Documente Academic
Documente Profesional
Documente Cultură
Findings
1. Out of the eleven identified risky behaviors in the cyberworld, eight
risky behaviors are identified as being moderately practiced by the
average of the fourth year IC students based on their respective
average weighted mean result, such as;
• Posting of personal photos/pictures and other materials that can be
accessible by anyone; with the average of 3.09
• Downloading of files from untrusted or anonymous source; with the
average of 2.91
• Signing-up regardless of website's reliability and credibility; with the
average of 2.87
• Not using of strict privacy settings on accounts on social networking
sites and gaming sites; with the average of 2.83
• Placing new friends or strangers on buddy lists or list of friends;
with the average of 2.77
• Conversing with online strangers using Instant Message (IM) and
other chat applications; with the average of 2.74
• Posting personal information such as name, address, age, gender,
e-mail, and others that do not required at all; with the average of
2.72
• Wanting to use only short and easy to recognize passwords; with
the average of 2.7
39
While there are only three risky behaviors in the cyberworld are
identified as below moderately practiced by the average of the fourth
year IC students with their respective average weighted mean result,
such as;
• Uploading of files to untrusted sites; with the average of 2.49
• Responding with messages in e-mail accounts coming from
anonymous sender; with the average of 2.04
• Sending personal photos to strangers online; with the average
of 1.64
While the over all average of 3.23 on assess of Internet users to cyber
threats is referred as uncertain.
Conclusions
40
Signing-up regardless of website's reliability and credibility
Not using of strict privacy settings on accounts on social
networking sites and gaming sites
Placing new friends or strangers on buddy lists or list of friends
Conversing with online strangers using Instant Message (IM)
and other chat applications
Posting personal information such as name, address, age,
gender, e-mail, and others that do not required at all
Wanting to use only short and easy to recognize passwords
41
Recommendations
1. The fourth year IC students and other Internet surfer as well that they
should have more clear awareness and understanding about surfing
the Internet. They may ask help from any person whom they know is
trusted, more experienced in surfing the Internet, and skilled enough in
technical stuff in the Internet because cyber threats are active to
attack the Internet surfers who are ignorant in the cyberworld.
2. In surfing the Internet, students and other Internet users must initiate to
think to before clicking any stuff in the cyberspace. Read carefully the
texts that are linked or the content of the web where you about to surf
with because cyber threats are deceiving in nature.
3. Students must choose only the sites they know or suggested by friends
that are reliable and credible to surf with that provides relative,
accurate and useful information to its users because cyber threats are
inevitable.
5. Students should restrict any details of their personal profile from being
visible through a public search engine to make sure the privacy of your
profile is safe and guarded. They should keep their files such as
42
personal pictures, documents and other materials not accessible by
anyone online because cyber threats are certainly destructive.
43