Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
135 views64 pages

I3 CSS Final

The document discusses the rationale and need for assessing the level of cyber security awareness among Grade 12 students. It provides background on related concepts like the Protection Motivation Theory and Cybercrime Prevention Act. It also reviews several related studies that examined cyber security awareness among students in other areas.

Uploaded by

libotjohnvincent
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views64 pages

I3 CSS Final

The document discusses the rationale and need for assessing the level of cyber security awareness among Grade 12 students. It provides background on related concepts like the Protection Motivation Theory and Cybercrime Prevention Act. It also reviews several related studies that examined cyber security awareness among students in other areas.

Uploaded by

libotjohnvincent
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 64

1

CHAPTER I

THE PROBLEM AND ITS SCOPE

INTRODUCTION

Rationale

Globally, there has been a surge in cyber threats and attacks targeting

individuals, organizations, and educational institutions. In an era characterized

by the rising tide of cyber threats, it becomes imperative to identify this

knowledge gap to understand the potential vulnerabilities these students face

(Oruc, 2022). Additionally, the Philippines, like many countries, has

implemented data protection regulations, making it imperative for schools to

ensure the security of sensitive student data (Sutton, 2018). All these factors

underscore the necessity of this study, as it is essential to understand the

level of cyber security awareness among Grade 12 students, identify potential

knowledge gaps, and develop strategies to equip them with the skills needed

to navigate the digital landscape safely and responsibly. In essence, the

study's purpose or justification is to address the immediate and long-term

challenges posed by cyber threats and data protection regulations in the

context of the school and broader local and national contexts.

Locally, within DCPNHS, the widespread integration of technology in

education and communication means that students are exposed to online

risks, such as phishing identity theft, spamming, and privacy breaches. As

educational institutions are responsible for the well-being of their students,

there is a growing need to address these cyber security challenges (Yang,


2

2023).The need to evaluate the level of cyber security awareness among

Grade 12 Academic Track students at DCPNHS is based on several key

factors.It is impossible to overestimate the significance of cyber security

knowledge and awareness in a time characterized by digital connection (J.

Hejase, 2015).

The imperative to undertake this study is further underscored by the

dynamic nature of the cyber threat landscape. In recent years, cyberattacks

have grown in sophistication and scale, and the methods employed by

malicious actors constantly evolve. This ever-changing landscape means that

existing educational programs might not adequately equip students with the

latest knowledge and skills to protect themselves and their digital

assets (Makhachashvili et al., 2020).This study addresses the research

problem of whether Grade 12 students possess sufficient cyber security

awareness to safeguard themselves and their digital assets.

Thus, there is a clear and urgent need to assess the current level of

cyber security awareness among Grade 12 Academic Track students at

DCPNHS to ensure that the educational institution is effectively preparing its

students for the digital challenges they will encounter not only during their

academic pursuits but also in their future careers and personal lives

This study's primary purpose is to comprehensively assess the current

state of cyber security awareness among Grade 12 Academic Track students

at DCPNHS. By doing so, it aspires to fill a critical knowledge gap, addressing

the growing cyber threats and the unique digital challenges faced by students.

The ultimate goal is to equip these students with the essential knowledge and

skills required to navigate the digital landscape safely and responsibly.


3

Moreover, the study seeks to ensure the institution's compliance with data

protection regulations and to enhance the employability and overall well-being

of the students. By shedding light on the existing knowledge gaps and

potential vulnerabilities, this research is of paramount importance to both the

school and the broader community. It serves as a proactive step toward

securing the digital future of these students and, by extension, contributing to

a safer and more resilient digital society.

Review of Related Literature

This section provides an overview of related studies in the Assessment

of Cyber security Awareness of students.

Protected Motivation Theory

The Protection Motivation Theory (PMT) is a psychological model that

was developed to understand how individuals respond to threats and engage

in protective behaviours. It has been widely used to study various domains,

including health, environmental issues, and cybersecurity. PMT posits that

people’s motivation to protect themselves depends on their perception of

threat and the efficacy of protective actions (Wikipedia). Specifically, the

theory suggests that individuals are motivated to protect themselves against

cyber threats when they perceive the threat to be significant and believe that

the protective action will be effective (Rogers, 1983).


4

Cybercrime Prevention Act of 2012

In accordance with Republic Act 10175, also referred to as the

“Cybercrime prevention act of 2012” It is a law that entirely deals with

offenses done against and using computer systems. It contains procedural

rules, substantive rules for crimes, and rules for international cooperation.

Individuals are exposed to the possibility of falling victim to cyber-attacks to a

greater extent as more individuals become online users. Through this Act,

which informs the public of the consequences of breaking the law, the national

government hopes to lower the risk of cyberattacks. However, there isn’t

enough proof to say that cyberattacks would go down just by people being

aware of the penalties. Thus, in order to secure the safety of these students,

the researchers have understood the significance of conducting this study to

fully grasp the level of cyber security awareness regarding cyber assaults

among Grade 12 Academic Track students of Dr. Cecilio Putong National

High school.

Recent study has been done to highlight the seriousness of malware

assaults, and proven that there are over 200,000 malware instances

worldwide daily, including phishing scams, ransom ware, and malicious

scans.

The level of end users’ knowledge of the risks posed by cyberattacks to

networks and the best practices that can be applied to reduce these risks is

referred to as their level of cyber security. An assault carried out by online

criminals using one or more computers on one or more computers or


5

networks is known as a cyberattack. Identify theft, spamming, phishing, and

cyber worms, etc. are examples of cyber-attacks. End users would become

more vulnerable to risks if they were unable to recognize a cyberattack

without the aid of cyber security awareness. According to the Verizon Data

Breach Investigations Report (DBIR) 2021, the majority of data breaches were

caused by human error, including as clicking on malicious websites or falling

for social engineering scams. This highlights the need for equipping students

with the knowledge and skills to recognize and respond to cyber threats

effectively (Verizon, 2021). This emphasizes the necessity of giving students

the knowledge and abilities necessary to identify and successfully counteract

cyber threats (Verizon, 2021).

Several researches have investigated this topic in depth of the threats

of cybercrime today and local awareness levels. Elrasheed & Nadir, for

instance, assessed the cybersecurity awareness in the Alnamas region, a

neighbourhood in southern Saudi Arabia, by 132 undergraduates with

backgrounds in information technology were questioned, and it was

discovered that 15% of the participants had experienced 80.7% of those

surveyed were interested in training to combat cybercrime. Social media was

used in 69.6% of cybercrimes, 57% of which were sexual in nature, and

without their awareness.

The study “Cybersecurity Awareness of Majmaah Students: A Survey

Study” by Alshammari et al. (2021) examined the level of knowledge and

behavior of undergraduate students at Majmaah University in Saudi Arabia

regarding various cybersecurity issues. They used a questionnaire with 25


6

questions to collect data from 384 students from different majors and

academic levels. Their results showed that the students had an above

average awareness of cybersecurity threats, such as email security, computer

viruses, phishing, fake ads, pop-up windows, and software updates. However,

they also identified some gaps and weaknesses in the students’

understanding and practice of cybersecurity, such as password management,

data backup, and social media privacy. They suggested some

recommendations to improve the cybersecurity awareness and education

among the students, such as conducting workshops, seminars, campaigns,

and online courses.

Chandarman and Niekerk (2017) performed a survey of students at a

private tertiary institution in South Africa's KwaZulu-Natal Province, which

demonstrated a positive self-awareness of several cybersecurity risks.

However, there was a clear need to improve cybersecurity awareness training

in order to ensure that students' knowledge, conduct, and attitudes about

cybersecurity were correct.

Similarly, a study involving students from Yobe State University's

Computer Science Department discovered strong awareness of privacy and

trust but a lack of fundamental skills in password management, phishing, and

two-factor authentication (Garba et al. 2020). Moallem (2019) researched

cybersecurity awareness among university students in the San Francisco Bay

area, finding that while the majority of respondents evaluated themselves as

having average or better cybersecurity awareness, it was unclear if this

information converted into secure behavior.


7

Previous study has looked into a variety of cybersecurity issues,

including password security, cyberbullying, phishing, malware, downloading,

sharing, using paid content, two-factor authentication, trust, privacy, and

identity theft. These studies emphasize the multifaceted nature of

cybersecurity awareness, which includes understanding the importance of

information security, recognizing various types of cyber threats, protecting

personal information, securely managing passwords, and assessing the

trustworthiness of software platforms.

In this context, cybersecurity awareness among college students refers

to both their knowledge of potential cyber risks and their ability to protect

themselves. Key concerns include cybersecurity understanding, privacy

protection, password management, and trust in software platforms. It is critical

to examine students' comprehension of these aspects and their adoption of

proper security measures in order to effectively limit cyber hazards

(Frydenberg et al., 2020).

Africa has high internet penetration rates, resulting in an increase of

cyberattacks (Eboibi, 2021). Because of fragile answers to cybersecurity

challenges, the continent is viewed as a center of cybercrime (Kabandal et al.

2018). Cybercrime has a huge influence on Africa's GDP, costing billions of

dollars and mostly involving online frauds (Interpool, 2021). Despite these

issues, there is minimal cybersecurity research in African governments, and

there is an important lack of cybersecurity experts (Kshiteri, 2019). African

countries have built legislative frameworks to combat cybercrime, but

enforcement remains a challenge. In South Africa, initiatives to raise

cybersecurity awareness are visible, although research in this field is limited


8

(Kritzinger et al., 2017). A lack of knowledge of cybersecurity dangers, along

with weak digital infrastructure, exacerbates the continent's security

vulnerabilities. Public awareness initiatives are critical in combatting

cybercrime, and have the ability to drastically lower risks. However, poor ICT

literacy levels impede cybersecurity awareness initiatives in Africa (Bada, Von

Solms et al., 2019).

Several studies have looked at cybersecurity knowledge among

college students from various areas. Alotaibi et al. (2016) discovered that

students at Saudi institutions lacked enough cybersecurity expertise and were

ignorant of the protection of their information. Senthilkumar and

Easwaramoorthy (2017) observed that college students in Tamil Nadu, India,

have higher-than-average knowledge of cybersecurity concerns, indicating a

need for improved security awareness initiatives. Moallem (2019) researched

students' attitudes about cybersecurity in Silicon Valley, identifying a lack of

awareness of information security and calling for frequent training to enhance

comprehension and conduct. Moallem (2019) also addressed the need of

privacy awareness and theft prevention, underlining the necessity for defined

action plans to raise cybersecurity awareness.

Zwilling et al. (2020) investigation of the relationship between users'

protective behaviors, cybersecurity mindfulness, and understanding across

multiple nations revealed adequate knowledge but little real-world application.

Research conducted at Nigerian institutions revealed that while students

understood the basics of cybersecurity, they were unaware of the importance

of information protection (Garba et al., 2020). The possibility of deceit among

users with inadequate information was highlighted by Aljeaid et al. (2020)


9

assessment of end-user knowledge of phishing attacks and responsiveness to

cybersecurity risks.

Level of Cybersecurity Awareness

Alharbi and Tassaddiq conducted a study at Majmaah University with

the goal of determining the extent of user compliance and cybersecurity

knowledge among undergraduate students. To statistically assess students'

awareness of cybercrime and protection, the study used a scientific

questionnaire based on a number of Internet safety elements. They found that

the majority of pupils were familiar with basic cybersecurity concerns such

electronic emails, computer viruses, phishing, false advertisements, pop-up

windows, and other online outbreaks.

Alotaibi et al. examined the degree of college students' awareness of

cybersecurity. They found that the majority of students in Saudi colleges had

insufficient cybersecurity expertise since they were unaware of the protection

of their personal data.

Level of cyber security awareness of students from Academic Track in

terms of:

Identity theft
10

The unauthorized use of someone else’s personal information, like a

Social Security number, is known as identity theft. This is often done to steal

money or credit (Merriam webster).

The study’s goal was to examine the features of Australia’s identity

theft response system from the viewpoint of a single victim, as described in

the publication “The identity theft response system” by Wyre et al. Victims can

anticipate that their identification information will continue to be misused as

the crime is known to have long-lasting effects. Furthermore, it is well

recognized that identity credential misuse can take many different forms,

making prevention challenging. But little is known about how identity theft

victims actually react to the crime and, consequently, how response actors—

which include financial institutions, law enforcement, and other organizations

—interact and depend on one another to meet the demands of victims. The

main goal of this project is to fill in this knowledge gap by gathering actual

information about the identity theft response system, its social, task, and

information requirements, and how they serve the needs of victims (Wyre et

al., 2020).

Data from 211 victims of identity theft who had previously received

assistance from IDCARE were used in the study. The national identification

and cybercrime community assistance service for Australia is called IDCARE.

Through a contact center, it provides specialized counselling services to

victims of identity theft. These services include extensive instructions on how

to handle identity theft and emotional assistance if the victims need it.

IDCARE provided anonymous case files and notes from these prior
11

engagements under an approved ethics research program (USC E/16/052),

as well as information from phone interviews conducted for the purpose of this

study with specific victims over a 12-month period after the initial discovery of

the identity theft. These interviews were conducted to learn more about the

requirements of the victims, the organizations they interacted with, the duties

they undertook for those organizations, and the success these interactions

had in meeting their needs. Two-thirds of the 600 or so IDCARE clients who

were invited to take part in the study declined, leaving a final sample of 211

(Wyre et al., 2020).

Thirty-six days after the initial compromise, the credentials were

misused. It took the respondents, on average, 62 days after the initial

compromise to realize that their credentials had been misused. This illustrates

that a victim’s ability to respond to identity theft occurs after the initial theft.

Approximately 68% of survey participants discovered their identity theft on

their own, as opposed to learning about it from a third party. This shows that

the majority of identity theft victims’ initial interaction or response is centered

on self-detection. The window of time between an individual’s identity being

compromised and their initial discovery (either by themselves or others) is

probably the best one for subsequent identity misuse (Wyre et al., 2020).

Many of the victims interviewed for this study came to the conclusion

that the threat had subsided because they had not seen any further identity

theft. According to Wyre et al. (2020), there was no conclusive method to

determine whether or not they remained at danger, therefore this was their

only sign of recovery.


12

Identity theft go beyond financial losses and also include significant

emotional and physical symptoms. Criminal justice system officials working

with identity theft victims should be aware of these consequences so they can

point victims to programs and services designed to address the emotional and

physical aftermath. The current study was unable to incorporate any victim

treatment measures (such as individual counseling, group therapy, or other

resources) that participants may have accessed because of data restrictions

(Katelyn Golladay, and Kristy Holtfreter, 2017).

Spamming

Information that is distributed or sent to huge recipients without their

knowledge. Spam can be divided into a wide range of categories, including

webspam, mobile, and Voice over Internet Protocol (VOIP). Spam on social

networking sites, instant messages, and phones spams from Usenet

newsgroups, IM, and email spam as the most well-known type of spam.

Today, email has been permanently integrated into our lives, for which the

majority of research efforts have been made improving the usability and

convenience of email and almost no money at all. Consequently, an email

system become a significant and fundamental communication strategy for a

large number of persons because transfers are easily made electrical signals

sent in seconds at clearly visible zero cost (Khan et al., 2015).

In a study by Kumar et al., (2020) email, often known as electronic mail

spam, is the "use of email to send a group of people unsolicited emails or

promotional email recipients. Unwanted email indicates that the recipient has

not given consent to receive those emails. "The acceptance since the last ten
13

years, of employing spam emails has increased. Junk mail becomes a

significant internet misfortune. Spam is a waste of speed, space, and

message storage.

In another study, Manasrah, A., Akour, M., & Alsukhni, E. (2015) they

sought to investigate the awareness and attitudes of university students at

three major universities in Jordan. A total of 600 students from college of

education, science and IT colleges were surveyed. Most of the students in the

study were aggressive about spam and cybercrime, but few took action to

stop them.

A student's major plays an important role in raising awareness about

spam and cybercrime. Furthermore, he believed that this could lead to

students opening and reading spam emails, which could lead to them on

becoming victims of cybercrime, and he mainly considered four factors. These

factors are technological, social, economic, and religious.

Their results show that some key participants in the education sector

rarely use email accounts, while others may be motivated to follow specific

emails, although they have some knowledge of spam and cybercrime.

These participants are more vulnerable to cybercrime. In the end, they

have summarized research directions and recommendations to increase user

awareness and prepare to combat spam and cybercrime.

Phishing
14

Phishing is a form of online fraud in which fraudsters trick others into

supplying sensitive data, including credit, financial, and personal information

passwords and credit card information (Katkuri, 2018). SMS phishing, often

known as SMiShing, is the alternative phishing attack. It utilizes mobile text

messaging or short messaging services (SMS) on their phones. Typically,

SMiShing targets its victims by texting them with messages that impersonate

authorities in the law, the banking industry, and IT police departments. They

will request information from their victims for them to gain access to sensitive

accounts or to perpetrate identity theft, financial fraud, or other illicit activities.

them. In addition to SMiShing, vishing is a form of telephone-based phishing

attacks. Search engine phishing is another kind of assault phishing, a

phishing attempt that makes use of bogus web pages (Boateng & Amanor,

2014). The scammer will make false web pages that advertise inexpensive

goods and amazing offers. The websites have a lot in common with the

original websites (Suganya, 2016). Attacks by phishers will be detrimental to

people, society, and the nation. Money loss for people, society, and the

economy is one of the impacts. Theft of sensitive and valuable information

about clients, partners, and organizations is another sort of financial loss

(Kamruzzaman et al., 2016). Phishing attacks can also decrease

stakeholders' and customers' trust in online transactions. Additionally, they

can harm a company's reputation as a brand.

The study examines the impact of social engineering influence, anti-

phishing knowledge, and security concern on phishing awareness among

Generation Y in Kuala Lumpur. Results show a negative relationship between

social engineering influence and phishing awareness, while a positive


15

relationship exists between anti-phishing knowledge and phishing awareness.

Security concerns also positively affect phishing awareness. The findings

suggest that people should stay updated on phishing methods, read phishing

materials, secure their data, and install anti-viruses. Companies and

government agencies can benefit from this study to spread awareness and

take action against phishing threats. However, the study's limitations include

its scope, focusing on Generation Y, and its use of only three independent

variables (Hasnan, S. 2021).

In the paper "An Investigation into Students' Responses to Various

Phishing Emails and Other Phishing-Related Behaviors" authored by Edwin

Donald Frauenstein in 2018, the study explores the evolving landscape of

phishing attacks and its implications for internet users. This essay reviews the

key findings of the study and their relevance in the context of online security.

Frauenstein's study reveals a growing awareness among average

computer and internet users regarding phishing emails impersonating

financial institutions (Frauenstein, 2018). This finding raises concerns for

information security practitioners, as educational and training efforts

predominantly concentrate on protecting customers of financial institutions. It

underscores the importance of broadening security education beyond this

focus.

The research also emphasizes the effectiveness of phishing attacks

when they incorporate contextual elements of interest or concern to the user

(Frauenstein, 2018). These contextual elements create a heightened sense of

urgency or credibility, making users more susceptible to manipulation. Thus, it


16

is essential for users to remain vigilant, as phishing attempts often leverage

personal interests.

Frauenstein's work brings attention to the expanding reach of phishing

attacks into social media platforms (Frauenstein, 2018). Users are

increasingly enticed to click on enticing videos and links, creating a new

frontier for attackers. The context of social media, where users do not

traditionally expect phishing attempts, makes this development particularly

noteworthy.

The study suggests that phishing on social media is likely to evolve

further. Attackers may incorporate additional contextual elements, using Open

Source Intelligence to target specific user groups (Frauenstein, 2018). This

underscores the need for ongoing vigilance and adapting security practices to

the changing tactics of phishers.

Frauenstein's research indicates a future research focus on how

responses to phishing attacks correlate with gender and age (Frauenstein,

2018). Understanding demographic influences on susceptibility is a crucial

step toward tailoring security education and awareness initiatives effectively.

Cyber worms

A worm is a type of malware or malicious software that can replicate

rapidly and spread across devices within a network. As it spreads, a worm

consumes bandwidth, overloading infected systems and making them

unreliable or unavailable. Worms can also change and delete files or

introduce other malware.


17

Conficker worm spread in November 2008, it was targeting Microsoft

Windows operating system that has once infected 15 million hosts. The worm

system defense must be automatically detected. Before we defend against

worm, we must get the worm strategy by analysis of worm behavior. So

therefore, we propose Behavioral Scanning Worm Detection (BSWD) for

detecting internet worm behavior that uses TCP and UDP scanning attack.

We selected four different worms for validation of worm behavioral detection.

The BSWD corrected results detected the MSBlaster worm behavior more

than 99%, the behavior of Sesser, Dabber, Protoride behavior more than 97%

of correction. Our algorithm result recognizes the worms’ behavior in one

minute.

Conficker worm has several techniques to spread itself. One of these

techniques is a packet buffer overflow. The worm sends packet buffer

overflow to the vulnerable machine that allows a packet buffer overflow. The

excess code can overflow the buffer and execute in the vulnerable machine,

possibly causing problems. With Conficker, the attacking computer is a web

server that sends out an initial piece of code to random Internet Protocol (IP)

address. The worm induces a buffer overflow that causes the infected

machine to call the attacking computer over the internet or a Local Area

Network (LAN).

The attacking machine sends installation code for Conficker worm to

the victim machine. Conficker worm attack’s Windows 2000, Windows XP,

Windows Vista, Windows Server 2003, Windows Server 2008, and Windows

7 beta function [2]. Worms can use Transmission Control Protocol (TCP),
18

User Datagram Protocol (UDP), and Internet Control Message Protocol

(ICMP) for scanning, and normally the request in TCP protocol is SYN flag but

there are worms that use stealth TCP scanning like Ramen worm. The study

calls it stealth TCP scanning, because it sends a single frame to a TCP port

without any TCP handshaking or additional packet transfers. (Mohammad M.

Rasheed and Munadil K. Faaeq, 2019)(Dengyin, Z., Ye, W.: SIRS: internet

worm propagation model and application. In: International Conference on

Electrical and Control Engineering, pp. 3029-3032 (2010).


19

THE PROBLEM

Statement of the Problem

This study aims to assess the level of cyber security awareness among

Grade 12 Academic Track students at Dr. Cecilio Putong National High

School.

This aims to answer the following questions:

1. What is the level of cyber security awareness of the Grade 12 Academic

Track Students in terms of?

1.1. Identity theft

1.2. Spamming

1.3. Phishing

1.4. Cyber worms?

2. How do students self-assess their awareness regarding identity theft,

spamming, phishing, and cyber worms?

3. Is there a significant relationship between cyber security awareness among

the Grade 12 Academic students?


20

Hypothesis
Ho: There is no significant relationship between cyber security awareness

among the students of grade 12 academic track.

Ha: There is a significant relationship between cyber security awareness

among the students of grade 12 academic track.

Theoretical Framework

An Evaluation of the Level of Cyber


Security Awareness among Grade 12
Academic Track of Dr. Cecilio Putong
National High School

Legal Basis
R.A 10175 Cyber Crime
Prevention Act of 2012

IV DV
Level of Cyber Identity Theft
Security
Spamming
Awareness
Phishing
Cyber worms

Figure1: Theoretical Framework


21

Significance of the Study

This study can help Grade 12 Academic students become more aware

of the importance of cybersecurity in their daily lives. As they prepare to enter

college or the workforce, they are likely to rely heavily on digital tools and

online platforms. Understanding the basics of cybersecurity can help them

protect their personal information, finances, and digital assets.

General Students: A study like this can enhance students' digital literacy and

empower them to use digital technologies more safely. They can learn about

secure online practices, including strong password creation, recognizing

phishing attempts, and being mindful of their online presence. As Grade 12

students are on the cusp of entering college or the workforce, their level of

cybersecurity awareness can impact organizations and institutions where they

will study or work. A lack of awareness might result in security incidents, data

breaches, or personal harm.

School Administrators: It uses the findings to develop and implement

policies and guidelines aimed at improving cyber security awareness and

practices within the school or institution. This could include introducing

cybersecurity education as a part of the curriculum.

General Teachers: The study can help teachers understand the current state

of cyber security awareness among their students. This knowledge can inform

curriculum development and enable teachers to incorporate relevant cyber

security topics into their lessons.


22

Scope and Limitations

In the ongoing study conducted during the first semester of the

academic year 2023-2024, the researchers primary scope encompasses

students who currently possess internet access and own gadgets that are

susceptible to cyber security concerns. By focusing on this specific subset of

the Grade 12 student population, the researchers aim to gain insight into the

cyber security awareness of those who are actively engaged with online

technologies. This scope acknowledges the relevance of internet access and

personal devices in shaping individuals' cyber security awareness.

This study focuses on cyber security awareness among Grade 12

Academic Track students at DCPNHS, focusing on the ABM, STEM, and

HUMMS strands. The researchers acknowledge the need for a homogenous

academic track to understand the nuances of cyber security awareness. The

study does not extend into the second semester, which may affect the

assessment of potential changes in awareness and capabilities over the entire

academic year. However, the quantitative approach and well-defined scope

provide valuable insights into cyber security awareness among Grade 12

students. The study considers demographic factors like gender, age, and

technology exposure, and compares students from different academic tracks

to understand differences in awareness levels. Qualitative data will be

collected through interviews and open-ended surveys to understand students'

experiences and perceptions. The study also explores the integration of cyber
23

security education into the academic curriculum to understand the educational

landscape's impact on students' awareness and capabilities.

RESEARCH METHODOLOGY

Research Design

The study will adopt a correlational research design, which is a

form of non-experimental design that examines the relationships between

variables without any control or manipulation by the researchers (Bhandari,

2023). Using correlational design on assessing cybersecurity awareness of

students is that it can help us understand the relationships between different

variables that are relevant to cybersecurity, such as knowledge, attitude,

behavior, and demographic factors.

Research Environment

The study will be conducted in Dr. Cecilio Putong National High School

or DCPNHS; is a public secondary educational institution at Tagbilaran City,

Bohol, Philippines. It is located along Carlos P. Garcia or CPG Avenue.

The campus is 21,674 sq. meter with 45-60 students per class, DCPNHS

has the biggest number of students in Bohol province with more than 6000

enrollees. The senior high school department offers the Academic, Sports,

Arts and Design, and Technical Vocational Track. As the leading educational

institution in Bohol, DCPNHS serves as a microcosm of the broader

educational landscape in the province. This makes the study outcomes more

pertinent to the regional context.

Research Participants
24

The research participants consist of Grade 12 students enrolled in the

Academic Track at DCPNHS. This specific group forms the target population

for the study, and their insights are integral to the assessment of cyber

security awareness within the academic context. The researchers chose

Academic Track students as respondents because they are more likely to use

digital platforms and devices for their academic and personal purposes, and

thus face more cyber security risks and challenges than other students.

Academic Track students may also have different levels of cyber security

awareness and knowledge, depending on their year level, work exposure, and

education level. Therefore, evaluating their level of cyber security awareness

can help identify their strengths and weaknesses, and provide

recommendations for improving their cyber security practices and skills. A

study conducted by (Leigh and Simmons, 2023) states why cyber security

awareness is important for students, especially those who use digital devices

and share information online frequently.

While addressing concerns about potential bias, the researchers emphasize that the choice

of Academic Track students does not hinge on assumptions of inherent academic

intelligence. Instead, the selection is driven by a focus on specific behaviors related to digital

usage within this subgroup. The decision to concentrate on Academic Track students stems

from their distinctive patterns of digital engagement for academic and personal purposes.

This criterion is not meant as an evaluation of their intellectual capabilities but rather as a

recognition of the unique digital landscape they navigate in the context of their

educational journey.

Research Instrument
25

This research uses a survey questionnaire to assess the cyber security

awareness of Senior High School students in the Academic Track students.

The questionnaire aims to understand the students' perceptions of cyber

threats, their understanding of the importance of cyber security, and their

practices for safeguarding digital information. It also explores their exposure

to cyber education, usage of online resources, and attitudes towards adopting

secure online behaviors. The instrument aims to provide a comprehensive

understanding of the multifaceted aspects of cyber security within their

educational setting.

The survey questionnaire employed in the study has been crafted by

drawing insights from various sources that explore people's understanding

and practices related to online security. The questions have been adapted

from different studies:

1. Cyber Security Awareness: Questions have been incorporated

from a 2014 study by Velki, Solic, and Ocevcic, focusing on the awareness

levels of individuals regarding online security.

2. Identity Theft: Questions in this section are derived from a survey

conducted by the Bureau of Justice Statistics in 2016, specifically

examining how individuals safeguard themselves against identity theft.

3. Spamming: Some questions have been adapted from a 2012

survey by Ahuja and Kumar, exploring factors influencing individuals'

experiences with spam emails.


26

4. Phishing: Questions in this section have been included from a

2014 study by Arachchilage and Love, shedding light on individuals'

knowledge about and avoidance of phishing attempts.

5. Cyber Worms: Questions in this section have been adapted from

a 2014 survey by Singhal, focusing on individuals' encounters with

computer viruses.

By incorporating questions from diverse studies, the researchers aim to

capture a comprehensive understanding of how these students’ approach and

think about cyber security within the unique context of their school

environment.

Research Procedure

Gathering of Data.

Initially, the researchers will submit a formal request to the school

registrar's office, seeking the provision of a comprehensive list of Academic

Track students for the first semester of the school year 2023-2024. Following

the receipt of this list, the researchers will proceed to employ a cluster

sampling approach to select representatives from each strand within the

Academic Track. This method aims to ensure a representative and unbiased

sample while allowing for a focused examination of specific educational

strands.

Second, a letter sent addressing to the School Principal as to their

students are the respondents in the research entitled “An Evaluation of the

Level of Cyber Security Awareness among the Academic Track Senior High

School Students of Dr. Cecilio Putong National High School S.Y. 2023-2024”.
27

Third, after distributing the questionnaires, the researchers will gather

the instrument, and the data that was taken from the survey was tally for the

data interpretation.

Fourth, after the data gathering, the result will be checked, evaluated,

analyze, and interpreted with the use of statistical tools that seek to answer

the problem 1, 2, 3 and 4.

Ethical Considerations. In observance of the ethical procedures in

conducting research, the researcher faithfully observed outmost privacy of

their respondents and consent to their respondents, the information will be

protected, and the researchers asked permission to conduct the study and will

remain confidential.

Sample

In the pursuit of unbiased and comprehensive research, the

researchers have chosen a cluster sampling probabilistic method that

incorporates a stratified approach. This approach not only ensures

representation from each educational strand—STEM, ABM, and HUMSS—but

also guarantees the inclusion of the entire Academic Track data.

By selecting 12 participants from each section from the HUMSS strand,

20 participants from each section of the STEM strand, and 20 participants

from the ABM strand. This strategy safeguards against potential bias and

maintain a broader perspective encompassing the entirety of the Academic

Track.

The researchers emphasize that this method is designed to promote

inclusivity and mitigate any skewed representation, fostering a comprehensive


28

understanding of cyber security awareness within the Academic Track at

large. This commitment to a fair and unbiased approach aligns with the ethical

considerations underlying the research design.

Statistical Treatment of Data.

Level of Cyber Security Awareness:

Descriptive statistics, including measures of central tendency and

dispersion, will be employed to present an overall summary of the cyber

security awareness level among Grade 12 Academic Track students.

Level of Cyber Security Awareness (Subcategories):

For each subcategory (identity theft, spamming, phishing, cyber

worms), descriptive statistics will be utilized to present the level of awareness.

Comparisons between subcategories may involve inferential statistics such as

analysis of variance (ANOVA) or non-parametric tests.

Relationship between Cyber Security Awareness and Threats:

Correlation analysis, such as Pearson's correlation coefficient, can be

employed to assess the strength and direction of the relationship between

overall cyber security awareness and specific cyber threats. Additionally,

regression analysis may be used to explore the predictive nature of cyber

security awareness on cyber threats.

These statistical treatments aim to provide a comprehensive analysis

of the cyber security awareness among Grade 12 Academic Track students,

considering both overall awareness levels and cyber threats.


29

OPERATIONAL DEFINITION OF TERMS

 Awareness – Knowledge or perception of a situation or fact.

 Cybercrime – Encompasses a wide range of criminal activities that are

carried out using digital devices and/or networks.

 Cyber security – Is the application of technologies, processes, and

controls to protect systems, networks, programs, devices and data

from cyber-attacks.

 Cyber threats - Is a malicious act that seeks to damage data, steal

data, or disrupt digital life in general.

 Digital – Refers to electronic technology that uses discrete values,

generally zero and one, to generate, store and process data.

 Online – used to describe an activity, service, etc. that is only available

on the internet.
30

 Malware – Is a file or code, typically delivered over a network, that

infects, explores, steals or conducts virtually any behavior an attacker

wants.

 Risk – A situation involving exposure to danger.

 Spam – unsolicited usually commercial messages (such as emails, text

messages, or Internet postings) sent to a large number of recipients.

 Technology – Is the application of conceptual knowledge for achieving

practical goals, especially in a reproducible way.

 Virus – A computer program that can copy itself and infect a computer

without permission or knowledge of the use.

CHAPTER II

PRESENTATION, ANALYSIS, AND INTERPRETATION OF DATA

This chapter deals with the presentation, analysis, and interpretation of

the results of the study.

Table 1. Summary of level of Cyber security awareness of the Grade 12

Academic Track students.

This chapter examines into the detailed presentation, analysis, and

interpretation of the study's findings. The contingency tables serve as a basic

tool for interpreting the varied responses, directing following questions about

the cyber security awareness landscape among the surveyed students.


31

CYBER AWARENESS

80
70
60
50
40
30
20
10
0
STRONGLY DISAGREE NEITHER AGREE STRONGLY
DISAGREE AGREE

Q1 Q2 Q3 Q4 Q5

Figure 1: Cyber Security Awareness Bar Result

To achieve a randomized and representative selection from the whole

population of trainees, the current study used a cluster sampling approach.

The sample comprises of respondent who were intentionally chosen to

represent a varied cross-section of the Academic Track. The research seeks

to provide thorough insights into the cyber security knowledge of Academic

Track students with a total sample size of 140 out of 456 trainees.

Contingency Tables

RESPONSES

QUESTIONS 1 2 3 4 5 Total

I understand what cyber


0 3 5 60 72 140
security is.
0.0 % 2.1 % 3.6 % 42.9 % 51.4 % 100.0 %

I regularly educate myself


about new types of cyber
0 13 23 76 28 140
threats and best practices for
cyber security.
0.0 % 9.3 % 16.4 % 54.3 % 20.0 % 100.0 %
32

Contingency Tables

RESPONSES

QUESTIONS 1 2 3 4 5 Total

I am aware of the legal and


ethical implications of cyber- 1 10 17 72 40 140
attacks.
0.7 % 7.1 % 12.1 % 51.4 % 28.6 % 100.0 %

I know how to use antivirus


software and understand its
10 16 43 47 24 140
role in protecting against cyber
threats.
7.1 % 11.4 % 30.7 % 33.6 % 17.1 % 100.0 %

I am aware of the importance


of using secure networks (e.g.,
4 6 24 55 51 140
VPN, secure Wi-Fi) to protect
against cyber threats.
2.9 % 4.3 % 17.1 % 39.3 % 36.4 % 100.0 %

Legend: 1 – Strongly Disagree 2 – Disagree 3 – Neither


4 – Agree 5 – Strongly Agree

Figure 2. Level of Cyber Security Awareness Percentage Result


The study reveals a positive trend in respondents' attitudes and

knowledge related to cyber security. The majority of respondents (51.4%)

strongly agree that they understand cyber security, regularly educate

themselves about new types of cyber threats and best practices, and are

aware of the legal and ethical implications of cyber-attacks. A significant

proportion of respondents (51.4%) are aware of the legal and ethical

implications of cyber-attacks, while a majority (33.6%) are aware of how to

use antivirus software and its role in protecting against cyber threats. The

distribution of respondents is more evenly spread, with 39.3% strongly

agreeing and 36.4% agreeing that they are aware of the importance of using

secure networks.
χ² Tests

Value df p

χ² 113 16 < .001


33

Figure 3. χ² Tests

The x² test results indicate a strong association between the variables,

indicating that responses to these questions are not independent. The results

suggest a positive trend in respondents' attitudes and knowledge related to

cyber security, with the x² test highlighting a statistically significant association

between the different aspects explored in the questions.

The study also emphasizes the importance of incorporating education

on secure network practices (Alharbi and Tassaddiq, 2019). This underscores

the need for continued efforts to promote knowledge on common cyber

security factors and enhance the overall cyber security posture of students.
34

IDENTITY THEFT

90
80
70
60
50
40
30
20
10
0
STRONGLY DISAGREE NEITHER AGREE STRONGLY
DISAGREE AGREE

Q1 Q2 Q3 Q4 Q5

Figure 4. Identity Theft Result

RESPONSES

QUESTIONS 1 2 3 4 5 Total

I understand what identity theft


2 2 8 48 80 140
is.
1.4 % 1.4 % 5.7 % 34.3 % 57.1 % 100.0 %

I am aware of the different


5 20 25 61 29 140
methods used in identity theft.
3.6 % 14.3 % 17.9 % 43.6 % 20.7 % 100.0 %

I know potential consequences


of becoming a victim of identity 2 3 10 65 60 140
theft.
1.4 % 2.1 % 7.1 % 46.4 % 42.9 % 100.0 %

I use strong, unique passwords


for all my online accounts to 1 4 14 48 73 140
prevent identity theft.
0.7 % 2.9 % 10.0 % 34.3 % 52.1 % 100.0 %

I am careful about sharing


personal information online to 1 13 16 25 85 140
prevent identity theft.
0.7 % 9.4 % 10.8 % 18.0 % 61.2 % 100.0 %
The presented contingency tables encapsulate the responses from
Figure 5. Identity Theft Tally
participants regarding various aspects of identity theft awareness. Each

question is categorized into scales, ranging from 1 (indicating strongly

disagree) to 5 (indicating strongly agree).

The study reveals that 57.1% of respondents have a strong

understanding of identity theft, with 34.3% reporting moderate understanding.


35

A significant 43.6% of respondents are aware of various techniques used in

identity theft, with 20.7% agreeing on level 4. A significant 46.4% of

respondents have a high level of awareness of potential effects of identity

theft, with 42.9% agreeing on level 4. A majority of respondents (52.1%)

strongly agree with using strong, unique passwords, indicating widespread

adoption of secure password practices. A noteworthy 61.2% of respondents

are cautious when disclosing personal information online, demonstrating a

conscientious approach.

The study's findings support the recognition that identity theft has far-

reaching emotional and physical implications, in addition to financial loss. The

statement of criminal justice system personnel being aware of these

repercussions aligns with the idea that individuals with increased knowledge

may be better positioned to seek or advocate for assistance. It underscores

the need to not only prevent identity theft but also deal with its consequences.

The study's findings align with Katelyn Golladay and Kristy Holtfreter's (2017)

findings, which emphasize the importance of understanding and addressing

the broader implications of identity theft.


SPAMMING

100
80
60
40
20
0
STRONGLY DISAGREE NEITHER AGREE STRONGLY
DISAGREE AGREE

Q1 Q2 Q3 Q4 Q5

Figure 6. Spamming Bar Graph Result


Fgure 7. Spamming Data Tally

questions

1. I know the
importance of
keeping my email
Observed
address private to
avoid receiving
36

The study analysed the importance of keeping email addresses

private, awareness of spam-related risks, knowledge of spam risks and

consequences, understanding of spamming and identification of spam, and

awareness of measures to prevent spam. The contingency tables showed that

the majority of respondents (61.4%) rated their email address private as

highly important, while 32.1% gave a rating of 4. The lowest ratings (1 and 2)

together comprised only 2.8%.

The majority of respondents (50.0%) had a high awareness of spam-

related risks, with 39.3% rating it as a risk. The majority (45.7%) had a good

understanding of spamming and how to identify it, with 39.3% rating it as a

threat. The lowest ratings (1 and 2) together comprised only 6.5%.

χ² Tests

Value df p

χ² 26.1 16 0.053
N 700

Figure 8. Spamming χ² Tests

The x² test results showed a generally positive trend in respondents'

understanding and awareness of email security and spam-related issues. The

p-value of 0.053 suggests a borderline significance, close to the 0.05

threshold, indicating that there might be some association between the

variables but not strong enough to reach conventional statistical significance.

In summary, while individual responses show a positive trend, the x²

test suggests a need for cautious interpretation and further investigation may
37

be required to determine the significance of the associations between the

variables.

The study reveals that respondents are generally aware of spam-

related issues, emphasizing the rise of email spam and the potential

consequences of lack of recipient and sender verification. It also highlights the

vulnerability of email systems to abuse, particularly spam emails and

phishing, and the significant awareness of the risks and consequences of

spamming, as indicated by respondents' ratings in contingency tables.

PHISHING
80
70
60
50
40
30
20
10
0
STORNGLY DISAGREE NEITHER AGREE STRONGLY
DISAGREE AGREE

Q1 Q2 Q3 Q4 Q5

RESPONSES

QUESTIONS Figure19. Phishing


2 Bar
3 4 5 Total
Graph
I know how to identify phishing
emails or messages. I understand 4 10 30 58 38 140
what phishing is.
2.9 % 7.1 % 21.4 % 41.4 % 27.1 % 100.0 %

I know how to check if a website


is secure (e.g., HTTPS, padlock
4 12 35 51 38 140
icon, etc.) to avoid phishing
scams.
2.9 % 8.6 % 25.0 % 36.4 % 27.1 % 100.0 %

I know the potential risks and


consequences of falling for a 0 7 19 65 49 140
phishing scam.
38

RESPONSES

QUESTIONS 1 2 3 4 5 Total
0.0 % 5.0 % 13.6 % 46.4 % 35.0 % 100.0 %

I know the importance of not


sharing sensitive personal or
1 4 10 48 77 140
financial information over email
or phone calls.
0.7 % 2.9 % 7.1 % 34.3 % 55.0 % 100.0 %

I am aware that phishing scams


can be used to steal sensitive
information such as usernames, 3 0 19 47 71 140
passwords, and credit card
details.
2.1 % 0.0 % 13.6 % 33.6 % 50.7 % 100.0 %

Figure 10. Phishing Result Tally

The survey reveals that the majority of respondents (41.4%) are aware

of how to identify phishing emails or messages, with a significant portion

either agreeing or strongly agreeing. A smaller percentage disagrees (7.1%)

and 2.9% strongly disagree, suggesting room for improvement in knowledge

or awareness.

The majority (36.4%) are aware of checking website security, with a

significant portion agreeing or strongly agreeing. However, a minority

expresses uncertainty or disagreement, suggesting the need for targeted

education or information.

A significant percentage (46.4%) are aware of the potential risks and

consequences of falling for a phishing scam, with a majority agreeing or

strongly agreeing. A very small percentage expresses disagreement,

suggesting a strong consensus on the significance of safeguarding personal

and financial details.


39

The majority (55.0%) are aware of the potential theft associated with phishing

scams, with a high level of awareness regarding the potential theft of sensitive

information through phishing scams. A very small percentage expresses

disagreement, indicating a strong consensus on the awareness of the risks

associated with phishing.

χ² Tests

Value df p

χ² 65.8 16 < .001


N 700

Figure 11. Phishing χ² Tests

The x² test results indicated a strong association between the

variables, indicating that responses to these questions are not independent.

The results suggest a positive trend in respondents' attitudes and knowledge

related to phishing, with a statistically significant association between the

different aspects explored in the questions.

In conclusion, respondents generally exhibit a good level of awareness

and understanding of phishing-related issues. They show confidence in

identifying phishing attempts, checking website security, and understanding

the risks and consequences of falling for phishing scams. There is a high level

of consensus on the importance of not sharing sensitive information and

awareness of the potential theft associated with phishing scams.

RESPONSES

QUESTIONS 1 2 3 4 5 Total

I have experienced a cyber


57 48 16 13 6 140
worm attack before.
40.7 % 34.3 % 11.4 % 9.3 % 4.3 % 100.0 %

I know how cyber worms


17 27 31 45 20 140
spread in a network.
40

RESPONSES

QUESTIONS 1 2 3 4 5 Total
12.1 % 19.3 % 22.1 % 32.1 % 14.3 % 100.0 %

I know how to protect my


12 17 40 46 25 140
devices from cyber worms.
8.6 % 12.1 % 28.6 % 32.9 % 17.9 % 100.0 %

I know the common signs that


a device has been infected by 19 33 40 38 10 140
a cyber-worm.
13.6 % 23.6 % 28.6 % 27.1 % 7.1 % 100.0 %

I know about the recent major


cyber worm attacks and their 23 29 44 27 17 140
impacts.
16.4 % 20.7 % 31.4 % 19.3 % 12.1 % 100.0 %
Figure 12. Cyber-worms Result Tally

CYBER-WORMS

60
50
40
30
20
10
0
STRONGLY DISAGREE NEITHER AGREE STRONGLY
DISAGREE AGREE

Q1 Q2 Q3 Q4 Q5

Figure 13. Cyber-worms Bar Graph

The study reveals that a significant proportion of respondents (40.7%)

have experienced a cyber-worm attack, with knowledge about the spread,

protection, signs of infection, and recent major attacks varying among

respondents. The distribution of knowledge about how cyber worms spread in

a network varies among respondents, with 32.6% claiming to have knowledge

and 8.5% not. Regarding device protection, 34.0% expressing confidence in

knowing how to protect their devices, while 13.5% do not feel knowledgeable

about protection methods. The majority of respondents (29.8%) claim to know


41

common signs of infection, while 8.5% express uncertainty. Recent major

cyber worm attacks and their impacts are also known, with 32.6% claiming

knowledge about these attacks.

χ² Tests

Value df p

χ² 120 16 < .001

Figure 14. Cyber-worms χ² Tests

The x² test results indicate a strong association between the variables,

indicating that the responses to these questions are not independent.

In summary, the results suggest varying levels of experience and

knowledge among respondents regarding cyber worm attacks, with the x² test

highlighting a statistically significant association between the different aspects

explored in the questions.

Descriptives

95% Confidence
Interval

Mean SE Lower Upper Median Mode SD Variance

CYBER
3.95 0.0365 3.87 4.02 4.00 4.00 0.966 0.933
AWARENESS
IDENTITY
4.20 0.0361 4.13 4.27 4 5.00 0.957 0.915
THEFT
SPAMMING 4.30 0.0321 4.24 4.37 4 5.00 0.859 0.737
PHISHING 4.08 0.0356 4.01 4.15 4.00 5.00 0.943 0.889
WORMS 2.87 0.0482 2.77 2.96 3.00 3.00 1.279 1.637

Note. The CI of the mean assumes sample means follow a t-distribution with N - 1 degrees of
freedom

Figure 15. Descriptive Statistics

The mean (M) represents the average self-assessment score, and

higher values indicate a greater perceived awareness in each category.


42

Students, on average, rated their awareness highest in spamming, phishing,

and identity theft.

The standard error (SE) provides a measure of the precision of the

mean estimate. A lower SE indicates a more precise estimate. The small SE

values suggest that the mean estimates are likely reliable. 95% Confidence

Interval

(CI): The 95% CI gives a range within which the true population mean

is likely to fall.

Narrower CIs for spamming, phishing, and identity theft suggest more

precision in estimating the true awareness levels compared to cyber worms.

The median and mode offer insights into central tendency and the most

frequent response, respectively. Having the median and mode close to the

mean suggests a relatively symmetric distribution of self-assessment scores.

Standard deviation and variance indicate the spread or variability in

self-assessment scores. Cyber worms have a higher standard deviation and

variance, indicating greater variability or disagreement among students in

their self-assessment for this category.

The overall trend indicates that students feel more confident and self-

aware in their understanding of spamming, phishing, and identity theft.

Cyber worms exhibit more variability, suggesting a wider range of opinions or

uncertainties among students regarding their awareness in this area.


43

Correlation Matrix

CYBER IDENTITY
SPAMMING PHISHING WORMS
AWARENESS THEFT

CYBER Pearson's

AWARENESS r
df —
p-value —
95% CI

Upper
95% CI

Lower

IDENTITY Pearson's
0.708 *** —
THEFT r
df 695 —
p-value < .001 —
95% CI
0.743 —
Upper
95% CI
0.669 —
Lower

Pearson's
SPAMMING 0.718 *** 0.844 *** —
r
df 695 699 —
p-value < .001 < .001 —
95% CI
0.752 0.864 —
Upper
95% CI
0.680 0.822 —
Lower

Pearson's
PHISHING 0.711 *** 0.801 *** 0.720 *** —
r
df 698 695 695 —
p-value < .001 < .001 < .001 —
95% CI
0.745 0.826 0.754 —
Upper
95% CI
0.672 0.773 0.682 —
Lower

Pearson's
WORMS 0.639 *** 0.675 *** 0.694 *** 0.769 *** —
r
df 695 697 700 695 —
p-value < .001 < .001 < .001 < .001 —
95% CI
0.681 0.714 0.731 0.798 —
Upper
95% CI
0.593 0.633 0.654 0.737 —
Lower

Note. * p < .05, ** p < .01, *** p < .001

Figure 16. Pearson Correlation Matrix


44

The analysis of the correlation matrix reveals significant relationships

among various cyber security awareness variables. Cyber Awareness exhibits

strong positive correlations with Identity Theft (r = 0.708, p < .001), Spamming

(r = 0.718, p < .001), Phishing (r = 0.711, p < .001), and Worms (r = 0.639, p <

.001). These correlations suggest that as Cyber Awareness increases,

awareness of Identity Theft, Spamming, Phishing, and Worms also tends to

increase.

Furthermore, Identity Theft demonstrates very strong positive

correlations with Spamming (r = 0.844, p < .001), Phishing (r = 0.801, p

< .001), and moderate positive correlation with Worms (r = 0.675, p < .001).

The robust correlations underscore a consistent pattern where heightened

awareness of Identity Theft aligns with increased awareness of other cyber

threats.

Likewise, significant positive correlations are observed between

Spamming and Phishing (r = 0.720, p < .001), Spamming and Worms (r =

0.694, p < .001), as well as Phishing and Worms (r = 0.769, p < .001). These

correlations reinforce the notion that a higher awareness in one cyber security

aspect corresponds with elevated awareness in other areas.

Conclusively, based on the strong and significant positive correlations

found in the analysis, the null hypothesis (H0: There is no significant

relationship between cyber security awareness variables) is rejected in favor

of the alternative hypothesis (H1: There is a significant relationship between

cyber security awareness variables). This implies that an increase in

awareness of any particular cyber security aspect is associated with an

increase in awareness across various other cyber threats. The results


45

emphasize the interconnected nature of cyber security awareness,

highlighting the importance of holistic and comprehensive education in

mitigating diverse cyber threats.

H0: There is no significant relationship between cyber security awareness

among the Grade 12 Academic students.

The paper "A Study on Cybersecurity Awareness Among Students in Yobe

State University, Nigeria: A Quantitative Approach” presents results that

indicate the need for cyber security awareness among students at all levels,

thereby rejecting the hypothesis (Garba et al.)

CHAPTER III

SUMMARY, FINDINGS, CONCLUSION, AND RECOMMENDATIONS

This chapter sequentially presents the summary of the study, the

findings, conclusions, and recommendations offered.

Summary of Findings

The purpose of this study was to assess the level of cyber

security awareness among Grade 12 Academic Track students at Dr. Cecilio

Putong National High School. The results served as the basis for the

proposed intervention program. This study aims to answer the following


46

questions: What is the level of cyber security awareness of the Grade 12

Academic Track Students in terms of Identity Theft, Spamming, Phishing, and

Cyber Worms, how do students self-assess their awareness regarding identity

theft, spamming, phishing, and cyber worms, and if there’s a significant level

of cyber security awareness among the Grade 12 Academic students.

The location for the study is in Dr. Cecilio Putong National High School

or DCPNHS. With a total of 456 Academic Track Students, a Clustered

sampling was employed with 12 respondents from each section of HUMSS,

20 respondents from each section of STEM, and 20 respondents from ABM.

With a total of 140 survey respondents.

This study utilized a quantitative descriptive research design using

adapted questionnaires from various authors.

The results of the Cyber Security Awareness shows that majority of the

respondents understand cyber security, regularly educate themselves about

new types of cyber threats and best practices and are aware of the legal and

ethical implications of cyber-attacks. As for the results of Identity theft, it

reveals that 57.1% of respondents have a decent understanding of identity

theft, with 34.3% with moderate understanding. In the findings of spamming,

the study reveals that respondents are aware of spam-related issues,

emphasizing the rise of email spam and the potential consequences of lack of

recipient and sender verification. With phishing, they exhibit confidence in

spotting phishing efforts, vetting the security of websites, and comprehending

the dangers and repercussions of falling for phishing schemes. As for Cyber
47

Worms, finding shows a high percentage of 40.7% of the respondents not

being aware of cyber worms’ attack.

The relationship between cyber security awareness among the Grade 12

Academic students reveals that there is no significant relationship between

cyber security awareness among the Grade 12 Academic students as per

(Garba et al.) where results should indicate the need for cyber security

awareness among students at all levels, thereby rejecting the hypothesis.

Conclusion

Based on the results, the researchers concluded that grade 12

Academic Track students of Dr. Cecilio Putong National High School have a

reasonable level of cyber security awareness. It can be concluded that most

students are aware of the cyber security concerns and are active on ongoing

education about the emergence of cyber threats, keeping with the

cybersecurity emphasis on lifelong learning.

According to the findings, the study of Alshammari et al. (2021)

supports as the students' awareness of cybersecurity risks, including those

related to computer viruses like cyber worms, phishing, spamming, and

identity theft had and has an above average.

Recommendations

Considering the salient findings of the study, the following are hereby

recommended by the researcher:


48

Implement continuous monitoring and feedback mechanisms to track

changes in awareness over time. This will help in evaluating the effectiveness

of educational interventions and adjusting as needed.

Collaborate with cybersecurity experts or professionals to design

interventions and educational materials. Their insights can enhance the

content and relevance of awareness programs.

The lower awareness in cyber worms warrants targeted educational

efforts. Consider implementing additional educational modules, workshops, or

resources focused on cyber worms to enhance students' understanding.

REFERENCES
Alharbi, T., & Tassaddiq, A. (2021). Assessment of Cybersecurity Awareness
among Students of Majmaah University. Big Data and Cognitive
Computing, 5(2), 23. https://doi.org/10.3390/bdcc5020023

Ali, M. M., & Zaharon, N. F. M. (2022). Phishing—A Cyber fraud: The types,
implications and governance. International Journal of Educational
Reform, 33(1), 101–121. https://doi.org/10.1177/10567879221082966

Al-Janabi, S., & Al-Shourbaji, I. (2016). A study of cyber security awareness in


educational environment in the Middle East. Journal of Information &
Knowledge Management, 15(01), 1650007.
https://doi.org/10.1142/s0219649216500076

Alotaibi, F., Furnell, S., Stengel, I., & Papadaki, M. (2016). A survey of cyber-
security awareness in Saudi Arabia. 11th International Conference for
Internet Technology and Secured Transactions.
https://doi.org/10.1109/icitst.2016.7856687
Alzubaidi, A. (2021). Measuring the level of cyber-security awareness for
cybercrime in Saudi Arabia. Heliyon, 7(1), e06016.
https://doi.org/10.1016/j.heliyon.2021.e06016
49

Frauenstein, E. D., & Flowerday, S. (2016). Social network phishing:


Becoming habituated to clicks and ignorant to threats? Conference:
Information Security South AfricaAt: Rosebank, Johannesburg.
https://doi.org/10.1109/issa.2016.7802935

Golladay, K. A., & Holtfreter, K. (2017b). The Consequences of Identity Theft


Victimization: An examination of emotional and physical health
outcomes. Victims & Offenders, 12(5), 741–
760. https://doi.org/10.1080/15564886.2016.1177766

Khan, W. Z., Khan, M. K., Muhaya, F. T. B., Aalsalem, M. Y., & Chao, H.
(2015). A comprehensive study of email spam Botnet detection. IEEE
Communications Surveys and Tutorials, 17(4), 2271–2295.
https://doi.org/10.1109/comst.2015.2459015

Manasrah, A. M., Akour, M., & Alsukhni, E. M. (2015). Toward improving


university students awareness of spam email and cybercrime: Case
study of Jordan. First International Conference on Anti-Cybercrime
(ICACC). https://doi.org/10.1109/anti-cybercrime.2015.7351955

Rasheed, M. M., Norwawi, N. M., Ghazali, O., & Faaeq, M. K. (2019).


Detection algorithm for internet worms scanning that used user
datagram protocol. International Journal of Information and Computer
Security, 11(1), 17. https://doi.org/10.1504/ijics.2019.096847

Suganya, V. (2016). A review on phishing attacks and various anti phishing


techniques. International Journal of Computer Applications, 139(1), 20–
23. https://doi.org/10.5120/ijca2016909084

Wyre, M., & Lacey, D. (2020). The identity theft response system.
https://doi.org/10.52922/ti04299

Yeboah-Boateng, E. O., & Amanor, P. M. (2014). Phishing, SMiShing &


Vishing: An Assessment of Threats against Mobile Devices.
Department of Electronic Systems, 5(4), 297–307.
https://vbn.aau.dk/da/publications/phishing-smishing--
vishing(6289ebbb-00ef-453b-ad28-6f274a198770)/export.html

Zaharon, N. F. M., Ali, M. M., & Hasnan, S. (2021). Factors affecting


awareness of phishing among Generation Y. Asia-Pacific Management
Accounting Journal, 16(2), 409–444.
https://doi.org/10.24191/apmaj.v16i2-15

Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Çetin, F., & Basım, H. N.
(2020b). Cyber Security Awareness, Knowledge and Behavior: A
Comparative study. Journal of Computer Information Systems, 62(1),
82–97. https://doi.org/10.1080/08874417.2020.1712269
50

Appendix A

TRANSMITTAL LETTERS
51

Appendix B

INFORMED CONSENT FOR THE RESEARCH PARTICIPANTS


52

Appendix C
QUESTIONNAIRE

“AN EVALUATION OF THE LEVEL OF CYBER SECURITY AWARENESS


AMONG THE SENIOR HIGH SCHOOL ICT STRAND STUDENTS OF
DR.CECILIO PUTONG NATIONAL HIGH SCHOOL S. Y. 2023-2024 ”

Dear Respondent:
Thank you for participating in this research. This survey aims to
evaluate the level of cyber security awareness among Senior High School ICT
Strand students at Dr. Cecilio Putong National High School for the school year
2023-2024. Your honest responses are essential for a comprehensive
understanding of cyber security awareness. As our respondent, we humbly
ask for your participation in this survey which will only take approximately ten
to fifteen (10-15) minutes of your time. Your cooperation will be a great help to
us in completing this research study. Rest assured that your response will be
handled with outmost confidentiality. Thank you and God bless!
53

Please answer the following questions and thank you very much for
your time. Rest assured that your answers will be kept strictly confidential.
Sincerely yours,
The Researchers

Demographic Information:
1. Name (optional):_________________ 4. Age: __
2. Grade Level: __
- Animation
- CSS
3. Gender:
- Male
- Female
- Other (please specify): ____________

Directions: Please check and rate yourself based on the given statements
below using the following scales:

5 – Strongly Agree 4 – Agree 3 – Neither Agree or Disagree

2 – Disagree 1 – Strongly Disagree


Questionnaires

(1) (2) (3) (4) (5)


Item Description Strongly Disagree Neither Agree Strongly
Disagre Agree
e

Cyber Security Awareness


1. I understand what
cyber security is.
2. I regularly educate
myself about new
types of cyber
threats and best
practices for cyber
security.
3. I am aware of the
legal and ethical
implications of cyber
attacks.
54

4. I know how to use


antivirus software
and understand its
role in protecting
against cyber
threats.
5. I am aware of the
importance of using
secure networks
(e.g., VPN, secure
Wi-Fi) to protect
against cyber
threats.

Identity theft
1. I understand what
identity theft is.
2. I am aware of the
different methods
used in identity
theft.
3. I know the potential
consequences of
becoming a victim of
identity theft.
4. I use strong, unique
passwords for all my
online accounts to
prevent identity
theft.
5. I am careful about
sharing personal
information online to
prevent identity
theft.

Spamming
1. I know the importance
of keeping my email
address private to
avoid receiving spam.
2. I am aware that spam
can sometimes
contain malware or
links to malicious
websites.
3. I know the potential
risks and
consequences of
spamming.
55

4. I know how to identify


spam messages or
emails.
5. I understand what
spamming is.

Phishing
1. I know how to identify
phishing emails or
messages.
2. I know how to check if
a website is secure
(e.g., HTTPS, padlock
icon, etc.) to avoid
phishing scams.
3. I know the potential
risks and
consequences of
falling for a phishing
scam.
4. I know the importance
of not sharing
sensitive personal or
financial information
over email or phone
calls.
5. I understand what
phishing is.

Cyber Worms

1. I have experienced a
cyber worm attack
before.
2. I know how cyber
worms spread in a
network.
3. I know how to protect
my devices from cyber
worms.
4. I know the common
signs that a device has
been infected by a
cyber worm.
5. I know about the
recent major cyber
worm attacks and their
56

impacts.
57

CURRICULUM VITAE

CURICULUM VITAE

CABAONG, REA C.
Taloto, Tagbilaran City, Bohol
09918789927
[email protected]
58

Personal Background

Date of Birth: March 16, 2006

Place of Birth: Bocaue, Bulacan

Home Address: Basak, Taloto, Tagbilaran City, Bohol

Citizenship: Filipino

Civil Status: Single

Sex: Female

Educational Background

High School: Dr. Cecilio Putong National High School

Elementary: Booy Elementary School


59

CURICULUM VITAE

ENERO, CORCINE L.
Cogon, Tagbilaran City, Bohol
09108591786
[email protected]

Personal Background

Date of Birth: October 22, 2005

Place of Birth: Tagbilaran City

Home Address: Tamblot St., Tagbilaran City

Citizenship: Filipino

Civil Status: Single

Sex: Male

Educational Background

High School: Dr. Cecilio Putong National High School

Elementary: Tagbilaran City Central Elementary School


60

CURICULUM VITAE

MIGRIÑO, SAMANTHA FAITH U.


Mansasa, Tagbilaran City, Bohol
09560541795
[email protected]

Personal Background

Date of Birth: November 23, 2005

Place of Birth: Tagbilaran City

Home Address: Miguel Parras Extension Mansasa District Tagbilaran City

Citizenship: Filipino

Civil Status: Single

Sex: Female

Educational Background

High School: Dr. Cecilio Putong National High School

Elementary: City East Elementary School


61

CURICULUM VITAE

OCHARON, KLEINHUGH
ROTCIV R.
Agahay, Maribojoc, Bohol
09073717922
[email protected]

Personal Background

Date of Birth: August 3, 2006

Place of Birth: Tagbilaran Cit Bohol

Home Address: Sitio Baliwan, Purok 2, Agahay Maribojoc, Bohol

Citizenship: Filipino

Civil Status: Single

Sex: Male

Educational Background

High School: Dr. Cecilio Putong National High School

Elementary: Cabawan Elementary School, Maribojoc


62

CURICULUM VITAE

PILOTON, CEDRIC CLYDE L.


Totolan Dauis, Bohol
09923363927
[email protected]

Personal Background

Date of Birth: July 28, 2005

Place of Birth: Tagbilaran City

Home Address: Purok 2, Totolan Dauis, Bohol

Citizenship: Filipino

Civil Status: Single

Sex: Male

Educational Background

High School: Dr. Cecilio Putong National High School 2024

Elementary: Holy Name University


63

CURICULUM VITAE

SUGANOB, MARY GRACE C.


Totolan Dauis, Bohol
09079064489
[email protected]

Personal Background

Date of Birth: September 8, 2006

Place of Birth: Cambagui, Sevilla, Bohol

Home Address: Purok 2, Baha-baha, Totolan, Dauis, Bohol

Citizenship: Filipino

Civil Status: Single

Sex: Female

Educational Background

High School: Dr. Cecilio Putong National High School 2024

Elementary: Cambagui Elementary School


64

Prepared by:

DR. LEGARDO R. PALACA JR


Chairman, Division Technical Committee in Research

In Colloboration with:
DR. MARIA ANTOINNETE DUGANG
Education Program Supervisor in………….

Division Technical Committee in Research

Secondary Schools’ Research Coordinator

You might also like