Perception of the Business Administration Students on Cybercrime

Embed Size (px)

Citation preview

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    1/20

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    2/20

    Republic Act 10715, or also known as theCybercrime prevention act of 2012 was signedinto law by incumbent Philippine president,Benigno C. Aquino on September 12, 2012 and is

    to take effect on October 3, 2012.

    Sections 4(c)(1-4) and 5 of RA 10175 violate theconstitutional right to freedom of speech, of

    expression and of the press enshrined in ArticleIII, Section 4 of the Constitution, as said sectionsare vague and overbroad.

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    3/20

    On October 9, 2012 the supreme court of thePhilippines issued a 120-dayrestraining order, stopping theimplementation of the Act. On 5 February

    2013, The Supreme Court extended thetemporary restraining order on the law, "untilfurther orders from the court."

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    4/20

    This study intends to investigate the Perception of the BusinessAdministration Students on Cybercrime Law.

    Specifically, this study will seek to answer the followingquestions:

    1. What is the demographic profile of the BusinessAdministration Students of UE, Manila, in terms of:

    1.1 Age 1.2 Gender 2. How does it affect the following:

    2.1 Individual 2.2 Society

    3. What are the Advantages of the Cybercrime Law? The

    disadvantages? 4. What factors or reasons lead to the negative reaction from the

    public to this act?

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    5/20

    The researchers also believed that thefindings of the study would be beneficial tothe following:

    1. Students

    2. Family

    3. Community

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    6/20

    Space Transition Theory from the book Crimesof the Internet (Jaishankar 2008).

    Copyright 2007 International Journal of Cyber Criminology (IJCC) ISSN:0974 2891Vol 1 (2): 79

    http://libguides.usc.edu/content.php?pid=83009&sid=618409

    Social cognitive theory of Albert Bandura Bandura, Albert; Ross, D.; Ross, S. (1961). "Transmission of

    aggression through imitation of aggressive models".Journal ofAbnormal and Social Psychology63: 575582. http://www.actforyouth.net/resources/rf/rf_stages_0504.cfm

    http://libguides.usc.edu/content.php?pid=83009&sid=618409http://libguides.usc.edu/content.php?pid=83009&sid=618409
  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    7/20

    Pi Yong, Comparative Research on Convention onCybercrime and Chinese Relevant Legislation, 2012

    http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDF

    Kristin M. Finklea, Cybercrime: Conceptual Issues for

    Congress and U.S. Law Enforcement, 2013, http://www.fas.org/sgp/crs/misc/R42547.pdf AadvanMoorsel, Research in the Centre for Cybercrime and

    Computer Security, 2010, http://cccs.ncl.ac.uk/sites/default/files/LaunchEvent-

    AadvanMoorsel.pdf

    http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDFhttp://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDFhttp://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDFhttp://www.fas.org/sgp/crs/misc/R42547.pdfhttp://cccs.ncl.ac.uk/sites/default/files/LaunchEvent-AadvanMoorsel.pdfhttp://cccs.ncl.ac.uk/sites/default/files/LaunchEvent-AadvanMoorsel.pdfhttp://cccs.ncl.ac.uk/sites/default/files/LaunchEvent-AadvanMoorsel.pdfhttp://cccs.ncl.ac.uk/sites/default/files/LaunchEvent-AadvanMoorsel.pdfhttp://cccs.ncl.ac.uk/sites/default/files/LaunchEvent-AadvanMoorsel.pdfhttp://www.fas.org/sgp/crs/misc/R42547.pdfhttp://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDFhttp://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDFhttp://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDFhttp://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDFhttp://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDFhttp://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/documents/countryprofiles/567%20china-d-Comparative%20Research_ed1a.PDF
  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    8/20

    http://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clause

    Atty. Sta. Maria

    http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-

    discourse-on-the-cybercrime-law/

    http://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://getrealphilippines.com/blog/2012/06/philippine-congress-mints-new-anti-cybercrime-and-anti-slander-laws/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://ebinfoshop.surestepintegral.com/2012/10/10/an-unconstitutional-law-a-discourse-on-the-cybercrime-law/http://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clausehttp://www.interaksyon.com/infotech/opinion-beware-the-cybercrime-laws-section-19-the-takedown-clause
  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    9/20

    PROFILE OF REPONDENTS

    Gender

    Age

    Effects of the Cybercrime Law tothe Students

    Advantages and Disadvantages of

    Cybercrime Law

    INPUT

    Survey

    Statistical Framework

    Interpretation of Data

    PROCESSProper guidance and

    orientation on the use

    of the internet

    For safety and for

    better understanding

    on how to avoid

    cybercrimes.

    OUTPUT

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    10/20

    The descriptive method was used in thisresearch, which was deemed appropriatedesign as it answered the problems posed bythe researchers.

    A total of twenty respondents including tenmale and ten female students.

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    11/20

    Before the actual data collection theresearcher sought the permission of DRA.Lynn De Claro. After seeking approval,distributions were made. The researcher

    consumed two days in administrating andretrieving the data gathering tool. After thedata collection phase, summarization,counting and tabulating of information tookplace.

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    12/20

    Percentage (%) = (F/N) x 100 Where: % = Frequency percentage distribution

    SF or F = frequency (number of responses)

    N = total number of student respondents

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    13/20

    Table 1 FREQUENCY OF AGES OF RESPONDENTS

    Age Frequency Percentage

    16 3 15%

    17 6 30%

    18 and above 11 55% TOTAL 20 100%

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    14/20

    Table 2 FREQUENCY OF GENDER OF RESPONDENTS

    Gender Frequency Percentage

    Male 10 50%

    Female 10 50%

    TOTAL 20 100%

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    15/20

    1. The profile of the 50 College Students ofthe University respondents is as follows:

    1.1 According to age, Majority (50%) of themwere 18 years old and above, 30% were 17years old, and the rest (15%) were 15 yearsold.

    1.2 According to gender, about half were (10)female and 10 were male.

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    16/20

    2. The law affects:

    2.1 Individual

    2.2 Society

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    17/20

    3. Advantages

    1.Business on the internet are protected withthis law.2. Cyber Sex and Cyber Bullying is now acrime and punishable.3. Tech knowledge for government will be lift

    up to combat cyber crimes such as hackingand theft.

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    18/20

    3. Disadvantages 1. freedom of speech

    2. intrusion of privacy

    3. liking, twweting, sharing or reposting arelibelous

    4. One main factor that leads to the negativereaction to the public is that we focus our

    research on students aged 15 and abovewhich are mostly youths that uses socialmedia.

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    19/20

    The respondents perceived that cybercrime

    law will be helpful to them but at the sametime breaks some rules especially on thefreedom of expression which they arebelieved to be practiced.

  • 7/27/2019 Perception of the Business Administration Students on Cybercrime

    20/20

    Students should know their limitation on howand when to post things on the social media.They should know what is the extent of theirprivilege in expressing their thoughts.

    Cybercrime law may not be fullyunderstandable. So if the government is

    eager to pursue it, they should also educatethe youth abouth the provisions of the law.