Validated Survey Questionnaires
Validated Survey Questionnaires
Validated Survey Questionnaires
As the convergence of Internet technology evolves, faster access to easy and dynamic
virtual communication in the cyberworld has become a greater advantage of most people around
the world to create and find more opportunities and to build new relationships to most human
interests. Behind these opportunities, there are alarming threats follow behind that target
individual in most scenarios in the cyberworld. With regard to this, this study aims to:
• Identify several scenarios that one individual is vulnerable to several menace in the
cyberworld.
• Determine those forms of threats that are nimble to encounter in the cyber activities.
• Come up standards of threats in the cyberworld that will serve as preventive
measure to every Internet user as this study’s recommendation takes place.
Part I. Profile
Name (Optional):_________________________
Direction: Please put a check mark on your response based on your assessments with regards to
your behavior in surfing the internet treated as risky scenarios.
Level Description
5 Excellent. When the behavior is extremely practiced.
4 Very Good. When the behavior is highly practiced.
3 Good. When the behavior is moderate of being practiced.
2 Fair. When the behavior is below moderate of being practiced.
1 Poor. When the behavior is never being practiced.
Online-Chatting
1. Responding with messages in e-mail accounts coming from
anonymous sender
2. Conversing with online strangers using Instant Message (IM)
and other chat applications such as Yahoo Messenger (YM),
iChat, skype, and other sites that has chatting features.
3. Sending personal photos to strangers online.
4. Placing new friends or strangers on buddy lists or list of
friends
Online File sharing
5. Uploading of files to untrusted sites
6. Downloading of files from untrusted or anonymous source
Online Profile Sharing
7. Posting personal information such as name, address, age,
gender, e-mail, and others that do not required at all.
8. Posting of personal photos/pictures and other materials that
can be accessible by anyone
9. Not using of strict privacy settings on accounts on social
networking sites(e.g. facebook and friendster) and gaming
sites(e.g. ragnarok and pokemoncrater)
Website subscribing
10. Signing-up regardless of website's reliability and credibility
11. Wanting to use only short and easy to recognize passwords
Direction: Please put a check mark on your response based on your assessments in regards with
your awareness in threats against individual posing in the cyberworld.
Level Description
5 Excellent. When the awareness with the threat is extremely high.
4 Very Good. When the awareness with the threat is high.
3 Good. When the awareness with the threat is average.
2 Fair. When the awareness with the threat is below average.
1 Poor. When never aware with the threat.
Forms of threats 5 4 3 2 1
Direction: Please put a check mark on your response based on your assessments with regards to
your assessment to cyber threats posing in the cyberworld.
Level Description
5 Excellent. When the confidence of being protected is extremely
high.
4 Very Good. When the confidence of being protected is high.
3 Good. When the confidence of being protected is uncertain.
2 Fair. When the confidence of being protected is low.
1 Poor. When the confidence of being protected is very low.
Level Description
5 Excellent. When the agreement with the issue is extremely strong.
4 Very Good. When the agreement with the issue is strong.
3 Good. When the agreement with the issue is undecided.
2 Fair. When the agreement with the issue is low.
1 Poor. When the agreement with the issue is very low.