Validated Survey Questionnaires

6
Introduction: As the convergence of Internet technology evolves, faster access to easy and dynamic virtual communication in the cyberworld has become a greater advantage of most people around the world to create and find more opportunities and to build new relationships to most human interests. Behind these opportunities, there are alarming threats follow behind that target individual in most scenarios in the cyberworld. With regard to this, this study aims to: Identify several scenarios that one individual is vulnerable to several menace in the cyberworld. Determine those forms of threats that are nimble to encounter in the cyber activities. Come up standards of threats in the cyberworld that will serve as preventive measure to every Internet user as this study’s recommendation takes place. Survey Questionnaire on “Scenarios in the Cyberworld Exposing USeP Fourth Year IC Students to Vulnerable Menace: AssessmentPart I. Profile Direction: Please fill in the following information. Name (Optional):_________________________ Part II. Survey Questions Direction: Please put a check mark on your response based on your assessments with regards to your behavior in surfing the internet treated as risky scenarios. Leve l Description

description

Survey Instrument - Survey Questionnaire

Transcript of Validated Survey Questionnaires

Page 1: Validated Survey Questionnaires

Introduction:

As the convergence of Internet technology evolves, faster access to easy and dynamic virtual communication in the cyberworld has become a greater advantage of most people around the world to create and find more opportunities and to build new relationships to most human interests. Behind these opportunities, there are alarming threats follow behind that target individual in most scenarios in the cyberworld. With regard to this, this study aims to:

Identify several scenarios that one individual is vulnerable to several menace in the cyberworld.

Determine those forms of threats that are nimble to encounter in the cyber activities. Come up standards of threats in the cyberworld that will serve as preventive

measure to every Internet user as this study’s recommendation takes place.

Survey Questionnaire on “Scenarios in the Cyberworld Exposing USeP Fourth Year IC Students to Vulnerable Menace: Assessment”

Part I. Profile

Direction: Please fill in the following information.

Name (Optional):_________________________

Part II. Survey Questions

Direction: Please put a check mark on your response based on your assessments with regards to your behavior in surfing the internet treated as risky scenarios.

Level Description

5 Excellent. When the behavior is extremely practiced.4 Very Good. When the behavior is highly practiced.3 Good. When the behavior is moderate of being practiced.2 Fair. When the behavior is below moderate of being practiced.1 Poor. When the behavior is never being practiced.

Risky behaviors in surfing the Internet which commonly known as cyberworld

5 4 3 2 1

Online-Chatting

1. Responding with messages in e-mail accounts coming from anonymous sender

Page 2: Validated Survey Questionnaires

2. Conversing with online strangers using Instant Message (IM) and other chat applications such as Yahoo Messenger (YM), iChat, skype, and other sites that has chatting features.

3. Sending personal photos to strangers online.

4. Placing new friends or strangers on buddy lists or list of friendsOnline File sharing

5. Uploading of files to untrusted sites

6. Downloading of files from untrusted or anonymous source

Online Profile Sharing

7. Posting personal information such as name, address, age, gender, e-mail, and others that do not required at all.

8. Posting of personal photos/pictures and other materials that can be accessible by anyone

9. Not using of strict privacy settings on accounts on social networking sites(e.g. facebook and friendster) and gaming sites(e.g. ragnarok and pokemoncrater) Website subscribing

10. Signing-up regardless of website's reliability and credibility

11. Wanting to use only short and easy to recognize passwords

Direction: Please put a check mark on your response based on your assessments in regards with your awareness in threats against individual posing in the cyberworld.

Level Description

5 Excellent. When the awareness with the threat is extremely high.4 Very Good. When the awareness with the threat is high.3 Good. When the awareness with the threat is average.2 Fair. When the awareness with the threat is below average.1 Poor. When never aware with the threat.

Forms of threats 5 4 3 2 1

1. Identity theft. It involves someone pretending to be someone else onilne in order to steal money or get other benefits.

2. Spammers. People keep on sending junk mails and other unsolicited mails.

3. Pornography. Depiction of explicit sexual subject matter for the purposes of sexual excitement.

Page 3: Validated Survey Questionnaires

4. Spyware. It is a software made by a person or group of people that gathers information about people without their knowledge and it tracks your movements and habits on the Web.

5. Cyberstalker. A person who followed and pursued online someone else.

6. Internet Sales Fraud. It refers generally to any type of fraud scheme that uses one or more components of the Internet such as chat rooms, e-mail, message boards, or Web sites to present fraudulent solicitations to prospective victims or to other connected with the scheme.

7. Chain Letters. Consist of a message that attempts to induce the recipient to make a number of copies of the letter and then pass them on to as many recipients as possible.

8. Cyberbullying. It is being cruel to others by sending or posting harmful material or engaging in other forms of social cruelty using the Internet or other digital technologies.

Direction: Please put a check mark on your response based on your assessments with regards to your assessment to cyber threats posing in the cyberworld.

Level Description

5 Excellent. When the confidence of being protected is extremely high.

4 Very Good. When the confidence of being protected is high.3 Good. When the confidence of being protected is uncertain.2 Fair. When the confidence of being protected is low.1 Poor. When the confidence of being protected is very low.

Assess of Internet users to cyber threats 5 4 3 2 1

1. Invasions of privacy can cause major damage to the confidentiality of the users

2. Exposure to material considered to be pornographic, violent, hate-filled, racist or generally offensive

3. Temptation to participate in on-line gambling

4. Vulnerability to exploitation, such as the physical or emotional abuse of young individual

5. Harassment, including spamming, stalking and other related threats

Page 4: Validated Survey Questionnaires

Direction: Please put a check mark on your response based on your assessments with regards to your assessment in international cyber laws issues.

Level Description

5 Excellent. When the agreement with the issue is extremely strong.4 Very Good. When the agreement with the issue is strong.3 Good. When the agreement with the issue is undecided.2 Fair. When the agreement with the issue is low.1 Poor. When the agreement with the issue is very low.

Assess of Internet users to international cyber laws issues. 5 4 3 2 1

1. Domestic and international law enforcers take cybercrime as a continuous challenge.

2. Outdated laws and regulations, weak enforcement mechanisms for protecting networked information and human rights are one of missing focus of law enforcers.

3. Inability to prosecute the cyber criminals is a result of disregarding the immediate implementation of cybercrime law.

4. Improper implementations of cybercrime laws compromise the availability, authenticity, integrity and confidentiality of information systems.

5. Absence of cybercrime laws threaten to disturb the stable and secure activities in the Internet.

Thank You Very Much!