AWARENESS OF THE ANTI-PHOTO AND VIDEO VOYEURISM ACT OF 2009 (RA 9995) IN SELECTED UNIVERSITIES IN PALAWAN
DOI:
https://doi.org/10.55687/ste.v2i2.64Keywords:
Cybercrime Law s, Voyeuristic Behavior, Cyber Ethics, Voyeuristic BehaviorsAbstract
The early exposure of individuals to the use of technology may lead to the dangers of internet pornography sites and materials. Since scrolling social media platforms has become a pastime of every learner in this generation, it is essential to guide them to have responsible online conduct and avoid voyeuristic behaviors. Thus, this study aimed to determine the level of awareness of the learners in the existence of laws that can protect or prohibit them from such violence, specifically the Anti-Photo and Video Voyeurism Act of 2009 (RA 9995). This study adopted a descriptive research design and employed a random sampling technique to select 100 respondents from three universities in Palawan. The survey instruments utilized in this investigation were disseminated via survey forms using Google Forms. The descriptive analysis was used to identify respondents' awareness levels in RA 9995. Findings revealed that respondents' level of awareness about the law was "not aware," which means that most of them are unaware of the existence of RA 9995. The study's findings would reference the faculty and staff of the College Universities in Puerto Princesa, Palawan, if possible, in their extension program.
References
Ahmad, R., & Ramayah, T. (2022). A systematic literature review of routine activity theory's applicability in cybercrimes. Journal of Cyber Security and Mobility, 11(3), 405-432. https://doi.org/10.13052/jcsm2245-1439.1133
Ali, Z., & Park, U. (2019). Face spoofing attack detection using spatial frequency and gradient-based descriptor. Ksii Transactions on Internet and Information Systems, 13(2). https://doi.org/10.3837/tiis.2019.02.022
Alastal, A., & Shaqfa, A. (2023). Enhancing police officers' cybercrime investigation skills using a checklist tool. Journal of Data Analysis and Information Processing, 11(02), 121-143. https://doi.org/10.4236/jdaip.2023.112008
Alzubaidi, A. (2021). Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Heliyon, 7(1), e06016. https://doi.org/10.1016/j.heliyon.2021.e06016
Amankwa, E. (2021). Relevance of cybersecurity education at pedagogy levels in schools. Journal of Information Security, 12(04), 233-249. https://doi.org/10.4236/jis.2021.124013
Anti-Photo and Video Voyeurism Act of 2009, Republic Act No. 9995. (2009). The LAWphil Project, Arellano Law Foundation, Philippine Laws and Jurisprudence Databank. https://lawphil.net/statutes/repacts/ra2010/ra_9995_2010.html
Arpaci, I., & Ateş, E. (2022). Development of the cybercrime awareness scale (CAS): A validity and reliability study in a Turkish sample. Online Information Review, 47(4), 633-643. https://doi.org/10.1108/oir-01-2022-0023
Bukola, O., Oluwatoyin, O., & Theresa, M. (2020). Awareness, knowledge and utilization of hypertension management techniques among rural dwellers in Ijebu-North East Local Government Area of Ogun State, Nigeria. Journal of Hypertension and Management, 6(2). https://doi.org/10.23937/2474-3690/1510051
Cai, B. (2022). The construction strategy of a new model of college students' psychological education under the network environment. Journal of Environmental and Public Health, 1-11. https://doi.org/10.1155/2022/1952840
Chatterjee, S., Kar, A., Dwivedi, Y., & Kizgin, H. (2019). Prevention of cybercrimes in smart cities of India: From a citizen's perspective. Information Technology and People, 32(5), 1153-1183. https://doi.org/10.1108/itp-05-2018-0251
Curtis, J., & Oxburgh, G. (2022). Understanding cybercrime in 'real world' policing and law enforcement. The Police Journal Theory Practice and Principles, 96(4), 573-592. https://doi.org/10.1177/0032258x221107584
Ebiefung, R. and Adetimirin, A. (2021). Cyber ethics adherence and the use of electronic information resources by undergraduates in public universities in Akwa Ibom State, Nigeria. Digital Library Perspectives, 37(4), 349-365. https://doi.org/10.1108/dlp-08-2020-0080
Faklaris, C., Cafaro, F., Blevins, A., O'Haver, M., & Singhal, N. (2020). A snapshot of bystander attitudes about mobile live-streaming video in public settings. Informatics, 7(2), 10. https://doi.org/10.3390/informatics7020010
Filinovych, V. (2020). Problems of human rights violations caused by cybercrimes and ways to overcome them. Scientific Works of National Aviation University Series Law Journal Air and Space Law, 3(56). https://doi.org/10.18372/2307-9061.56.14904
Fissel, E., & Lee, J. (2023). The cybercrime illusion: Examining the impact of cybercrime misbeliefs on perceptions of cybercrime seriousness. Journal of Criminology, 56(2-3), 150-169. https://doi.org/10.1177/26338076231174639
Hameed, I., Mubarik, M., Khan, K., & Waris, I. (2022). Can your smartphone make you a tourist? Mine does: Understanding the consumer's adoption mechanism for mobile payment system. Human Behavior and Emerging Technologies, volume 2022, Article ID 4904686. https://doi.org/10.1155/2022/4904686
Igbinovia, M. and Ishola, B. (2023). Cyber security in university libraries and implication for library and information science education in Nigeria. Digital Library Perspectives, 39(3), 248-266. https://doi.org/10.1108/dlp-11-2022-0089
James, C., Strevens, C., Field, R., & Wilson, C. (2019). Student well-being through teacher well-being: A study with law teachers in the UK and Australia. Student Success, 10(3), 76-83. https://doi.org/10.5204/ssj.v10i3.1338
Kalınkara, Y. (2023). Anatomy in the metaverse: exploring student technology acceptance through the utaut2 model. Anatomical Sciences Education, 17(2), 319-336. https://doi.org/10.1002/ase.2353
Kemp, S., Buil‐Gil, D., Moneva, A., Miró-Llinares, F., & Díaz-Castaño, N. (2021). Empty streets, busy internet: A time-series analysis of cybercrime and fraud trends during COVID-19. Journal of Contemporary Criminal Justice, 37(4), 480-501. https://doi.org/10.1177/10439862211027986
Khan, S., Saleh, T., Dorasamy, M., Khan, N., Leng, O., & Vergara, R. (2022). A systematic literature review on cybercrime legislation. F1000research, 11, 971. https://doi.org/10.12688/f1000research.123098.1
Langgaman, A. (2020). Loneliness and anxiousness as predictors of Facebook use among college students. International Journal of English Literature and Social Sciences, 5(6), 2534-2538. https://doi.org/10.22161/ijels.56.93
Lazarus, S., Button, M., & Kapend, R. (2022). Exploring the value of feminist theory in understanding digital crimes: gender and cybercrime types. The Howard Journal of Crime and Justice, 61(3), 381-398. https://doi.org/10.1111/hojo.12485
Lee, J., Holt, T., Burruss, G., & Bossler, A. (2019). Examining English and Welsh detectives' views of online crime. International Criminal Justice Review, 31(1), 20-39. https://doi.org/10.1177/1057567719846224
Lewczuk, K., Wójcik, A., & Gola, M. (2021). Increase in the prevalence of online pornography use: Objective data analysis from the period between 2004 and 2016 in Poland. Archives of Sexual Behavior, 51(2), 1157-1171. https://doi.org/10.1007/s10508-021-02090-w
Malik, M., & Islam, U. (2019). Cybercrime: An emerging threat to the banking sector of Pakistan. Journal of Financial Crime, 26(1), 50-60. https://doi.org/10.1108/jfc-11-2017-0118
Marcum, C., Zaitzow, B., & Higgins, G. (2021). The role of sexting and related behaviors to victimization via nonconsensual pornography: An exploratory analysis of university students. Journal of Aggression Conflict and Peace Research, 14(1), 43-60. https://doi.org/10.1108/jacpr-02-2021-0578
Mahrina, M., Sasmito, J., & Zonyfar, C. (2023). The electronic and transactions law (EIT law) as the first cybercrime law in Indonesia: an introduction and its implementation. Pena Justisia Media Komunikasi Dan Kajian Hukum, 21(2), 345-362. https://doi.org/10.31941/pj.v21i2.2680
Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P., & Glenn, T. (2021). Increasing cybercrime since the pandemic: concerns for psychiatry. Current Psychiatry Reports, 23(4). https://doi.org/10.1007/s11920-021-01228-w
Moneva, A. (2023). The effect of online ad campaigns on ddos‐attacks: A cross‐national difference-in-differences quasi‐experiment. Criminology & Public Policy, 22(4), 869-894. https://doi.org/10.1111/1745-9133.12649
Mohammadi, Z., Darderafshi, S., Akhlaghi, M., & Makvandi, Z. (2021). The relationship between ethical awareness in nursing profession, and moral sensitivity in nurses of Hamadan University of Medical Sciences, Iran. Research Square. https://doi.org/10.21203/rs.3.rs-898410/v1
Mula, R., & Bucar, J. (2023). Department of Education Computerization Program (DCP): Its effectiveness and problems encountered in school personnel's computer literacy. International Journal of Multidisciplinary Applied Business and Education Research, 4(4), 1221-1250. https://doi.org/10.11594/ijmaber.04.04.19
Mupila, F., Gupta, H., & Bhardwaj, A. (2023). An empirical study on cybercrimes and cybersecurity awareness. Research Square. https://doi.org/10.21203/rs.3.rs-3037289/v1
Mwiraria, D., Ngetich, F., & Mwaeke, P. (2022). Factors associated with cybercrime awareness among university students in Egerton University, Njoro Campus, Nakuru County, Kenya. European Journal of Humanities and Social Sciences, 2(3), 63-68. https://doi.org/10.24018/ejsocial.2022.2.3.256
Nishnianidze, A. (2023). Some new challenges of cybercrime and the reason for its outdated regulations. European Scientific Journal, 19(39), 92. https://doi.org/10.19044/esj.2023.v19n39p92
Opadeyi, A., Fourrier‐Réglat, A., & Isah, A. (2019). Educational intervention to improve the knowledge, attitude and practice of healthcare professionals regarding pharmacovigilance in south-south Nigeria. Therapeutic Advances in Drug Safety, 10, 204209861881627. https://doi.org/10.1177/2042098618816279
Paek, S., Nalla, M., & Lee, J. (2020). Determinants of police officers' support for the public-private partnerships (PPPs) in policing cyberspace. Policing an International Journal, 43(5), 877-892. https://doi.org/10.1108/pijpsm-06-2020-0088
Paek, S., Nalla, M., Chun, Y., & Lee, J. (2021). The perceived importance of cybercrime control among police officers: Implications for combatting industrial espionage. Sustainability, 13(8), 4351. https://doi.org/10.3390/su13084351
Palassis, A., Speelman, C., & Pooley, J. (2021). An exploration of the psychological impact of hacking victimization. Sage Open, 11(4), Article 215824402110615. https://doi.org/10.1177/21582440211061556
Pentang, J. T. (2023, May 10). Quantitative research instrumentation for educators. Lecture Series on Research Process and Publication, Wesleyan University – Philippines. http://dx.doi.org/10.13140/RG.2.2.21153.28004
Prasetiyo, W., Sumardjoko, B., Muhibbin, A., Naidu, N., & Muthali'in, A. (2023). Promoting digital citizenship among student-teachers: the role of project-based learning in improving appropriate online behaviors. Participatory Educational Research, 10(1), 389-407. https://doi.org/10.17275/per.23.21.10.1
Proença, H. (2022). The UU-Net: Reversible face de-identification for visual surveillance video footage. IEEE Transactions on Circuits and Systems for Video Technology, 32(2), 496-509. https://doi.org/10.1109/tcsvt.2021.3066054
Prestoza, M. J. (2024). Assessing remote learning’s feasibility: A comprehensive analysis of Philippine public-school teachers’ use of learning management systems and blended learning approaches. Journal of Research, Policy & Practice of Teachers and Teacher Education, 14(1), 21–27. https://doi.org/10.37134/jrpptte.vol14.1.3.2024
PRESTOZA, M.-J. (2022). 3ES (EXPLORE ENLIGHTEN EXERCISE) LEARNING WORKSHEET: ITS’ EFFECTS TO THE ACADEMIC PERFORMANCE IN IDENTIFYING RESEARCH PROBLEMS AMONG SENIOR HIGH SCHOOL. International Journal of Arts, Sciences and Education, 3(1), 166–173. Retrieved from https://ijase.org/index.php/ijase/article/view/105
Richards, D., Khan, S., Formosa, P., & Bankins, S. (2022). The influence of ethical principles and policy awareness priming on university students' judgements about ICT code of conduct compliance. Organizational Cybersecurity Journal Practice Process and People, 2(2), 134- 161. https://doi.org/10.1108/ocj-01-2022-0001
Sharp, L., Robertson, M., Piper, R., Young, T., & Raymond, R. (2019). How do literacy teacher educators engage as literacy leaders? The Advocate, 25(1), Article no. 1134. https://doi.org/10.4148/2637-4552.1134
Sheveleva, A. (2020). The university teachers' professional ethics from the students' perspective. E3s Web of Conferences, 210, 18075. https://doi.org/10.1051/e3sconf/202021018075
Ullah, A., Atta, M., & Ayaz, M. (2020). Teachers' humanistic role regarding students guidance. Global Social Sciences Review, 5(1), 248-259. https://doi.org/10.31703/gssr.2020(v-i).26
Usman, M., Yu, Z., & Komulainen, J. (2021). Self-supervised 2d face presentation attack detection via temporal sequence sampling. https://doi.org/10.36227/techrxiv.16917526
Vani, M., Lucibello, K., Trinh, L., Mina, D., & Sabiston, C. (2021). Body image among adolescents and young adults diagnosed with cancer: A scoping review. Psycho-Oncology, 30(8), 1278-1293. https://doi.org/10.1002/pon.5698
Vinutha, H., & Thippeswamy, G. (2023). Antispoofing in face biometrics: A comprehensive study on software-based techniques. Computer Science and Information Technologies, 4(1), 1-13. https://doi.org/10.11591/csit.v4i1.p1-13
Wilson, M., Cross, C., Holt, T., & Powell, A. (2022). Police preparedness to respond to cybercrime in Australia: An analysis of individual and organizational capabilities. Journal of Criminology, 55(4), 468-494. https://doi.org/10.1177/26338076221123080
Yu, P., Wang, J., Cao, N., & Dintera, H. (2021). Research on face antispoofing algorithm based on image fusion. Computers Materials & Continua, 68(3), 3861-3876. https://doi.org/10.32604/cmc.2021.017527
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Studies in Technology and Education

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
License Terms
All articles published in Studies in Technology and Education (STE) are freely accessible under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
This license grants users the right to read, download, copy, distribute, and link to the full texts for non-commercial purposes, provided that appropriate credit is given and that the original work remains unaltered and unchanged.
This article is made available in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.