned that “It is expected that

during these pandemic times, where direct personal

interactions are reduced, more crimes will be committed in

cyberspace. It is therefore imperative that law enforcement

agencies beef up their cybercrime units, upgrade their

technologies and enhance their investigative capabilities.”

Foreign Studies

According to "Analysis of Student Vulnerabilities to

Phishing", Bailey et al. (2018) findings revealed that while

students are unlikely to provide personal information in

response to an email request, they can be easily tricked by

numerous other tactics. This paper reports the findings of

the study in addition to listing suggested points to include


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
39
CAVITE CAMPUS
General Mariano Alvarez, Cavite
in classroom discussions on phishing. Education is the most

powerful tool available for combating the growing phishing

threat and student vulnerability. Phishing attacks were

responsible for $3.2 billion in losses during 2007 and the

number of attacks is increasing daily. According to the

United States Computer Emergency Readiness Team, phishing

was the top security threat during the first quarter of

2007, comprising 48% of all reported incidents. The purpose

of this study was to identify the level of student awareness

related to specific phishing tactics.

According to Senthilkumar et al. (2017), the aim of the

study is to analyze the awareness of cyber security among

college students in Tamil Nadu by focusing on various

security threats on the internet. In recent years,

cybercrime has become an enormous challenge in all areas,

including national security, public safety, and personal

privacy. To prevent becoming a victim of cybercrime,

everyone must know about their own security and safety

measures to protect themselves. A well-structured

questionnaire survey method will be applied to analyze the

college students’ awareness in the area of cyber security.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
40
CAVITE CAMPUS
General Mariano Alvarez, Cavite
This survey will be conducted in major cities in Tamil Nadu

by focusing on various security threats like email, viruses,

phishing, fake advertisements, pop-up windows, and other

attacks on the internet. This survey examines the college

student’s awareness and level of awareness about security

issues, and some suggestions are set forth to overcome these

issues.

Alejandra Diaz et al. (2019) delivered phishing attacks

to 450 randomly selected students on three different days

(1,350 students total) to examine user click rates and

demographics among UMBC’s undergraduates. Participants were

initially unaware of the study. We deployed the billing

problem, contest winner, and expiration date phishing

tactics. Experiment 1 impersonated banking authorities;

Experiment 2 enticed users with monetary rewards; and

Experiment 3 threatened users with account cancellation. We

found correlations resulting in lowered susceptibility based

on college affiliation, academic year progression, cyber

training, involvement in cyber clubs or cyber scholarship

programs, time spent on the computer, and age demographics.

We found no significant correlation between gender and


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
41
CAVITE CAMPUS
General Mariano Alvarez, Cavite
susceptibility. Contrary to our expectations, we observed a

reverse correlation between phishing awareness and student

resistance to clicking. Students who identified themselves

as understanding the definition of phishing had a higher

susceptibility rate than did their peers who were merely

aware of phishing attacks, with both groups having a higher

susceptibility rate than those with no knowledge whatsoever.

Approximately 70% of survey respondents who opened a

phishing email clicked on it, with 60% of student having

clicked overall.

According to Lallie (2021), cyber-attacks are analyzed

and considered within the context of key global events to

reveal the modus operandi of cyber-attack campaigns. The

analysis shows how, following what appeared to be large gaps

between the initial outbreak of the pandemic in China and

the first COVID-19 related cyber-attack, attacks steadily

became much more prevalent to the point that on some days,

three or four unique cyber-attacks were being reported. The

analysis proceeds to utilize the UK as a case study to

demonstrate how cyber criminals leveraged salient events and


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
42
CAVITE CAMPUS
General Mariano Alvarez, Cavite
governmental announcements to carefully craft and execute

cybercrime campaigns.

According to Bernardi Pranggono et al. (2020), during

the pandemic, cyber criminals and Advanced Persistent Threat

(APT) groups have taken advantage of targeting vulnerable

people and systems. This paper emphasizes that there is a

correlation between the pandemic and the increase in cyber-

attacks targeting vulnerable sectors. In addition, the

growth in anxiety and fear due to the pandemic is increasing

the success rate of cyberattacks.

Synthesis

The review of literature and studies gave light to this

research endeavor. The work of Akdemir et al. (2021),

Korkmaz et al. (2021), Stock (2020), Devanesan (2020),

Omorog and Medina (2020), Fontilla (2020), and Abdelhamid

(2020), gave the researchers ideas and information for the

conduct of the study. While the study of Statista Research

Department (2021), Elsevier (2021), Señora, F. (2020),

Guevarra (2020), Bernardi Pranggono et al. (2020), there was

a similarity in the concept and variables that the

researchers have taken into account. The studies and


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
43
CAVITE CAMPUS
General Mariano Alvarez, Cavite
literature mentioned above have similar objectives to the

current study. And the connection between the related

literature and studies to the present study was that since

the pandemic, cyber-attacks, particularly cyber phishing,

have occurred more often, especially on teachers and

employees.

CHAPTER 3

Methodology
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
44
CAVITE CAMPUS
General Mariano Alvarez, Cavite
This chapter presented the research design, population

and sampling of the study, research instrumentation, data-

gathering procedure, and statistical treatment of data that

used in the study.

Research Design

This study utilized a descriptive research method to

determine if there was a significant relationship between

the demographic and professional profiles of respondents in

terms of types of cyber phishing among the teachers and

employees in CarSiGma. This research aimed to describe the

nature of the situation as it existed at the time of the

study and to explore the causes of a particular phenomenon.

This type of research allowed for a variety of methods to

recruit participants, collect data, and utilize various

methods of instrumentation to be able to determine the means

used by the respondents in online transaction; the types of

cyber phishing encountered by the respondents, the actions

taken by the victims; and significant relationships between

demographic and professional profiles in the types of cyber

phishing.

Population and Sampling


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
45
CAVITE CAMPUS
General Mariano Alvarez, Cavite
This study employed the convenience sampling technique,

a type of non-probability sampling that involved the sample

being drawn from the part of the population that is close to

hand. The researchers used it because it was convenient for

respondents. This research would intend to figure out if

there was a significant relationship between the demographic

and professional profiles of respondents and types of cyber

phishing in the CarSiGma.

Table 1
The Distribution of Respondents

Educational Population Sample Percentage


Institution
STI Carmona
Campus 63 54 85.71
Cavite State
University Silang
Campus 134 54 40.3
University of
Perpetual Help
System G.M.A. 250 53 21.2
EARIST Cavite
Campus 84 53 63.1
TOTAL 214
It can be gleaned from this table that there were 54

respondents from the STI Carmona Campus and the Cavite

State University Silang Campus. There were 53 respondents

from the University of Perpetual Help System, GMA Campus,


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
46
CAVITE CAMPUS
General Mariano Alvarez, Cavite
and EARIST Cavite Campus. It also showed that there were

214 respondents in total.

Respondents of the Study

This study was composed of teachers and employees who

were willing and available to be respondents.

The selected respondents were teachers and employees

of CarSiGma from EARIST Cavite Campus, University of

Perpetual Help G.M.A Cavite, STI Carmona, and the Cavite

State University of Silang who were victims of cyber

phishing. There were a large number of teachers and

employees living in CarSiGma. They were chosen since they

are teaching online classes which are vulnerable to

cyberattacks.

Research Instrument

The main tool in this study was that the researchers

made a survey questionnaire via Google Forms which was

approved by their adviser. The survey questionnaire was

composed of four parts. First, the demographic and

professional profiles of the respondents were gathered as to

their optional name, age, sex, position or rank, family


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
47
CAVITE CAMPUS
General Mariano Alvarez, Cavite
income, and length of service. Second was the set of

questions regarding the means used by the respondents in

online transactions as to payment, purchase, and cash

transfer. The third part was the types of cyber phishing

encountered by the respondents, such as: spear phishing,

whaling phishing, smishing phishing, and vishing phishing.

And the last part was the actions taken by the victims in

terms of legal action and personal action.

Data Gathering Procedures

In gathering the data, the researchers made a survey

questionnaire via Google form. The survey questionnaire was

approved by their thesis adviser. The researchers made the

survey questionnaire and approached the head of educational

institutions to ask for permission to have an online survey.

After approval, the researchers decided to distribute the

questionnaires through a direct message in Messenger and

posted a link to the questionnaire on various social media

networks. The respondents answered the questionnaire for 24

hours after sending the link. For recommendation and

evaluation, the survey questionnaire was analyzed and

tabulated for 7 to 10 days.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
48
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Statistical Treatment of Data

To answer sub-problem no. 1, the researchers used

frequency, percentage, and rank to interpret the demographic

and professional profiles of the respondents.

Frequency The number of occurrences of a repeating

event per unit of time.

Percentage Used to determine the profile of the

respondents and the response to each question provided in

the survey questionnaire.

The Formula of percentage is where:

P=f/n x 100

P=percentage

n=total number of respondents f=frequency

To answer sub-problem nos. 2,3, and 4, which were the

means used by respondents, the types of cyber phishing

encountered by the respondents, and the actions taken by the

respondents. To interpret the assessment of this study the

weighted mean, chi-square and rank were used and utilized.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
49
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Weighted mean The most common type of average, where

each data point contributes more than the others. The

researchers used this formula to get the average mean of the

respondent’s answers to problems no. 3 and 4, which were the

types of cyber phishing encountered by the respondents as to

spear, whaling, smishing and vishing phishing and the

actions taken by the victims in terms of legal and personal

actions.

Weighted Mean Formula:

where:

v is the repeating value

w is the number of occurrences of x (weight)

x̄ is the weighted mean

Rank It is used to show the chronological sequence of

the findings of a study.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
50
CAVITE CAMPUS
General Mariano Alvarez, Cavite
To answer sub-problem no.1, the demographic and

professional profiles of respondents.

Chi-square This is a test of the difference between the

observed and expected frequencies. It was used to determine

the types of cyber phishing encountered by the respondents,

which was problem no. 4 of this study.

Formula for Chi-square:


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
51
CAVITE CAMPUS
General Mariano Alvarez, Cavite

CHAPTER 4

Presentation, Analysis, and

Interpretation of Data

Sub-problem No. 1. What are the demographic and

professional profiles of the respondents in terms of:

1.1 Age

Table 2

Age Frequency Percent Rank


18-23 years old 3 1.4 7
24-29 years old 30 14.0 4
30-35 years old 78 36.4 1
36-41 years old 50 23.4 2
42-47 years old 36 16.8 3
48-53 years old 11 5.1 5
54-59 years old 5 2.3 6
60 and above 1 0.5 8
Total 214 100.0
The Frequency and Percentage Distribution of Respondents as
to Age

Table 2 showed that most of the respondents were 30 to

35 years old with a total of 78 respondents which equals

36.4 percent. Rank number 2 was respondents from ages 36 to

41 years old with a total of 50 respondents which equals

23.4 percent. The least number of respondents were from the


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
52
CAVITE CAMPUS
General Mariano Alvarez, Cavite
age group of 60 and above with a total of 1 respondent

which equals 0.5 percent.

1.2 Sex

Table 3
The Frequency and Percentage Distribution of Respondents as
to Sex
Sex Frequency Percent Rank
Male 101 47.2 2
Female 113 52.8 1
Total 214 100.0

Table 3 showed that most of the respondents were

female with a total of 113 respondents which equals 52.8

percent. Followed by male respondents with a total of 101

respondents which equals 47.2 percent.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
53
CAVITE CAMPUS
General Mariano Alvarez, Cavite
1.3 Position or Rank

Table 4
The Frequency and Percentage Distribution of Respondents as
to Position/Rank

Position/Rank Frequency Percent Rank


Instructor 1 43 20.1 2
Instructor 2 27 12.6 4
Instructor 3 33 15.4 3
Assistant Professor 1 10 4.7 6
Assistant Professor 2 49 22.9 1
Assistant Professor 3 16 7.5 5
Assistant Professor 4 7 3.3 9
Associate Professor 1 8 3.7 7.5
Associate Professor 2 3 1.4 11.5
Associate Professor 3 5 2.3 10
Associate Professor 4 3 1.4 11.5
Associate Professor 5 2 0.9 13
Staff 8 3.7 7.5
Total 214 100.0

It was shown in Table 4 that most of the respondents

were working as assistant professor 2 with a total of 49

respondents which equals 22.9 percent. Rank number 2 were

respondents working as instructor 1 with a total of 43

respondents which equals 20.1 percent and the least


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
54
CAVITE CAMPUS
General Mariano Alvarez, Cavite
respondents were working as associate professor 5 with a

total of 2 respondents which equals 0.9 percent.

1.4 Family Income

Table 5
The Frequency and Percentage Distribution of Respondents as
to Family Income (Monthly)
Monthly Family Income Frequency Percent Rank
Below 10,000 1 0.5 6
10,000 to 15,000 30 14.0 5
15,000 to 20,000 64 29.9 1
20,000 to 25,000 36 16.8 3.5
25,000 to 30,00 47 22.0 2
Above 30,000 36 16.8 3.5
Total 214 100.0

Table 5 showed that the highest number of respondents

had a monthly family income of 15,000 to 20,000 with a

total of 64 respondents which equals 29.9 percent followed

by 25,000 to 30,000 family income with a total of 47

respondents which equals 22.0 percent. And the least number

of respondents had a monthly family income below 10,000

with a total of 1 respondent which equals 0.5 percent.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
55
CAVITE CAMPUS
General Mariano Alvarez, Cavite

1.5 Length of Service

Table 6
The Frequency and Percentage Distribution of Respondents as
to Length of Service
Length of Service Frequency Percent Rank
Less than 1 year 10 4.7 5
1-3 years 36 16.8 3
4-6 years 111 51.9 1
7-10 years 40 18.7 2
more than 10 years 17 7.9 4
Total 214 100.0

As shown in Table 6, most of the respondents’ length

of service was 4 to 6 years, with a total of 111

respondents which equals 51.9 percent, followed by 7 to 10

years, with 40 respondents which equals 18.7 percent, and

the least respondents’ length of service was less than 1

year, with 10 respondents which equals 4.7 percent.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
56
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Sub-problem No. 2. What are the means used by the

respondents in online transaction as to:

2.1 Payment

Table 7
The Frequency and Percentage Distribution of Respondents as
to Online Transaction Used in Payment
Means of Payment Frequency Percent Rank
Gcash 42 11.4 4
PayMaya 28 7.6 7.5
Google Pay bills 22 5.9 9
Online bank
28 7.6 7.5
transaction
Smart money 34 9.2 6
Dragon pay 35 9.5 5
Wee pay 20 5.4 10
PayPal 49 13.2 2
7/11 Connect 61 16.5 1
Coins.ph (bitcoin) 51 13.8 3
Total 370 100.0

Table 7 showed that the majority of respondents used

7/11 connect as a means of payment in an online transaction

with a total of 16.5 percent, followed by PayPal with 13.2

percent, and the least used online transaction as a means

of payment was Wee Pay with 5.4 percent.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
57
CAVITE CAMPUS
General Mariano Alvarez, Cavite

2.2 Purchase

Table 8
The Frequency and Percentage Distribution of Respondents as
to Online Transaction Used in Purchase
Means of Purchase Frequency Percent Rank
Gcash 33 9.3 6.5
PayMaya 50 14.1 1.5
Google Pay bills 47 13.3 3
Online bank
50 14.1 1.5
transaction
Smart money 33 9.3 6.5
Dragon pay 37 10.5 4
Wee pay 34 9.6 5
PayPal 23 6.5 9
7/11 Connect 26 7.3 8
Coins.ph (bitcoin) 21 5.9 10
Total 354 100.0

Table 8 showed that PayMaya and online bank

transactions were the most used means in online

transactions for purchase with a total of 14.1 percent,

followed by Google Pay bills with 13.3 percent, and the

least used online transaction for purchase was Bitcoin with

5.9 percent.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
58
CAVITE CAMPUS
General Mariano Alvarez, Cavite

2.3 Cash Transfer

Table 9
The Frequency and Percentage Distribution of Respondents as
to Online Transaction Used in Cash Transfer
Means of Cash Transfer Frequency Percent Rank
Gcash 86 24.0 1.5
Paymaya 60 16.7 2
Google Pay bills 8 2.2 9.5
Online bank
86 24.0 1.5
transaction
Smart money 52 14.5 4
Dragon pay 10 2.8 8
Wee pay 21 5.8 5
PayPal 13 3.6 7
7/11 Connect 15 4.2 6
Coins.ph (bitcoin) 8 2.2 9.5
Total 359 100.0

As shown in Table 9 Gcash and online bank transactions

were the most commonly used means of online transactions

for cash transfers. A total of 172 respondents answered

which was equivalent to 24.0 percent, followed by Pay Maya

with 16.7 percent. 16 respondents answered Google Pay and

Bitcoin, which was equivalent to 2.2 percent making this

the least used online transaction in terms of cash

transfer.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
59
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Sub-problem No.3. What are the types of cyber phishing

encountered by the respondents as to:

3.1 Spear Phishing

Table 10
The Types of Cyber Phishing Encountered by the Respondents as
to Spear Phishing
Spear Phishing Weighted VI Rank
Mean

I have received a malicious email,


apparently from an untrustworthy source. 2.83 S 4

I have received an email that persuades


me to click the link provided in the
malicious email. 3.32 S 3

I have received an email that encourages


me to log-in to my bank account on a
specific website. 3.42 S 1

I received a spam email that instructed


me to give my personal information
needed for verification. 3.36 S 2

I was deceived into giving information


to a malicious email, which apparently
came from a suspicious source. 2.81 S 5

Weighted Average Mean 3.15 S

Table 10 showed that the assessment of types of cyber

phishing encountered by the respondents as to spear


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
60
CAVITE CAMPUS
General Mariano Alvarez, Cavite
phishing is as follows: I have received an email that

encourages me to log-in to my bank account on a specific

website with the weighted mean of 3.42 with the verbal

interpretation of “sometimes”, I received a spam email

that instructed me to give my personal information needed

for verification with the weighted mean of 3.36 with the

verbal interpretation of “sometimes”, I have received an

email that persuades me to click the link provided in the

malicious email with the weighted mean of 3.32 with the

verbal interpretation of “sometimes”, I have received a

malicious email, apparently from an untrustworthy source

with the weighted mean of 2.83 with the verbal

interpretation of “sometimes”. Lastly, I was deceived into

giving information to a malicious email, which apparently

came from a suspicious source with a weighted mean of 2.81

and the verbal interpretation of “sometimes”. The general

weighted average mean was 3.15 with a verbal interpretation

of “Sometimes”.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
61
CAVITE CAMPUS
General Mariano Alvarez, Cavite

3.2 Whaling Phishing

Table 11
The Types of Cyber Phishing Encountered by the Respondents as
to Whaling Phishing
Whaling Phishing Weighted VI Rank
Mean

My institution was targeted by whale


phishing specifically that the
administration staff received a 3.23 S 4
malicious email.

I have been encouraged to take


secondary actions such as initiating a
wire transfer fund. 3.17 S 5

The senior executives at my institution


have received an email that appears to
be masquerading as a legitimate email. 3.57 O 1

My institution’s system has been


infected by malware due to an email
apparently a whaling phishing attack. 3.54 O 2

The finance office of my institution


was attacked by whale phishing through
malicious emails masquerading as
legitimate emails. 3.42 S 3
Weighted Average Mean 3.39 S
Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-
3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
62
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Table 11 showed that the assessment of types of cyber

phishing encountered by the respondents as to whaling

phishing were as follows: The senior executives at my

institution have received an email apparently masquerading

as a legitimate email with a weighted mean of 3.57 with the

verbal interpretation of “often”, and My institution’s

system has been infected by malware due to an email

apparently a whaling phishing attack with a weighted mean

of 3.54 with the verbal interpretation of “often”, The

finance office of my institution was attacked by whale

phishing through malicious emails masquerading as

legitimate emails with the weighted mean of 3.42 with the

verbal interpretation of “sometimes”, My institution was

targeted by whale phishing specifically that the

administration staff received a malicious email with the

weighted mean of 3.23 with the verbal interpretation of

“sometimes”. Lastly, I have been encouraged to take

secondary actions such as initiating a wire transfer fund

with a weighted mean of 3.17 with the verbal interpretation

of “sometimes”. Whaling phishing got a general weighted

average mean of 3.39 which is interpreted as “Sometimes”.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
63
CAVITE CAMPUS
General Mariano Alvarez, Cavite

3.3 Smishing Phishing

Table 12
The Types of Cyber Phishing Encountered by the Respondents as
to Smishing Phishing
Smishing Phishing Weighted VI Rank
Mean

I received suspicious text messages


from an unknown number. 3.76 O 4

I received a text message instructing


me to give my personal information,
which was said to be used for 3.78 O 3
security matters.

I received a text message that I


needed to give my bank account
password to claim a prize for a raffle 3.85 O 2
promo.

I have seen news articles about


victims who received suspicious text
messages from an unknown number and
were deceived into giving sensitive
information. 3.93 O 1

I was deceived into giving sensitive


information to suspicious text
messages from an unknown number. 3.52 O 5
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
64
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Weighted Average Mean 3.77 O

Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-


3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never

Table 12 showed that the assessment of types of cyber

phishing encountered by the respondents as to smishing

phishing were as follows: I have seen news articles about

victims who received suspicious text messages from an

unknown number and were deceived into giving sensitive

information with the weighted mean of 3.93 with the verbal

interpretation of “often”, I received a text message that I

needed to give my bank account password to claim a prize

for a raffle promo with the weighted mean of 3.85 with the

verbal interpretation of “often”, I received a text message

instructing me to give my personal information, which was

said to be used for security matters with the weighted mean

of 3.78 with the verbal interpretation of “often”, I

received suspicious text messages from an unknown number

with the weighted mean of 3.76 with the verbal

interpretation of “often”. Lastly, I was deceived into

giving sensitive information to suspicious text messages

from an unknown number with a weighted mean of 3.52 and a

verbal interpretation of “often”. The teachers and


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
65
CAVITE CAMPUS
General Mariano Alvarez, Cavite
employees rated their cyber phishing encountered in terms

of smishing phishing with a weighted mean of 3.77 on

“Often”.

3.4 Vishing Phishing

Table 13
The Types of Cyber Phishing Encountered by the Respondents as
to Vishing Phishing
Vishing Phishing Weighted VI Rank
Mean

I received a call about my bank


account that someone was trying to 3.32 S 3
access.
I received a call that I should
transfer my money to another bank. 3.20 S 4

Someone called my number and


encouraged me to give my personal
information, which was apparently used 3.14 S 5
as a fraud.
I answered a call from an unregistered
number that asked for my bank account
password. 3.46 S 2
I have shared my personal information
with an unknown caller. 3.99 O 1
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
66
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Weighted Average Mean 3.42 S

Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-


3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never
Table 13 showed that the assessment of types of cyber

phishing encountered by the respondents as to vishing

phishing were as follows: I have shared my personal

information with an unknown caller mean 3.99 with the

verbal interpretation of “often”, and I answered a call

from an unregistered number that asked for my bank account

password with the weighted mean 3.46 with the verbal

interpretation of “sometimes”, I received a call about my

bank account that someone was trying to access with the

weighted mean 3.32 with the verbal interpretation of

“sometimes”, I received a call that I should transfer my

money to another bank with the weighted mean 3.20 with the

verbal interpretation of “sometimes”. Lastly, someone

called my number and encouraged me to give my personal

information, which was apparently used as a fraud 3.14 with

the verbal interpretation of “sometimes” with the overall

weighted mean of 3.42 which means “Sometimes”.

Sub-problem No. 4. What are the actions taken by the


victims in terms of:
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
67
CAVITE CAMPUS
General Mariano Alvarez, Cavite
4.1 Legal Actions
Table 14
The Action Taken by the Victims in Terms of Legal Actions
Legal Action Weighted VI Rank
Mean

I reported the incident to my bank’s


authorities. 3.82 O 1

I reported the incident to the local


authorities in my area. 3.64 O 2

I reported the incident to the PNP


anti-cybercrime group. 2.83 S 4

I reported the incident to the NBI


anti-cybercrime division. 2.77 S 5

I am ready to file a lawsuit once the


culprit is identified. 3.05 S 3

Weighted Average Mean 3.22 S

Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-


3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never

Table 14 showed that the assessment of the actions taken

by the victims in terms of legal actions was as follows: I

reported the incident to my bank’s authorities with a

weighted mean of 3.82 and a verbal interpretation of

“often”. I reported the incident to the local authorities

in my area with a weighted mean of 3.64 and a verbal

interpretation of “often”. I reported the incident to the

PNP anti-cybercrime group with a weighted mean of 2.83 and

a verbal interpretation of “sometimes”. I reported the

incident to the NBI anti-cybercrime division with a


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
68
CAVITE CAMPUS
General Mariano Alvarez, Cavite
weighted mean of 2.77 and a verbal interpretation of

“sometimes”. I am ready to file a lawsuit once the culprit

is identified with a weighted mean of 3.05 and a verbal

interpretation of “Sometimes”.

4.2 Personal Actions

Table 15
The Action Taken by the Victims in Terms of Personal Actions
Personal Action Weighted VI Rank
Mean

I posted what I had experienced on


social media so that other people
would be aware of phishing. 3.73 O 5
I changed my passwords and secured my
financial accounts. 4.25 O 1.5

I blocked the user who contacted me


and initiated the phishing attack. 4.14 O 3.5
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
69
CAVITE CAMPUS
General Mariano Alvarez, Cavite
After experiencing a phishing attack,
I am more vigilant than before.
4.14 O 3.5

I always check the source before


giving important information. 4.25 O 1.5

Weighted Average Mean 4.10 O

Legend: 4.50-5.0= (A) Always, 3.50-4.49= (O) Often, 2.50-


3.49=(S) Sometimes, 1.50-2.49=(R) Rarely 1.01.49 = (N)
Never
Table 15 showed that the assessment of the actions

taken by the victims in terms of personal actions was as

follows: I posted what I had experienced on social media so

that other people would be aware of phishing with a

weighted mean of 3.73 and a verbal interpretation of

“often”. I changed my passwords and secured my financial

accounts with a weighted mean of 4.25 and a verbal

interpretation of “often”. I blocked the user who contacted

me and initiated a phishing attack with a weighted mean of

4.14 and a verbal interpretation of “often”. After

experiencing of a phishing attack, I am more vigilant than

before with a weighted mean of 4.14 and a verbal

interpretation of “often”. I always check the source before

giving important information with a weighted mean of 4.25

and a verbal interpretation of “Often”.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
70
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Sub-problem No. 5. Is there a significant relationship

between demographic profile and types of cyber phishing:

Table 16
Significant Relationships between Age and Types of Cyber
Phishing
Relationship X2 df p- Decision Interpretation
between age and value
types of cyber
phishing
Age vs Spear
Phishing 65.099 32 0.000 Reject Significant
Age vs Whaling
Phishing 77.930 32 0.000 Reject Significant

Age vs Smishing
Phishing 36.646 32 0.262 Accept Not Significant

Age vs Vishing
Phishing 86.653 32 0.000 Reject Significant
Legend: df (32) =43.773
Table 16 showed that the X2 computed value of age and

smishing phishing was 36.646 with a p-value of 0.262, which

was less than the X2 tabular value of 43.773 at a 0.05 level

of significance with 32 degrees of freedom. The null

hypothesis was accepted. This means that there was no

significant relationship between a demographic profile and

the types of cyber phishing. The X2 computed value of age

and spear phishing was 65.099 with a p-value of 0.000, age

and whaling phishing was 77.930 with a p-value of 0.000,

and age and vishing phishing was 86.653 with a p-value of


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
71
CAVITE CAMPUS
General Mariano Alvarez, Cavite
0.000, which was greater than the X2 tabular value of 43.773

at 0.05 level of significance with 32 degrees of freedom,

the null hypothesis was rejected. This means that there was

a significant relationship between a demographic profile

and the types of cyber phishing.

Table 17
Significant Relationships between Sex and Types of Cyber
Phishing
Relationship X2 df p- Decision Interpretation
between sex and value
types of cyber
phishing
Sex v Spear
Phishing 33.334 12 0.001 Reject Significant

Sex vs Whaling
Phishing 40.371 12 0.000 Reject Significant

Sex vs Smishing
Phishing 15.375 12 0.222 Accept Not Significant

Sex vs Vishing
Phishing 21.312 12 0.045 Reject Significant

Legend: df (12) =21.026


Table 17 showed that the X2 computed value of sex and

smishing phishing was 15.375 with a p-value of 0.222, which

was less than the X2 tabular value of 43.773 at a 0.05 level

of significance with 12 degrees of freedom. The null

hypothesis was accepted. This means that there was no

significant relationship between a demographic profile and


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
72
CAVITE CAMPUS
General Mariano Alvarez, Cavite
the types of cyber phishing. However, the X 2 computed value

of sex and spear phishing was 33.334 with a p-value of

0.001, sex and whaling phishing was 40.371 with a p-value

of 0.000, and sex and vishing phishing was 21.312 with a p-

value of 0.045, which was greater than the X 2 tabular value

of 43.773 at 0.05 level of significance with 12 degrees of

freedom, the null hypothesis was rejected. This means that

there was a significant relationship between a demographic

profile and the types of cyber phishing.

Table 18
Significant Relationships between Position or Rank and Types
of Cyber Phishing
Relationship X2 df p- Decision Interpretation
between position value
or rank and
types of cyber
phishing
Position or Rank
vs Spear 89.696 48 0.000 Reject Significant
Phishing
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
73
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Position or Rank
vs Whaling
Phishing 138.877 48 0.000 Reject Significant

Position or Rank
vs Smishing
Phishing 78.891 48 0.003 Reject Significant

Position or Rank
vs Vishing
Phishing 88.294 48 0.000 Reject Significant
Legend: df (48) =67.50

Table 18 showed that the X2 computed value of position

or rank and spear phishing was 89.696 with a p-value of

0.000, position or rank and whaling phishing was 138.877

with a p-value of 0.000, position or rank and smishing

phishing was 78.891 with a p-value of 0.003, and position

or rank and vishing phishing was 88.294 with a p-value of

0.000 was greater than the X2 tabular value of 67.50 at 0.05

level of significance with 48 degrees of freedom, the null

hypothesis was rejected. This means that there was a

significant relationship between a demographic profile and

the types of cyber phishing.

Table 19
Significant Relationships between Family Income and Types of
Cyber Phishing
Relationship X2 df p- Decision Interpretation
between family value
income and types
of cyber phishing
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
74
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Family Income vs
Spear Phishing 92.805 20 0.000 Reject Significant

Family Income vs
Whaling Phishing 33.282 20 0.031 Reject Significant

Family Income vs
Smishing Phishing 59.625 20 0.000 Reject Significant

Family Income vs
Vishing Phishing 69.001 20 0.000 Reject Significant

Legend: df (20) =31.410


Table 19 showed that the X2 computed value of family

income and spear phishing was 92.805 with a p-value of

0.000, family income and whaling phishing was 33.282 with a

p-value of 0.031, family income and smishing phishing was

59.625 with a p-value of 0.000, and family income and

vishing phishing was 69.001 with a p-value of 0.000, which

was greater than the X2 tabular value of 31.40 at 0.05 level

of significance with 20 degrees of freedom, the null

hypothesis was rejected. This means that there was a

significant relationship between a demographic profile and

the types of cyber phishing.

Table 20
Significant Relationships between Length of Service and Types
of Cyber Phishing
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
75
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Relationship X2 df p- Decision Interpretation
between length of value
service and types
of cyber phishing
Length of Service
vs Spear Phishing 19.195 16 0.259 Accept Not Significant

Length of Service
vs Whaling
Phishing 34.925 16 0.004 Reject Significant

Length of Service
vs Smishing
Phishing 29.930 16 0.018 Reject Significant

Length of Service
vs Vishing
Phishing 20.726 16 0.189 Accept Not Significant
Legend: df (16) =26.296

Table 20 showed that the X2 computed value of the

length of service and spear phishing was 19.195 with a p-

value of 0.259, Length of Service and length of service and

vishing phishing was 20.726 with a p-value of 0.189, which

was greater than the X2 tabular value of 26.296 at 0.05

level of significance with 16 degrees of freedom. The null

hypothesis was accepted. This means that there was no

significant relationship between a demographic profile and

the types of cyber phishing. However, the X2 computed value

of whaling phishing was 34.925 with a p-value of 0.004,

length of service and smishing phishing was 29.930 with a

p-value of 0.018, which was greater than the X2 tabular


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
76
CAVITE CAMPUS
General Mariano Alvarez, Cavite
value of 26.296 at 0.05 level of significance with 16

degrees of freedom, and the null hypothesis was rejected.

This means that there was a significant relationship

between a demographic profile and the types of cyber

phishing.

Sub-problem No. 6. Based on findings, what public

information drive can be proposed and implemented:

The proposed public information drive title is “Cyber

phishing prevention and awareness campaign” and the

persons, institutions and organizations responsible are,

the PNP anti-cybercrime division, the NBI anti-cybercrime

unit, and local government units. The objective of this

public information drive is to strengthen the knowledge of

the public in the prevention of cyber phishing

victimization. Also, to raise awareness about cyber

phishing by disseminating information to the public

For the program/project activities, as per information

dissemination flyers, leaflets, info graphs, and other

printed materials would be distributed in public places

around CarSiGma. Also, banners, tarpaulins, and screen

monitor ads will be posted inside or near the banks and


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
77
CAVITE CAMPUS
General Mariano Alvarez, Cavite
financial institutions. The expected outcome of this

program that the citizens of Carmona, Silang, and GMA will

be more vigilant about the types of cyber phishing. The

probability of them being victimized by these cyber-attacks

will decrease.

CHAPTER 5

Summary, Conclusions, and Recommendations


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
78
CAVITE CAMPUS
General Mariano Alvarez, Cavite

This chapter presented a summary of the findings,

conclusions, and recommendations.

Summary

The salient findings of the study were as follows;

1. Demographic and professional profiles of the

respondents

There were 78 respondents between the ages of 30

to 35. There were 113 respondents for females, and as to

their position or rank, there were 49 respondents from

assistant professor 2. In terms of family income, there

were 64 respondents with family incomes ranging from

15,000 to 20,000. And for the length of service there were

111 respondents with a length of 4 to 6 years in service

of teaching.

2. Means used by the respondents in online transaction, as

payment, purchase and cash transfer


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
79
CAVITE CAMPUS
General Mariano Alvarez, Cavite
The method was explained in tables 6,7 and 8 that

61 of the respondents used 7/11 connect as means for

payment in an online transaction, and for purchase there

were 50 respondents to purchase PayMaya and 50 respondents

for the online transaction. And in terms of cash transfer,

there were 86 respondents for using Gcash and 86

respondents for online bank transaction.

3. Types of cyber phishing encountered by the respondents

The assessment of types of cyber phishing

encountered by the respondents was that smishing phishing

was the most often encountered which was explained in

table 12 and as follows; I have seen news articles about

victims who received suspicious text messages from an

unknown number and were deceived into giving sensitive

information.

4. Actions taken by the victims

The assessment of the actions taken by the victims

in terms of legal action was that they had reported the

incident into their bank authorities. While the action

taken by the victims in terms of personal actions was that


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
80
CAVITE CAMPUS
General Mariano Alvarez, Cavite
they posted what they had experienced on social media so

that other people would be aware of phishing.

5. Is there a significant relationship between demographic

or professional profile and types of cyber phishing?

The significant relationship between

demographic/professional profile and types of cyber

phishing were as follows; Age vs. types of cyber phishing;

Age has a significant relationship to spear, whaling, and

vishing while it has no significant relationship to

smishing phishing. Sex vs. types of cyber phishing; Sex

has significant relationship to spear, waling, and vishing

phishing but has no significant relationship to smishing

phishing. Position/Rank vs. types of cyber phishing;

Position and rank had significant relationship to all the

types of cyber phishing. Family income vs. types of cyber

phishing; Family income has a significant relationship to

all the types of cyber phishing. As to length of service

vs. types of cyber phishing; Length of service has a

significant relationship to whaling and smishing but has

no significant

relationship to spear and vishing phishing.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
81
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Conclusions

Based on the findings the following conclusions were

drawn:

1. The researchers concluded that most of the victims

were females because they had a shallow knowledge

about cyber threats including cyber phishing, even

though their family income was between 15 to 20

thousand and they were not tenured in service with a

length of service between 4-6 years.

2. Thus, the most common means of payment used by

respondents in online transaction was 7/11 connect,

which has many options for paying. As to purchase,

the respondents used both PayMaya and online bank

transaction due to the availability of direct

shopping and a dollar currency option. As to cash

transfer, the respondents used both Gcash and online

bank transaction because it is designed for cash

transfers and is easy and convenient to use.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
82
CAVITE CAMPUS
General Mariano Alvarez, Cavite
3. To conclude, smishing phishing was the most

encountered type of cyber phishing by the

respondents. It was because smishing phishing attacks

individuals through text messages and the victims

decide faster especially if there is an expected

prize or a threat.

4. To sum up everything that has been stated, the

victims were more often taking personal action than

legal action. The particular reason for this is that

personal actions are faster than legal actions, which

take a long time.

5. Therefore, the researchers concluded that most of the

demographic profile and types of cyber phishing has a

significant relationship to each other except:

between age and smishing phishing, sex and smishing

phishing, length of service and vishing phishing,

length of service and spear phishing.

6. Through the proposed Cyber Phishing Prevention and

Awareness Campaign, it is expected that the public

individuals will be able to strengthen their

knowledge about cyber phishing and its consequences.

This information is expected to cause noticeable


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
83
CAVITE CAMPUS
General Mariano Alvarez, Cavite
changes in the action of these individuals, they will

be more aware on how to avoid cyber phishing, or at

least minimize its effect on their lives. Similarly,

this information drive is also expected to help

government authorities prevent and fight cyber

phishing. The program activity is expected to convey

pertinent information to the public on cyber phishing

through flyers, leaflets, tarpaulins, screen monitor

ads, and other printed materials.

Recommendations

Based on the findings and conclusions presented, the

following recommendations were suggested.

1. The teachers and employees especially the females

should be more vigilant and cautious about what they

post on social media and they should have more

knowledge about cyber phishing to be able to prevent

them from being victimized.

2. The researchers recommend that they should be more

careful when using their preferred means in online


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
84
CAVITE CAMPUS
General Mariano Alvarez, Cavite
transactions, such as 7/11 connect, where they should

ask the store clerk for assistance, in using PayMaya,

online bank transaction and Gcash, where they should

be meticulous in choosing their password and not

share it with anyone. Verify the website before

entering your account.

3. The researchers recommend that to avoid being a

victim of smishing phishing, do not trust text

messages that came from an unknown number or contact.

Verify the message before giving something.

4. The researchers recommend that it should be customary

to take legal actions such as informing the

authorized officers of the case of cyber phishing

because the P.N.P. and N.B.I. anti-cybercrime

divisions have sufficient capabilities to control and

investigate the case, provide adequate actions in

response to this cybercrime.

5. The researchers recommend that the authorities

conduct a public information drive to inform the

citizens regarding cyber phishing and provide


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
85
CAVITE CAMPUS
General Mariano Alvarez, Cavite
knowledge to minimize or eradicate cyber phishing

victimization.

6. The researchers recommend that the PNP and NBI anti-

cybercrime divisions, in collaboration with local

government units, organize a comprehensive public

awareness campaign on cyber-phishing in the CarSiGMA

community. The campaign should be designed to raise

awareness about the dangers of cyber-phishing and

educate the public on how to protect themselves from

falling victim to this crime. The campaign should

include a variety of information dissemination

methods such as flyers, info graphs, tarpulin, and

screen monitor ads. These materials should be made

available in a variety of languages and formats to

reach a diverse population.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
86
CAVITE CAMPUS
General Mariano Alvarez, Cavite

REFERENCES

A. Thesis/Dissertation

Lallie, H. S., Shepherd, L. A., Nurse, J. R. C., Erola,


A.,Epiphaniou, G., Maple, C., & Bellekens, X.
(2021). Cyber Security in the Age of COVID-19: A
Timeline and Analysis of cyber-crime and Cyber-
attacks During the Pandemic. (Published Master’s
Thesis). Abertay University. Retrieved from
https://doi.org/10.1016/j.cose.2021.102248

Omorog, C. D., & Medina, R. P. (2017). Internet


Security Awareness of Filipinos: A Survey Paper.
International Journal of Computing Sciences
Research. (Unpublished Master’s Thesis). Camarines
Sur Polytechnic Colleges. 1(4), 14-26. doi: 10.
25147/ijcsr.2017.001.1.18.

Senthilkumar, K. & Easwaramoorthy, Sathishkumar.


(2017). A Survey on Cyber Security Awareness Among
College Students in Tamil Nadu. (Unpublished
Master’s Thesis). Vellore Institute of Technology,
Tamil Nadu, India. 042043.
10.1088/1757-899X/263/4/042043.

B. Online Source
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
87
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Abdelhamid (2020). The Role of Health Concerns in
Phishing Susceptibility: Survey Design Study.
Journal of Medical Internet research. Retrieved
from https://pubmed.ncbi.nlm.nih.gov/32364511/.

Akdemir, N. S. Y. (2021). How phishers exploit the


coronavirus pandemic: A content analysis of covid-
19 themed phishing emails - Naci Akdemir, Serkan
Yenal, 2021. SAGE Journals. Retrieved from
https://tinyurl.com/2keata83.

Bailey, Ph.D., Janet L., Mitchell, DBA, Robert B. and


Jensen, Ph.D., Bradley K. (2018) "Analysis of
Student Vulnerabilities to Phishing". AMCIS 2008
Proceedings. 271. Retrieved from http://aisel.
aisnet.org/amcis2008/271

Devanesan, J. (2020). Phishing Scams Dominate the


Philippines Cybercrime Landscape. Tech Wire Asia.
Retrieved from https://tinyurl.com/d9nu63aw

Diaz, A. & Sherman, A. & Joshi, A. (2019). Phishing in


an Academic Community: A Study of User
Susceptibility and Behavior. Cryptologia. 44. 1-
15. 10.1080/01611194.2019.1623343.

Fontanilla, M. V. (2020). Cybercrime Pandemic. Eubios


Journal of Asian and International Bioethics 30
(4):161-165.

Guevarra, M. (2020). Phishing is Top PH cybercrime


During Pandemic – Authorities. Retrieved from
https://www.rappler.com/nation
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
88
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Korkmaz, M. E. Kocyigit, O. K. Sahingoz and Diri, B.


(2021). Phishing Web Page Detection Using N-gram
Features Extracted From URLs," 2021 3rd
International Congress on Human-Computer
Interaction, Optimization and Robotic Applications
(HORA), 2021, pp. 1-6, doi:
10.1109/HORA52670.2021. 9461378

Macairan, E. (2020). Phishing Top Cybercrime During


Quarantine. Philstar.com. Retrieved from https://
shorturl.at/dkmvz.

Malasig, J. (2020). Fake Emails on Netflix Billing


Information are Circulating in the Philippines,
Cyber Security Group Warns. Interaksyon. Retrieved
from https://interaksyon.philstar.com/

Pranggono, B., & Arabo, A. (2020). Covid‐19 Pandemic


Cybersecurity issues. Wiley Online Library.
Retrieved from https:// shorturl.at/jnoTW.

Rotas, E., & Cahapay, M. (2021). Does Threat Knowledge


Influence Protective Behaviors of Students in the
Context of Cyber Security in Remote Learning Amid
COVID-19 Crisis? Journal of Pedagogical Sociology
and Psychology. Retrieved from
https://tinyurl.com/ 25v3ffz9.

Señora, F. (2020). Phishing is Top PH cybercrime


During Pandemic – Authorities. Rappler. Retrieved
from https:// shorturl.at/uOPRV.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
89
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Statista Research Department, & 3, S. (2021).
Philippines: Number of Phishing Incidents by
Region. Statista. Retrieved from
https://www.statista.com/ statistics/1136171

Stock, J. (2020). Interpol Report Shows Alarming rate


of Cyberattacks During COVID-19. INTERPOL.
Retrieved from https://tinyurl.com/4wj8a8p8.

Rogers, M. K. (2006). A social learning theory and


moral disengagement analysis of criminal computer
behavior: An exploratory study. Retrieved from
https://www.researchgate.net/publication/268372997
_A_social_learning_theory_and_moral_disengagement_
analysis_of_criminal_computer_behavior_An_explorat
ory_study.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
90
CAVITE CAMPUS
General Mariano Alvarez, Cavite

APPEDNDIX A

SURVEY QUESTIONNAIRE

Dear Respondents,

The undersigned is currently conducting a thesis


entitled “Cyber pshishing among teachers and employees of
educational institutions in Carsigma: Basis for public
information drive”. In this regard, the undersigned is
requesting for your time in answering the survey
questionnaire in order to generate data for the said study.
Rest assured that any information you will provide shall
only be used for purpose of the study and will be treated
with utmost confidentiality.

Your cooperation in this endeavour will be very much


appreciated. Thank you.

Abbegail Marie T. Arce


Roel M. Francia
Arvin Kyle G. Millan
Karl Justine G. Pagsaligan
Kent Bryan S. Palaubsanon
Researchers
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
91
CAVITE CAMPUS
General Mariano Alvarez, Cavite

Part I. Demographic profile of the respondent.

Privacy Content: I understand and agree that filling out


this form, I am allowing the Researchers to collect, use
and disclose my personal information for the purpose of
their study and store it as necessary for the fulfillment
of the stated purpose in accordance with the applicable
laws, including Data Privacy Act of 2012 and it
implementing rules and regulation. The purpose and extent
of collection, use, sharing and disclose, and the storage
of data subjects’ personal information were clearly stated.

Direction: Kindly select the circle that corresponds to


your answer. All information will be treated with strict
confidentiality.

Name: (optional): ___________________________________

Age: 18-23 years old 24-29 years old 30-35 years old

36-41 years old 42-47 years old 48-53 years old

54-59 years old 60 and above

Sex: Male Female

Position or Rank:

Instructor 1 Assistant Professor 1 Associate Professor 1

Instructor 2 Assistant Professor 2 Associate Professor 2

Instructor 3 Assistant Professor 3 Associate Professor 3

Assistant Professor 4 Associate Professor 4


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
92
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Associate Professor 5

Staff

Family Income (Monthly):

Below 10,000 10,000 to 15,000 15,000 to 20,000

20,000 to 25,000 25,000 to 30,00 Above 30,000

Length of Service:

Less than 1 year 1-3 years 4-6 years

7-10 years more than 10 years

Part II. What are the means used by the respondents in online
transactions?

Direction: Please select the means that you are often using in
online transactions in terms of: paying, purchasing,
transferring cash.

Payment Purchase Cash Transfer

Gcash

Paymaya

Google Paybills

Online bank transaction

Smart money

Dragon pay

Wee pay

PayPal
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
93
CAVITE CAMPUS
General Mariano Alvarez, Cavite
7/11 Connect

Coins.ph (bitcoin)

Others please specify:

Part III. What type of cyber phishing activities you have


encountered?

Direction: Please rate the degree of your occurrence to the


following statements. Select the circle that corresponds to your
answer.

(5) Always (4) Often (3) Sometimes (2) Rarely (1) Never

A. Spear phishing (an email or electronic


communications scam targeted towards a specific
individual, organization or business.)

5 4 3 2 1
1. I have received a malicious email,
apparently from an untrustworthy source.

2. I have received an email that


persuades me to click the link provided in
the malicious email.

3. I have received an email that


encourages me to log-in to my bank account
on a specific website.

4. I received a spam email that


instructed me to give my personal
information needed for verification.

5. I was deceived into giving information


to a malicious email, which apparently
came from a suspicious source.

B. Whaling phishing (a highly targeted phishing attack


aimed at senior executives masquerading as a
legitimate email.)

5 4 3 2 1
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
94
CAVITE CAMPUS
General Mariano Alvarez, Cavite
1. My institution was targeted by whale
phishing specifically that the
administration staff received a malicious
email.

2. I have been encouraged to take


secondary actions such as initiating a
wire transfer fund.

3. The senior executives at my


institution have received an email
apparently masquerading as a legitimate
email.

4. My institution’s system has been


infected by malware due to an email that
appears to be a whaling phishing attack.

5. The finance office of my institution


was attacked by whale phishing through
malicious emails masquerading as
legitimate emails.

C.Smishing Phishing (is a form of phishing that uses


mobile phones as the attack platform.)
5 4 3 2 1
1. I received suspicious text messages
from an unknown number.

2. I received a text message instructing


me to give my personal information, which
was said to be used for security matters.

3. I received a text message that I


needed to give my bank account password to
claim a prize for a raffle promo.

4. I have seen news articles about


victims who received suspicious text
messages from an unknown number and were
deceived into giving sensitive
information.

5. I was deceived into giving sensitive


information to suspicious text messages
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
95
CAVITE CAMPUS
General Mariano Alvarez, Cavite
from an unknown number.

D. Vishing Phishing (is a voice phishing, involves a


malicious caller purporting to be from tech support.)

5 4 3 2 1
1. I received a call about my bank
account that someone was trying to access.

2. I received a call that I should


transfer my money to another bank.

3. Someone called my number and


encouraged me to give my personal
information, which was apparently used as
a fraud.

4. I answered a call from an unregistered


number that asked for my bank account
password.

5. I have shared my personal information


with an unknown caller.

Part IV. What are the actions you have taken when you encountered
cyber phishing?

Direction: Please rate the degree of your occurrence to the


following statements. Select the circle that corresponds to your
answer.

(5) Always (4) Often (3) Sometimes (2) Rarely (1) Never

A. Legal actions
5 4 3 2 1
1. I reported the incident to my bank’s
authorities.
2. I reported the incident to the local
authorities in my area.

3. I reported the incident to the PNP


anti-cybercrime group.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
96
CAVITE CAMPUS
General Mariano Alvarez, Cavite
4. I reported the incident to the NBI
anti-cybercrime division.

5. I am ready to file a lawsuit once the


culprit is identified.

B. Personal actions

5 4 3 2 1
1. I posted what I had experienced on
social media so that other people will be
aware of phishing.

2. I changed my passwords and secured my


financial accounts.

3. I blocked the user who contacted me


and initiated the phishing attack.

4. After experiencing of a phishing


attack, I am more vigilant than before.

5. I always check the source before


giving important information.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
97
CAVITE CAMPUS
General Mariano Alvarez, Cavite

APPENDIX B

LETTER OF INTENT
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
98
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
99
CAVITE CAMPUS
General Mariano Alvarez, Cavite
APPENDIX C

Proposed Public Information Drive

Many individuals in CarSiGma are being victimized by

cyber phishing and one of the main reasons is a lack of

knowledge about these crimes. Therefore, the researchers

would like to propose a public information drive entitled

“Cyber phishing prevention and awareness campaign” to be

conducted by authorities such as the PNP anti-cybercrime

division, the NBI anti-cybercrime unit, and local

government units. The program activity is information

dissemination through flyers, leaflets, info graphs, and

other printed materials that would be distributed in public

places around CarSiGma. Also, banners, tarpaulins, and

screen monitor ads will be posted inside or near the banks

and financial institutions.

The general objective of this public information

drive is to strengthen the knowledge of the public in the

prevention of cyber phishing victimization. Also, to

raise awareness about cyber phishing through disseminating

information to the public.


Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
100
CAVITE CAMPUS
General Mariano Alvarez, Cavite
This program will be conducted within the localities

of Carmona, Silang, and G.M.A., Cavite.

Proposed Public Information Drive

Key Program/ Persons Target Expected


Result Project Involve/ location Outcome
Objective Responsible
Areas
Activities

Cyber -To -Cyber Phishing -PNP anti- -Municipalities


phishing strengthen prevention and of Carmona, -The
cybercrime citizens of
in terms the knowledge awareness division Silang, and
of; of the public campaign GMA. Carmona,
individuals Silang, and
-NBI anti- GMA will be
Spear in the  Information cybercrime more aware
Phishing prevention of dissemination division
cyber of cyber
of flyers and phishing.
Smishing phishing leaflets to -Cyber
Phishing victimization the people. Security
. Also, to officers -The
raise probability
Vishing  Giving info of them
Phishing awareness graphics -Local
about cyber government being
containing victimized
phishing information units
Whaling through by these
Phishing about cyber cyber-
disseminating phishing.
information attacks
and will
conducting  Posting decrease.
seminars. tarpaulin,
banners, and
screen
monitor ads
in key areas
around the
municipality
of CarSiGma.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
101
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Secondary Level:
 General Mariano Alvarez Technical High School
(2012 - 2018)
Primary Level:
 San Gabriel II Elementary School
(2006 - 2012)

SKILLS:
Has good communication skills.
Can work independently or in a team.
Highly motivated and willing to learn.
Versatile and can adopt in any kinds of job.
Can use Microsoft word/PowerPoint/Excel
WORK EXPERIENCE

 Work immersion/On job training at General Mariano Alvarez


Municipal of Police Station. (November-December 2017)

 Factory worker (twister) at Grand Asia lighting corporation


(June – August 2019)

 Special Project for the Employment of Students at General


Mariano Alvarez Municipal town hall. (June 2021-August 2021)

CHARACTER REFERRENCE
Ms. KARIZZA ABOLENCIA Mrs. DORIS F. MAGHIRANG
PROFESSOR, GMATHS PROFESSOR, GMATHS

I hereby certify that the above information is true and


correct to the best of my knowledge and belief.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
102
CAVITE CAMPUS
General Mariano Alvarez, Cavite

ARVIN KYLE G. MILLAN


Researcher

KENT BRYAN S. PALAUBSANON


Blk 8 Lot 161 Barangay Poblacion 5
General Mariano Alvarez, Cavite
kpalaubsanon06@gmail.com
09358102757

PERSONAL INFORMATION
Date of Birth : May 02, 1999
Place of Birth : General Mariano Alvarez, Cavite
Sex : Male
Civil Status : Single
Height : 5’7”
Weight : 65 kls.
Citizenship : Filipino
Religion : Roman Catholic

EDUCATIONAL BACKGROUD
Tertiary Level:
 Eulugio “Amang” Rodriquez Institute of Science
and Technology
(Bachelor of Science in Criminology)
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
103
CAVITE CAMPUS
General Mariano Alvarez, Cavite
(2019 - Present)
Secondary Level:
 General Mariano Alvarez Technical High School
(2012 - 2018)
Primary Level:
 San Gabriel II Elementary School
(2006 - 2012)

Training and Seminars attended:


 Special Program for Employment of Students
(Municipality of the G.M.A)
(2017)
 Work Immersion (Office of the Vice Mayor)
(2018 - 2019)
SKILLS:
Excellent written and communication skills.
Computer literate.
Highly organized and efficient.
Ability to work independently or as part of the team.
WORK EXPERIENCE

 Special Project for the Employment of Students at General


Mariano Alvarez Municipal town hall. (June 2017-August 2018)

 Work immersion/On job training at General Mariano Alvarez


Municipal of Vice Mayor Office. (December-January 2017)

 Factory worker (twister) at Grand Asia lighting corporation


(June – August 2019)

CHARACTER REFERRENCE
Mr. ALVIN REJUSO Mr. LUCKY BOY NOTORIO
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
104
CAVITE CAMPUS
General Mariano Alvarez, Cavite
PROFESSOR, EARIST PROFESSOR, EARIST

I hereby certify that the above information is true and


correct to the best of my knowledge and belief.

_________________________
KENT BRYAN S. PALAUBSANON
Researcher

ROEL M. FRANCIA
Blk 30 Lot 21Paris Street Phase II
San Mariano City Salawag
Dasmariñas, Cavite
franciaroelmecccrim@gmail.com
09707668081

PERSONAL INFORMATION
Date of Birth : July 25, 1999
Place of Birth : San Jose, Camariñes Sur
Sex : Male
Civil Status : Single
Height : 5’7
Weight : 60 kls.
Citizenship : Filipino
Religion : Roman Catholic
EDUCATIONAL BACKGROUD
Tertiary Level:
 Eulugio “Amang” Rodriquez Institute of Science
and Technology
(Bachelor of Science in Criminology)
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
105
CAVITE CAMPUS
General Mariano Alvarez, Cavite
(2019 - Present)
Secondary Level:
 Paliparan II National High School
(2012 - 2016)
 Paliparan III National High School
(2016 - 2018)

Primary Level:
 Pintong Gubat Elementary School
(2006 - 2012)

Training and Seminars attended:


 Webinars about Criminology and Criminal Justice
(2021)
 On the Job Training 1 (Criminology)
(2021)
SKILLS:
Proficient in MS Office Application such as Ms Word.
Excel and Power Point.
Internet and E-mail application.

WORK EXPERIENCE

 Waiter at Taal Vista Hotel. (2022)

 Crew at McDonald’s. (2018-2019)

CHARACTER REFERRENCE
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
106
CAVITE CAMPUS
General Mariano Alvarez, Cavite
Ms.GRACE MORGA Mr.PROCESO PAITON
PROFESSOR, S.H.S PROFESSOR, S.H.S

I hereby certify that the above information is true and


correct to the best of my knowledge and belief.

_________________________
ROEL M. FRANCIA
Researcher

ABBEGAIL MARIE T. ARCE


112 Cong. Road Blk 12 Lot 3 Brgy. Memije
General Mariano Alvarez, Cavite
arceabbegailmarietecccrim@gmail.com
09128324666

PERSONAL INFORMATION
Date of Birth : May 25, 1998
Place of Birth : Manila, Pasay
Sex : Female
Civil Status : Single
Height : 5’3”
Weight : 57 kls.
Citizenship : Filipino
Religion : Roman Catholic
EDUCATIONAL BACKGROUD
Tertiary Level:
 Eulugio “Amang” Rodriquez Institute of Science
and Technology
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
107
CAVITE CAMPUS
General Mariano Alvarez, Cavite
(Bachelor of Science in Criminology)
(2019 - Present)
Secondary Level:
 General Mariano Alvarez Technical High School
(2012 - 2018)
Primary Level:
 San Gabriel II Elementary School
(2006 - 2012)

Training and Seminars attended:


 Webinars about Criminology and Criminal Justice
(2021)
 On the Job Training (CRIMINOLOGY)
(2021)
SKILLS:
Multi-tasking.
Ability to plan and prioritize work.
Hardworking and capable to work multiple task.
I have knowledge in Microsoft Office Application such as:
Microsoft Word
Microsoft PowerPoint
Microsoft Excel

CHARACTER REFERRENCE
Mr. GIAN CARLO VILLAGRACIA Mr. MAT CARPIO
PROFESSOR, GMATHS PROFESSOR, GMATHS
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
108
CAVITE CAMPUS
General Mariano Alvarez, Cavite
I hereby certify that the above information is true and
correct to the best of my knowledge and belief.

_________________________
ABBEGAIL MARIE T. ARCE
Researcher

KARL JUSTINE G. PAGSALIGAN


Sitio Hanupol Kaong, Silang Cavite
pagsaligankarljutineecccrim@gmail.com
09069770152

PERSONAL INFORMATION
Date of Birth : October 14, 1999
Place of Birth : Kaong Silang, Cavite
Sex : Male
Civil Status : Single
Height : 5’8”
Weight : 60 kls.
Citizenship : Filipino
Religion : Roman Catholic
EDUCATIONAL BACKGROUD
Tertiary Level:
 Eulugio “Amang” Rodriquez Institute of Science
and Technology
(Bachelor of Science in Criminology)
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
109
CAVITE CAMPUS
General Mariano Alvarez, Cavite
(2019 - Present)
Secondary Level:
 Philippine Christian University Senior High
School
(2016-2018)
 Kaong National High School
(2012 - 2016)
Primary Level:
 Kaong Elementary School
(2006 - 2012)

Training and Seminars attended:


 Webinars about Criminology and Criminal Justice
(2021)
 On the Job Training (CRIMINOLOGY)
(2021)
SKILLS:
Proficient in MS Office Application such as Ms Word.
Excel and Power Point.
Internet and E-mail application.

CHARACTER REFERRENCE
Mr. RANCEL ERAS Mr. GREG DE LA TONGA
PROFESSOR, PCU PROFESSOR, PCU

I hereby certify that the above information is true and


correct to the best of my knowledge and belief.
Republic of the Philippines
EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY
110
CAVITE CAMPUS
General Mariano Alvarez, Cavite

KARL JUSTINE G. PAGSALINGAN


Researcher

You might also like