Validated Survey Questionnaires

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

Introduction:

As the convergence of Internet technology evolves, faster access to easy and dynamic
virtual communication in the cyberworld has become a greater advantage of most people around
the world to create and find more opportunities and to build new relationships to most human
interests. Behind these opportunities, there are alarming threats follow behind that target
individual in most scenarios in the cyberworld. With regard to this, this study aims to:

• Identify several scenarios that one individual is vulnerable to several menace in the
cyberworld.
• Determine those forms of threats that are nimble to encounter in the cyber activities.
• Come up standards of threats in the cyberworld that will serve as preventive
measure to every Internet user as this study’s recommendation takes place.

Survey Questionnaire on “Scenarios in the Cyberworld Exposing USeP


Fourth Year IC Students to Vulnerable Menace: Assessment”

Part I. Profile

Direction: Please fill in the following information.

Name (Optional):_________________________

Part II. Survey Questions

Direction: Please put a check mark on your response based on your assessments with regards to
your behavior in surfing the internet treated as risky scenarios.

Level Description
5 Excellent. When the behavior is extremely practiced.
4 Very Good. When the behavior is highly practiced.
3 Good. When the behavior is moderate of being practiced.
2 Fair. When the behavior is below moderate of being practiced.
1 Poor. When the behavior is never being practiced.

Risky behaviors in surfing the Internet which commonly known as 5 4 3 2 1


cyberworld

Online-Chatting
1. Responding with messages in e-mail accounts coming from
anonymous sender
2. Conversing with online strangers using Instant Message (IM)
and other chat applications such as Yahoo Messenger (YM),
iChat, skype, and other sites that has chatting features.
3. Sending personal photos to strangers online.
4. Placing new friends or strangers on buddy lists or list of
friends
Online File sharing
5. Uploading of files to untrusted sites
6. Downloading of files from untrusted or anonymous source
Online Profile Sharing
7. Posting personal information such as name, address, age,
gender, e-mail, and others that do not required at all.
8. Posting of personal photos/pictures and other materials that
can be accessible by anyone
9. Not using of strict privacy settings on accounts on social
networking sites(e.g. facebook and friendster) and gaming
sites(e.g. ragnarok and pokemoncrater)
Website subscribing
10. Signing-up regardless of website's reliability and credibility
11. Wanting to use only short and easy to recognize passwords

Direction: Please put a check mark on your response based on your assessments in regards with
your awareness in threats against individual posing in the cyberworld.

Level Description
5 Excellent. When the awareness with the threat is extremely high.
4 Very Good. When the awareness with the threat is high.
3 Good. When the awareness with the threat is average.
2 Fair. When the awareness with the threat is below average.
1 Poor. When never aware with the threat.

Forms of threats 5 4 3 2 1

1. Identity theft. It involves someone pretending to be someone


else onilne in order to steal money or get other benefits.
2. Spammers. People keep on sending junk mails and other
unsolicited mails.
3. Pornography. Depiction of explicit sexual subject matter for
the purposes of sexual excitement.
4. Spyware. It is a software made by a person or group of people
that gathers information about people without their knowledge
and it tracks your movements and habits on the Web.

5. Cyberstalker. A person who followed and pursued online


someone else.
6. Internet Sales Fraud. It refers generally to any type of fraud
scheme that uses one or more components of the Internet such
as chat rooms, e-mail, message boards, or Web sites to present
fraudulent solicitations to prospective victims or to other
connected with the scheme.
7. Chain Letters. Consist of a message that attempts to induce
the recipient to make a number of copies of the letter and then
pass them on to as many recipients as possible.
8. Cyberbullying. It is being cruel to others by sending or
posting harmful material or engaging in other forms of social
cruelty using the Internet or other digital technologies.

Direction: Please put a check mark on your response based on your assessments with regards to
your assessment to cyber threats posing in the cyberworld.

Level Description
5 Excellent. When the confidence of being protected is extremely
high.
4 Very Good. When the confidence of being protected is high.
3 Good. When the confidence of being protected is uncertain.
2 Fair. When the confidence of being protected is low.
1 Poor. When the confidence of being protected is very low.

Assess of Internet users to cyber threats 5 4 3 2 1

1. Invasions of privacy can cause major damage to the


confidentiality of the users
2. Exposure to material considered to be pornographic, violent,
hate-filled, racist or generally offensive
3. Temptation to participate in on-line gambling

4. Vulnerability to exploitation, such as the physical or emotional


abuse of young individual
5. Harassment, including spamming, stalking and other related
threats
Direction: Please put a check mark on your response based on your assessments with regards to
your assessment in international cyber laws issues.

Level Description
5 Excellent. When the agreement with the issue is extremely strong.
4 Very Good. When the agreement with the issue is strong.
3 Good. When the agreement with the issue is undecided.
2 Fair. When the agreement with the issue is low.
1 Poor. When the agreement with the issue is very low.

Assess of Internet users to international cyber laws issues. 5 4 3 2 1

1. Domestic and international law enforcers take cybercrime as a


continuous challenge.
2. Outdated laws and regulations, weak enforcement mechanisms
for protecting networked information and human rights are
one of missing focus of law enforcers.
3. Inability to prosecute the cyber criminals is a result of
disregarding the immediate implementation of cybercrime
law.
4. Improper implementations of cybercrime laws compromise
the availability, authenticity, integrity and confidentiality of
information systems.
5. Absence of cybercrime laws threaten to disturb the stable and
secure activities in the Internet.

Thank You Very Much!

You might also like