Sunteți pe pagina 1din 5

Chapter V

SUMMARY OF FINDINGS, CONCLUSION AND


RECOMMENDATIONS

In this chapter, the researcher presented the summary of findings,


conclusions and recommendations of the study.

Findings
1. Out of the eleven identified risky behaviors in the cyberworld, eight
risky behaviors are identified as being moderately practiced by the
average of the fourth year IC students based on their respective
average weighted mean result, such as;
• Posting of personal photos/pictures and other materials that can be
accessible by anyone; with the average of 3.09
• Downloading of files from untrusted or anonymous source; with the
average of 2.91
• Signing-up regardless of website's reliability and credibility; with the
average of 2.87
• Not using of strict privacy settings on accounts on social networking
sites and gaming sites; with the average of 2.83
• Placing new friends or strangers on buddy lists or list of friends;
with the average of 2.77
• Conversing with online strangers using Instant Message (IM) and
other chat applications; with the average of 2.74
• Posting personal information such as name, address, age, gender,
e-mail, and others that do not required at all; with the average of
2.72
• Wanting to use only short and easy to recognize passwords; with
the average of 2.7

39
While there are only three risky behaviors in the cyberworld are
identified as below moderately practiced by the average of the fourth
year IC students with their respective average weighted mean result,
such as;
• Uploading of files to untrusted sites; with the average of 2.49
• Responding with messages in e-mail accounts coming from
anonymous sender; with the average of 2.04
• Sending personal photos to strangers online; with the average
of 1.64
While the over all average of 3.23 on assess of Internet users to cyber
threats is referred as uncertain.

2. Out of eight determined forms of threats, average of the fourth year IC


students are highly aware with the seven of them based on their
average weighted mean result such as; spammers: with the average of
4.17, pornography: with the average of 4.04, chain letters: with the
average of4.01, identity theft: with the average of, spyware: 3.74,
Internet sales fraud: with the average of3.74 and cyberbullying: with
the average of 3.51. While the over all average of 3.61 on assess of
Internet users to the state of international cybercrime law issues is
referred as strong with regards to the agreement with the issues.

Conclusions

1. These eight risky behaviors in the cyberwold in the following are


the scenarios that a fourth year IC student - one individual is
vulnerable to several menace:
 Posting of personal photos/pictures and other materials that can
be accessible by anyone
 Downloading of files from untrusted or anonymous source

40
 Signing-up regardless of website's reliability and credibility
 Not using of strict privacy settings on accounts on social
networking sites and gaming sites
 Placing new friends or strangers on buddy lists or list of friends
 Conversing with online strangers using Instant Message (IM)
and other chat applications
 Posting personal information such as name, address, age,
gender, e-mail, and others that do not required at all
 Wanting to use only short and easy to recognize passwords

When a certain risky behavior is frequently practiced and uncertain


with how to protect oneself against those cyber threats, that’s the
time that one individual who is the actor of the behavior becomes
vulnerable to several menace in the cyberworld.

2. These seven forms of threats in the following are nimble to


encounter in the cyber activities:
 Spammers
 Pornography
 Chain Letters
 Identity Theft
 Spyware
 Internet Sales Fraud
 Cyberbullying

Those forms of threats presented as nimble to encounter in the


cyberworld are thought as have contributing factor to the issues in
the state of international cybercrime laws.

41
Recommendations

1. The fourth year IC students and other Internet surfer as well that they
should have more clear awareness and understanding about surfing
the Internet. They may ask help from any person whom they know is
trusted, more experienced in surfing the Internet, and skilled enough in
technical stuff in the Internet because cyber threats are active to
attack the Internet surfers who are ignorant in the cyberworld.

2. In surfing the Internet, students and other Internet users must initiate to
think to before clicking any stuff in the cyberspace. Read carefully the
texts that are linked or the content of the web where you about to surf
with because cyber threats are deceiving in nature.

3. Students must choose only the sites they know or suggested by friends
that are reliable and credible to surf with that provides relative,
accurate and useful information to its users because cyber threats are
inevitable.

4. As a responsible Internet users, students must use different strong


passwords in their respective accounts especially in e-mail accounts
and social networking accounts and do not entertain any stranger
people online that appear malicious because cyber threats are wise
and malicious.

5. Students should restrict any details of their personal profile from being
visible through a public search engine to make sure the privacy of your
profile is safe and guarded. They should keep their files such as

42
personal pictures, documents and other materials not accessible by
anyone online because cyber threats are certainly destructive.

43

S-ar putea să vă placă și