The Effects of Digital Piracy in Data Security of Grade 11 Students in Sacred Heart Academy of Pasig A Research Paper Presented to the Senior High School Faculty of Sacred Heart Academy of Pasig In Partial Fulfillment of the Requirements in Practical Research 2 Researchers: ABASOLA, Knurl Randel B. CASTILLO, Zion Garret N. GONZALES, Dylan Edrich P. ORJE, Jayson T. VIZMONTE, Kyle Vincent T. INFANTE, Alisha Margareth L. SANTOS, Francine Hannah D. Research Adviser: Ms. Katherine Nicole Mañalac A.Y. 2021-2022 Approval Sheet This research entitled The Effects of Digital Piracy in Data Security of Grade 11 Students in Sacred Heart Academy of Pasig prepared and submitted by Abasola, Castillo, Gonzales, Orje, Vizmonte, Infante, and Santos in partial fulfillment of the requirements for the subject Practical Research 2, is hereby recommended for oral presentation on April 11, 2021. ______________________________ Ms. Katherine Nicole M. Mañalac Research Adviser Approved in partial fulfillment of the requirements for the subject Practical Research 2 by Oral Presentation panel. ______________________________ ______________________________ Ms. Katherine Nicole M. Mañalac Ms. Khrissha Ann S. San Diego Chairman Member ______________________________ ______________________________ Ms. Kriszer Ian R. Bucu Mr. John Philip O. Echevarria Member Member Accepted in partial fulfillment of the requirements for the course Practical Research 2. ______________________________ ______________________________ Date Ms. Valerie G. Alinas School Principal i Acknowledgment First and foremost, we wish to express our sincere gratitude to Ms. Katherine Nicole Mañalac, our practical research teacher, for providing us with all the information needed to conduct this research study. Ms. Kriszer Ian Bucu, our grammarian, for improving our grammar and construction of sentences. Sir John Philip Echevarria, our statistician, for guiding us in our statistical analysis and data in chapter 4. Their profound knowledge guided us and made us comprehensive in writing the precise thesis paper. With their motivation in the value of teaching, they still conveyed this research regardless of the boundary with doing it in an online medium as they organized every schedule and continuous supervision to make this research possible for this school year. We further like to thank the rest of the thesis members for their active cooperation throughout writing the study. Without the participation of each member, there will be a hindered progress in developing the research since their individual comprehension signifies to be efficient in the study. The existence of everyone stands as an encouragement to obtain the answers to our formed problem. We would like to express our utmost gratitude to our parents and families who gave their ideas and knowledge for us to finish our research. And to our friends and others who helped us with other ideas needed for complex chapters. Above all, to our Lord Jesus Christ, who guided us through everything and gave us strength to push every day. ii Abstract The ongoing Covid-19 pandemic has given people all around the world the incentive to turn to websites that stream pirated content for free because the usual means of watching the latest movie or buying the newest game have been taken from them. Other factors that contribute to the encouragement of a person to commit digital piracy are the lack of financial capabilities to afford an original copy, the availability of the product within that region or area, and the time and willingness of a person to head out and purchase the product. As digital piracy has become more mainstream throughout the years, so does the opportunity for hackers to steal one’s personal information through it. The researchers of this study conducted a survey within the grade 11 students of Sacred Heart Academy of Pasig to confirm or reject that hypothesis. They found that many students have committed digital piracy, but only a few have suffered from its consequences–their accounts being compromised. They also found that the main incentive for a student to commit digital piracy is the lack of availability and accessibility of the product to their specific area or region. Keywords: digital piracy, data security, pirated content, preventive measures iii TABLE OF CONTENTS Approval Sheet…………………………………………………………………………….i Acknowledgement………………………………………………………………………...ii Abstract…………………………………………………………………………………...iii Table of Contents…………………………………………………………………………iv Chapter 1 - The Problem and Its Background…………………………………………………1 Background of the Study………………………………………………………………….1 Objectives of the Study……………………………………………………………………3 Statement of the Problem………………………………………………………………….3 Hypotheses………………………………………………………………………………...4 Scopes and Delimitation…………………………………………………………………..4 Significance of the Study………………………………………………………………….5 Definition of Key Terms…………………………………………………………………..6 Chapter 2 - Review of Related Literature……………………………………………………...8 Literature Related to Independent Variable……………………………………………….8 Literature Related to Dependent Variable………………………………………………..10 Literature Related to Literature that Relates the Independent and Dependent Variables..12 Summary…………………………………………………………………………………14 iv Conceptual Framework…………………………………………………………………..16 Chapter 3 - Research Methodology……………………………………………………………18 The Survey Method………………………………………………………………………18 Population and Sample…………………………………………………………………..18 Instrumentation…………………………………………………………………………..19 Variables………………………………………………………………………………….19 Data Analysis…………………………………………………………………………….20 Chapter 4 - Presentation, Analysis, and Interpretation of Data……………………………..21 Presentation and Analysis of Data……………………………………………………….21 Chapter 5 - Summary, Conclusions, and Recommendations………………………………...48 Summary of Findings…………………………………………………………………….48 Conclusions………………………………………………………………………………52 Recommendations………………………………………………………………………..53 Bibliography……………………………………………………………………………...vi Appendices………………………………………………………………………………..ix Survey Questionnaire……………………………………………………………xi Curriculum Vitae………………………………………………………………xxiii v Chapter 1 The Problem and its Background This chapter includes the background of the study, objectives of the study, statement of the problem, hypothesis, scope and delimitations, significance of the study, and the definition of terms. Background of the Study Digital piracy has been a problem that has plagued the world ever since. This dilemma has even worsened during this pandemic. Since people are unable to watch in cinemas, they turn to unconventional means of media to stream the latest movie. That is not the only reason why people commit digital piracy though. Another effect that the coronavirus pandemic has brought about is the loss of income and jobs. According to a survey by the Social Policy Institute at Washington University in St. Louis, 24% of respondents have lost their jobs or have experienced reduced income because of being furloughed or because of reduced working hours. This has caused a high number of piracy within the film, music, and creative industries because people have nowhere else to turn to for entertainment besides websites that stream pirated content for free. It is through this digital piracy, however, that hackers are able to steal other people’s personal information. One of the first hackers who were able to intrude a network in the late 1950’s was a group or club called “The Phone Phreaks.” They found a way to make calls all around the world and to access areas of the phone system previously only available to the phone company. This was made possible through an electric box that could make specific tones (The Evolution and History of Hacking, n.d.). Many others tried to do the same, but the Phone Phreaks had received 1 backlash because of it and, soon, possession of the same technology they used could bring someone to jail. In the 1960s, the number of computer hackers started to grow and the cycle of hackers being able to intrude networks and systems grew. At first, some were doing this for fun and as a hobby but realized later on that this could be profitable for them. Consequently, this has led to an increase of digital piracy in the 1970’s. It was at this time as well when pirated copies of computer softwares and games were being shared and sold at a more affordable price. In 1999, David L. Smith masked a virus as a simple Microsoft Word attachment to an email, but actually replicated itself and copied the first 50 names in the victim’s contact list. Fortunately, no sensitive information was stolen. This happened years before pirated websites had become mainstream. As modern technology advances, this sort of technique must have been replicated and refined in the guise of a pirated website. Since technology has progressively advanced, everything that is copyrighted can be pirated. Hackers and pirates always seem to find a way to stay one step ahead of cyber security. This greatly affects the security of the students because the internet has become more accessible, thus making pirated websites just as easy to access. People working for the film and creative industries are also greatly affected by this because their content is being stolen without their permission and they do not get the credit they deserve. In this study, the researchers aim to perceive the secureness of one's data in the internet, and how piracy can be put to an end by heightening the security of systems and websites. 2 Objectives of the Study 1. To explain to grade 11 students the dangers digital piracy can have on their online data’s security. 2. To distinguish pirated files from others and be able to report it. 3. To examine the number of the losses the creative industry has suffered because of digital piracy. 4. To show and distribute examples on how users can protect their personal data. 5. To be able to assess what to do if digital piracy is encountered. Statement of the Problem This study seeks to answer the following questions: 1. How are pirates able to bypass the anti-piracy measures of official sources? 2. How do the effects of digital piracy (such as malware) threaten data security? 3. How often do grade 11 students pirate content? How serious do they think it is? 4. What are the factors that influence these students to view content from unofficial sources or unlicensed distributors? 4.1. The financial capacity of the participants to spend on authorized content. 4.2. The time and will of the participants to find and pay for the content. 4.3. The availability and accessibility of the content in the area of the participant. 3 5. What are the advantages (if there are any) or disadvantages of digital piracy to creative industries? Hypothesis This research presents the analysis on students about the possible factors that may influence them to do digital piracy. The study may also present the frequency of this action from the students as the researchers demonstrate that the factors are the possible reasons that cause them to view or create pirated content. If the ways used to bypass anti-piracy measures are revealed, then experts could strengthen the existing anti-piracy programs. If the data show the consequences of digital piracy to data security, then people can counteract digital piracy for further protection of their data. If the data shows major results that contain students committing digital piracy, then the students may suffer serious consequences and show how massive the problem can be. If the factors are perceived, then a solution can be made to lessen the usage of digital piracy and to protect their data and security. If the advantages and disadvantages of digital piracy are known, then the artists working in the creative industry will be more aware of the pros and cons of digital privacy. Scope and Delimitations The study will mainly focus on the grade 11 students within the school of Sacred Heart Academy of Pasig in order to understand how these students are affected by piracy. 4 The main purpose of this study is to understand why many students commit digital piracy and what effect this has on them as well as the general effects that piracy has on the creative industry. However, given the period of time for research, the study will not cover the population of the grade 11 students outside Sacred Academy of Pasig. Data and information for the study will be gathered online via Google Forms which will be sent out to the grade 11 students. Surveys are done online due to the fact that most of the students are minors and are required to stay home for their safety. Significance of the Study If this study claims to be effective, then the following groups of people will reap its benefits: Students – This will educate students about digital piracy and its periculous effects to their personal data’s privacy and security. Teachers – This may help them be an instrument to their students to raise awareness on the dangers of digital piracy and how it will mentally affect their students. Parents – This could serve as a guide on how they can teach their children to be careful on the internet. National Bureau of Investigation Cybercrime Division – This may help the National Bureau of Investigation Cybercrime Division to investigate further the websites and pages that sell and share pirated content online. Philippine National Police Anti-Cyber Group - This could help the Philippine National Police Anti-Cyber Group to guard and protect everyone’s security online. 5 Department of Information Communications Technology – This study can help DICT to look at how information and communication technology might harm intellectual property rights in the film business. Data Analysts – This can help them to gather data and information about digital piracy which could help their study on piracy analysis. Information Security Analysts – This study may help them to develop software that can block or at least make it harder for people to pirate their content. Web Developers – This could help them to further create websites that provide stricter and heightened security for companies to avoid getting their content pirated. Future Researchers – This may be helpful for them to expedite their research on digital piracy and to focus more on the further advancement of their study. Definition and Terms Digital Piracy - Copying of a software without the authorization of the content creator. Creative Industry - An industry focused on jobs in the arts or media. Furlough - This is when a company decides to make its employees take a leave of absence for some time due to special circumstances. Pirates - The people who copy the works and contents of the author without authorization to sell or distribute them. Malware - Any malicious software created by cybercriminals. 6 Unlicensed Distributors - A group of people who distribute materials without the author's approval. Digital security - Resources that are used to secure your online identity, data, and other assets. NBI Cybercrime Division - A branch of the National Bureau of Investigation that investigates crimes on the internet. Data Analysts - A professional who utilizes data to provide knowledge. Information Security Analysts - Professionals that plan and implement security measures to secure a company's computer networks and systems. 7 Chapter 2 Review of Related Literature This chapter includes the data about the analysis of other related studies and literature relevant to the effects of digital piracy to the data security of the grade 11 students. Digital Piracy Digital piracy refers to copying, downloading, or purchasing copyrighted files without explicit permission from the copyright holder (Gopal and Sanders 1998, Tunca and Wu 2013). According to a report made by Business Software Alliance (2016), it is said that out of all the computer softwares installed in the world, about 39% of the coverage are unlicensed or illegally used. People who may encounter the action may perform it as they may consume illegal copies of digital products or services that include e-books, softwares, music, and videos. This behavior is harmful and destructive to industries and companies who own such products (R. D. Gopal and G. L. Sanders, 1998). Several factors were found that can be considered as possible causes for digital piracy and that includes psychological aspects, economic aspects, ethical aspects, absence of regulations, or cultural factors. There are more findings that were mentioned such as self-worth, presumptions, and social relationships that cause people to perform digital piracy. These digital products that were previously mentioned, are said to be contents or information that may include all sorts of text, data, photo, music, and multimedia. It could be displayed, presented, passed around, and stowed away in a form that is digitized through the 8 internet. Some distinctive examples of digital products can be music like songs and background music, videos that can be found in websites, films like the one people see in a movie theater, e-books, and softwares. It is said that these digital products are protected by copyright regulations (Vietnam Ministry of Justice, 2014). Digital piracy has negative impacts on the security of the people. As those who check and open any illegal websites or content online can encounter those harmful impacts, such as hacking and stealing of personal information. The pirates, the ones committing digital piracy, can abuse these websites to spread malware, trojans, and viruses. According to a study made by Cybersecurity firm RiskIQ, out of three piracy websites that were accessed, one of them contains some type of malware. Users who use content theft sites were said to be 28 times more likely to get malware than the ones who use legal media streaming websites. (Kraft, A. 2015). There are many possible forms of digital piracy. If an individual shares music to their friends through instant messaging softwares, that is considered as an act of digital piracy. It can also be individuals maintaining websites that contain many copyrighted material like movies which others can view. Downloading videos from Youtube is another example if the owner did not permit for it to be downloaded. Digital piracy has a two-sided process. The provider who uploads pirated content frequently, and there is the receiver, who simply downloads the content from some online source. For years, the Philippines, Malaysia, and Indonesia have been among the countries with the highest rate of digital piracy. A survey conducted by the Asia Video Industry Association, shows that the Philippines is now ahead of the cases of people who commit digital piracy. This is even with the implementation of Philippine Senate Bill No. 497. Which states that National 9 Telecommunications are eligible to cancel the license of the Internet Service Providers that allow websites to infringe copyright materials. YouGov polled thousands of Filipinos on whether they agree on a regulated blocking mechanism site, and most of them approved. Participants even suggested that the government should require Internet Service Providers to ban illegal and pirated sites. According to Ernest Cu, the numerous effects of piracy is immeasurable because it can lead to a slippery slope of problems. He and his team has been raising an advocacy program called #PlayItRight. This advocacy educates people on the effects piracy brings to individuals, and how they can be a smart user on the internet. Data Security Data security is a process of protecting all kinds of data from any unauthorized access and data corruption (IBM, n.d.). Privacy is a person's right to be alone or to have control on their own data (Tom Gann, 2019). It is a method of assessing and reducing the risk when it comes to storing any kind of data. The core elements of data security is known as the CIA triad, where the data security focuses on the confidentiality of the data and those who are authorized can access it (David Harrington, 2021). One of the benefits of data security is that your sensitive information will never be leaked. Data security keeps all the information safe. A lot of big companies rely on how their data security is fully safe. When a big company gets hacked, their reputation can be destroyed which can lead to a lot of people losing trust in that company. When one has data security from 10 the beginning, it will be safer and less costly when encountered with digital attacks (Juliana de Groot, 2021). The internet is unpredictable. There are a lot of risks that can be encountered and one of the risks is accidental exposure of your information. This occurs when there is a malicious attack or caused by a negligent or accidental exposure of information. Another is ransomware, it is a major threat to all of the data of any companies. Ransomware is a malware that infects a device and encrypts the data. Additionally, the attackers display a message asking for payment for them to stop. In many cases, however, even after paying, they don't stop hacking into your account and that could lead to data loss. According to the Ponemon Institute’s Cost of Data Breach Study, on average, the damage caused by a data breach in the USA is $8 million. Around 25,000 user accounts were impacted due to the incident, which means some of them encountered financial loss, and most of them encountered loss of customer trust and damage to reputation. Data privacy and security are very important because keeping private data and sensitive information safe is paramount. The lack of access control regarding personal information can put individuals at risk for fraud and identity theft. Additionally, a data breach at the government level may risk the security of the entire country. Here in the Philippines, the Republic Act No. 10173, otherwise known as the Data Privacy Act, is a law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information. 11 Since the pandemic started, cases of digital piracy doubled-up even though authorities have given a warning to those who violate the law against digital piracy. Ever since the National Privacy Commission was established, most of the cases of digital piracy are just being disregarded, junked, and resolved without any heavy consequence like imprisonment because the commission cannot handle such a big demand, but with limited resources to patch up the complaint. Which is why there is still a high number of cases regarding digital piracy in the Philippines, even though there are approved constitutional laws and bills that can help lower the cases of digital piracy (Jet Damazo-Santos, 2020). Effects of Digital Piracy in Data Security Digital piracy not only affects the finances of creative industries, but also the data security in ordinary individuals. Because of the detrimental effects of digital piracy, many laws were implemented to counter them. Although laws were enforced, these effects still run rampant because the internet is too broad to monitor. The vastness of the internet gives hackers the opportunity to target unsuspecting individuals by using pirated content to spread malware, trojans, and viruses (Patrick Putman, n.d.). Based on Alvaro Puig’s article (2019), some hackers spread this malware through pirate apps that supposedly work with popular streaming devices. Downloading these illegal pirate apps or add-ons could possibly infect your computer with that malware. If it gets into a wireless network, it may try to infect other devices connected to it. With malware, hackers can sell stolen data to other criminals, use stolen personal information for identity theft, and use login credentials to take over accounts, specifically bank accounts or shopping accounts (F-secure, n.d.). 12 In terms of illegally downloading games, most people turn to torrent sites. According to Jon G (2019), a torrent in the tech world refers to a computer file that contains metadata holding various information. Based on the same article, these torrent files initiate the download of the actual content. When someone wants to receive a shared file, they must first obtain the corresponding torrent file either by directly downloading the file or through a magnet link. A BitTorrent software opens and scans the link to find the locations of seeders that share the file. It then attempts to connect through a list of defined trackers. A successful connection begins the transfer of the appropriate content (Jon G, 2019). In relation to technology, what makes torrenting dangerous is that it tracks IP addresses. The IP addresses found downloading torrents can be passed onto Internet Service Providers who cooperate with law enforcement agencies to prevent the file from being downloaded further by imprisoning the operators or users (Jon G, 2019). According to Quark Henares (2021), he finds it disheartening that the public treats lightly the stealing of shows or films which are a fruit of the labor of those in the film industry. He also says that some locally produced works have been made easily accessible through illegal streams and links on Facebook or torrent sites. To back up his claim on Filipinos’ flippancy towards piracy, he has observed that people openly try to ask for links on where to watch a particular movie that one happens to share the trailer of. Not only does this cause trouble for original creators and people’s data security, but also to internet police who check links and report them unceasingly. 13 Summary In this chapter, the variables digital piracy, data security, and effects of digital piracy in data security are thoroughly discussed and supported by using legitimate literature and studies connected with the topic. Digital piracy is a prevalent issue in the Philippines. It just doesn’t seem like it because people are taking it lightly even though the problem is worse than we think. In the first variable, digital piracy, it was discussed that if a person obtains a copyrighted property, such as music, file, video, or photo uploaded on the internet without asking permission from the owner, it is already considered as a form of digital piracy. There are many ways a person can pirate digitally. It can be through the form of illegal streaming, screen recording a movie and distributing it online, downloading music from YouTube without permission from the artist or agency, illegal download of movies from unreliable sites, and many other forms. Economical, psychological, ethical aspects and absence of law implementations are factors that experts are trying to look at as to why people commit digital piracy. But one of the major factors affecting the high number of digital piracy here in the Philippines is economical because the majority of the individuals who commit and distribute pirated content are those who are jobless or belong in the low-income bracket. Most of them engage in these kinds of activities because they get extra income from distributing or to have the exact same copy of the original at a more affordable price. These illegal acts come with a consequence to the user's data. But in this section, the effects of it were not entirely discussed as it will be mentioned in the last variable. 14 Data security is a protective measure that ensures the safety of our files, database, accounts in the network, and avoids file corruption. The second variable discusses the uses and dangers of having data security on the internet. One of its uses is the protection that it gives to the users, especially big companies who use the network and computer to store their database, record, and files. However, given the number of hackers and pirates in the internet, people should not be too reliant on storing their whole database on the computer and or internet because once pirates access this, they would be able to illegally distribute the software that the company uses, or leak a certain game or movie that the company is currently working on. It was also mentioned there that during this pandemic, cases of piracy have doubled because people have more time to spend on the internet. However, given the numerous cases of digital piracy, authorities only have limited resources to catch the violators. That is why the Philippines is having a hard time lowering the number of people committing digital piracy even with constituted laws and bills. In the last variable, effects of digital piracy in data security, it thoroughly discusses the impacts of committing and indulging in digital piracy to individuals and to their data security. The effects vary from hacking, stealing of personal data and information, and illegal distribution of work. The studies and articles presented in the last variable states that there are a lot of effects digital piracy gives to individuals. Unfortunately, people normalize this kind of behavior which is alarming because it also means that to them, stealing is just as normal too. This should not be 15 acceptable because some companies and individuals who worked hard for it lose their potential profit. Conceptual Framework In a graphical flowchart, the conceptual framework depicts the research's context, inputs, processes, and outcomes. The study's main goal is shown in the context, which includes the central objectives, since they all reflect the most important traits needed to complete the research, all five were included in the graphic. After determining the context, the inputs are: the effects of digital piracy on Sacred Heart Academy of Pasig's grade 11 students; factors that influence them to view pirated content; grade 11 students of Sacred Heart Academy of Pasig; and Google 16 Forms. The aforesaid sources will be the majority of the information in this study is gathered through and from them. The information gathered through online surveys will be used in the following chapters. This study, titled "The Effects of Digital Piracy on Data Security of Grade 11 Students at Sacred Heart Academy of Pasig," will be completed after the documentation is completed. 17 Chapter 3 Research Methodology This chapter consists of the survey method, population and sample, instrumentation, variables, and the data analysis of the study. Survey Method The research paper titled, "The Effects of Digital Piracy in Data Security of Grade 11 Students in Sacred Heart Academy of Pasig" uses the survey method to obtain the performance assessment results from the selected sample. The survey will be conducted with the use of Google Forms, and will be sent to all grade 11 students, regardless of their academic strand. For the convenience of the respondents, the survey will be sent out to each of their Sacred Heart Academy of Pasig Gmail accounts on March 11, 2022 during the 10:00 A.M to 10 P.M time window. Population and Sample In order to conduct the survey, the researchers chose the grade 11 students of Sacred Heart Academy of Pasig Academic enrolled in the school year 2021-2022 as the main population. From this, 50 randomly selected students were chosen to be the sample that the survey will be conducted on, data will be collected from the answers of these students on the distributed survey. Before conducting the survey, the researchers determined the sample size through a sample size determination. The selections are from 25 female grade 11 students from Sacred 18 Heart Academy of Pasig and 25 male students from Sacred Heart Academy of Pasig. In result, there are 50 participants in the survey. Instrumentation For this study, the researchers' plan for the instrumentation is to design a survey that questions containing rating scales that includes: the Binary Scale, the Likert Scale, the Semantic Differential Scale, the Guttman Scale, and as well as a close-ended question. With these scales containing questions about digital piracy, the researchers can get various answers on the thoughts of students regarding digital piracy and the factors that motivate them to commit digital piracy. Variables In this study, the researchers will observe the effects that the independent variables (digital piracy) will bring about on the dependent variables (data security) when they are manipulated. Through survey questionnaires, the researchers will obtain data from randomly selected grade 11 students of Sacred Heart Academy of Pasig School Year 2021-2022 regarding their experience with digital piracy and how it might have affected their gadgets in terms of security. The questionnaires will include inquiries that ask about the respondents’ online integrity, their general thoughts on digital piracy, their experience with digital piracy affecting their data, and their vigilance against what might threaten their security online. Once the data has been collected, the researchers will use it to aid in achieving the objectives of the study, thereby successfully completing the paper. 19 Data Analysis Before handing out the survey, the researchers first determined the sample size of the respondents by the use of sample size determination. The selections are from 25 female grade 11 students from Sacred Heart Academy of Pasig and 25 male students from Sacred Heart Academy of Pasig. In result, there are 50 participants in the survey. The population and sample size of all the grade 11 students from different strands from Sacred Heart Academy of Pasig will be combined and computed into one equation. As a result, the number of respondents was 50; 15 came from 11 STEM A, 14 from 11 STEM B, 11 from 11 ABM C, 5 from 11 HUMSS D, and 5 from 11 ArDES. The Spearman Rank Correlation is a metric for determining the strength of connection between variables that affect the data security of grade 11 students from Sacred Heart Academy of Pasig. This method only applies for the questions from the survey about the financial capacity, time and willingness, and availability and accessibility, which respectively make us of a likert scale. The Semantic Differential Scale will also utilize the Spearman Rank Correlation test to see the relationship between the 5 variables. The plan is workable. However, dishonesty in answering some of the questions are expected. In order to reduce this, participants will be affirmed that personal information and responses will remain anonymous. Thus, answering the handed out survey must be answered with full honesty. 20 Chapter 4 Presentation, Analysis, and Interpretation of Data This chapter presents the data analysis and interpretation from the conducted survey. Through this method, it primarily aims to answer the research questions in chapter 1. 1. Demographic Profile 1.1. Age Table 1. Frequency and Percentage Distribution of the Respondents in Terms of Age Age Frequency Relative Frequency Percentage Frequency 15 0 0 0.0% 16 11 0.22 22.0% 17 36 0.72 72.0% 18 3 0.06 6.0% Table 1 exhibits the Grade 11 Sacred Heart Academy of Pasig students’ percentage and frequency of distribution of their age. There are 50 respondents and a majority of them are 17 years old with a frequency of 36 respondents. The second most frequent age is 16 years old with 11 respondents, and the least frequent age is 18 years old with 3 respondents. This shows that the average Grade 11 Sacred Heart Academy Pasig students' age is 17. At this age, it is quite 21 normal for students to be affected by digital piracy in their data security as they browse the internet frequently. 1.2 Grade and Section Table 2. Frequency and Percentage Distribution of the Respondents in Terms of their Grade Section Section Frequency Relative Frequency Percentage Frequency STEM A 15 0.3 30.0% STEM B 14 0.28 28.0% ABM C 11 0.22 22.0% ARDES D 5 0.1 10.0% HUMSS D 5 0.1 10.0% Table 2 exhibits the percentage and frequency of distribution of the sections of the Grade 11 Sacred Heart Academy of Pasig students. Out of the 50 respondents, the majority of them were from 11 STEM A with 15 respondents. The second section with the highest number of respondents was from 11 STEM B with 14 respondents. The third most frequent respondents were the 11 ABM C students with 15 respondents. Lastly, the two least frequent respondents were from 11 ARDES D and 11 HUMSS D, each having 5 respondents. 22 2. Factors that influence Grade 11 Students to Commit Digital Piracy 2.1 Financial Capacity of the Respondents Table 3. Students' Response Regarding their Financial Capacity that Influences them to Commit Digital Piracy SD D N A SA Median Verbal Interpretation I spend my money to buy pirated content to manage my budget 20 15 8 6 1 2 Strongly Disagree I am willing to pay double the price for an authorized copy 7 9 17 11 6 3 Neither You access pirated content/websites to stream/download content because you do not have enough budget to pay for the original copy 2 2 13 16 17 4 Agree If you have enough budget, you would pay for all means for the original copy 1 3 6 13 27 5 Strongly Agree You have the means to pay for the original copy, but you are not willing to spend more 7 12 17 7 7 3 Neither 23 because you believe pirated websites are cheaper and convenient Overall Median: 3 Neither Legend: “Strongly Agree (SA) = 5”, “Somewhat Agree (SWA) = 4”, “Neither (N) = 3”, “Somewhat Disagree (SWD) = 2”, “Strongly Disagree (SD) = 1” Table 3 is about the financial capacity of the students. This tabular data shows if students are willing to pay double the price for the original copy or not. With that being said, most of the students strongly disagree with the thought that they only view and buy pirated content to manage their budget. Meanwhile, students would neither agree nor disagree to pay double the price for the authorized copy. The students were also asked if they only access pirated content and websites because of their budget, and they agreed. However, if they by means have the budget, they strongly agree to pay for the original copy. But, there are students who either have the budget but do not want to pay for the original copy or have no budget but want to spend for the authorized copy because they believe pirated websites are cheaper and convenient. 2.2 Time and Willingness of the Respondents Table 4. Students' Response Regarding their Time and Willingness that Influence them to Commit Digital Piracy You prefer to purchase/view the authorized copy rather than the pirated version SD D N A SA Median Verbal Interpretation 2 2 15 18 13 4 Agree 24 You prefer to purchase/view the pirated copy rather than the authorized version 7 15 16 9 3 3 Neither You always have the time to go out and buy the original content 11 11 21 4 3 3 Neither You would make time to go out and buy the authorized content 4 9 19 11 7 3 Neither You are willing to spend more money for a higher level of security for your online data 1 7 5 21 16 4 Agree 3 Neither Overall Median: Legend: “Strongly Agree (SA) = 5”, “Somewhat Agree (SWA) = 4”, “Neither (N) = 3”, “Somewhat Disagree (SWD) = 2”, “Strongly Disagree (SD) = 1” Table 4 shows the respondents willingness to use either pirated or official copies of the content. With more and more content being made available online, pirating and stealing copies of it for free has never been easier. Pirating has made movies, music, and other online media more accessible for people. But from the data gathered above, most students would still rather buy official copies than get it for free on different websites. And this ties into the online safety concern when it comes to pirated content, as these students also agree that they are willing to spend money to improve their online security and would rather not risk going onto unofficial 25 sites for content. However, this is not to say that pirating content is not an option that they consider as they are also neutral when asked if they would want to pirate instead, as well as whether they have the time to go and buy official copies. 2.3 Availability and Accessibility of Content to the Respondents Table 5. Students' Response Regarding the Availability and Accessibility that Influence them to Commit Digital Piracy SD D N A SA Median Verbal Interpretation The original content that you are trying to view/buy is not accessible or available in your region, so you would look up to pirated websites to access them 0 1 13 21 15 4 Agree You use VPNs (Virtual Private Networks) to access the content that is not available to your region 8 7 11 14 10 3 Neither You are willing to wait for the unavailable authorized content to be available in your area 4 9 10 21 6 4 Agree 26 You would by all means purchase/view the original content if it is available in your region 1 4 10 16 19 4 Agree I only view/buy pirated content because it is not available in my area. But I do not intend to steal or illegally distribute the copy 3 2 8 12 25 4.5 Agree to Strongly Agree 4 Agree Overall Median: Legend: “Strongly Agree (SA) = 5”, “Somewhat Agree (SWA) = 4”, “Neither (N) = 3”, “Somewhat Disagree (SWD) = 2”, “Strongly Disagree (SD) = 1” Table 5 above shows how available and accessible online content is for the respondents and whether this leads them to pirate said content. With different countries' laws, materials like movies can only be available in certain countries and be inaccessible to the rest, this leads many to either pirate the content or uses VPNs to access it. The accumulated data, leads even students to turn to pirate websites to access inaccessible content. However, they are also willing to wait for it to be officially released in their region and buy the original content instead. If they were to pirate, however, they strongly agree that they have no intention of stealing the content or selling and distributing it to others as they simply wish to access it for themselves. 27 3. Secureness of Data Security 3.1 Frequency of Committing Digital Piracy Table 6. Students’ Response to the Binary Scale in Terms of Committing Digital Piracy Responses Frequency Relative Frequency Percentage Frequency Yes 19 0.3800 38% No 31 0.6200 62% Table 6 indicates that 31 or 62% of the respondents have not committed digital piracy. While 19 or 38% out of 50 respondents answered yes. Thus, this data concludes that the majority of students have not committed digital piracy. 3.2 Frequency of Visiting Pirated Websites Table 7. Students’ Response to the Binary Scale on whether if they Have Visited an Illegal Website that Allows them to View Pirated Content Responses Frequency Relative Frequency Percentage Frequency Yes 32 0.6400 64% No 18 0.3600 36% In terms of visiting illegal websites that allow you to view pirated content, table 7 shows that 32 or 64% of the respondents have visited and viewed pirated websites. Meanwhile, 18 or 36% out of 50 respondents have not visited nor viewed pirated websites. This implies that the majority of respondents have visited unsolicited/unauthorized websites. 28 3.3 Frequency of Compromised Social Media Accounts Table 8. Students’ Response to the Binary Scale on whether their Social Media Accounts have been Compromised Responses Frequency Relative Frequency Percentage Frequency Yes 10 0.2000 20% No 40 0.8000 80% Table 8 reveals that 10 or 20% of the respondents have experienced their account being compromised. On the other hand, 40 or 80% out of 50 respondents have not experienced their account being compromised. Hence, most of the students have not experienced being hacked. 3.4 Frequency of Accounts being Compromised by Pirated Websites Table 9. Students’ Response to the Binary Scale on whether the Reason for their Account being Compromised is because of Visiting Pirated Websites Responses Frequency Relative Frequency Percentage Frequency Yes 7 0.1400 14% No 43 0.8600 86% Table 9 is a graphical representation of the follow-up question in table 8. Out of 10 students who answered that their accounts were hacked, only 7 or 14% of the respondents said that their accounts were compromised because of visiting a pirated website. While the 3 respondents who answered earlier and the 40 respondents, answered that their accounts had never been compromised by visiting a pirate website. 29 3.5 Frequency of Students to Continue to Commit Digital Piracy Table 10. Students’ answers to the Binary Scale on whether they will continue to commit digital piracy in spite of the consequences it might impose on their data security Responses frequency Relative Frequency Percentage Frequency Yes 31 0.6200 62% No 19 0.3800 38% In the last set of questions from the Binary Scale, table 10 shows how many students are still willing to commit digital piracy in spite of the threats it might impose on their data security. 31 or 62% of the respondents answered that they would still continue to commit piracy even though there are threats to their data security. Meanwhile, 19 or 38% out of 50 respondents answered that they will stop visiting and viewing pirated content and sites. This implies that no matter the threat digital piracy imposes, students are still willing to view and visit pirated sites and contents on the internet. 4. Confidence in Internet Data Security Table 11. Students’ Response to the Likert Scale on whether they Feel Confident and Safe while Using the Internet SD D N A SA Median Verbal Interpretation I feel secure in putting my data online 15 11 14 8 2 2 Strongly Disagree I feel safe when downloading files online 9 13 18 9 1 3 Neither 30 I feel secure with all the websites I visit online 8 13 17 11 1 3 Neither I am cautious when I install anti-virus and malware protection for my security 1 2 4 27 15 4 Agree I feel safe when I use strong passwords for my accounts 0 0 9 18 23 4 Strongly Agree 3 Neither Overall Median: Legend: “Strongly Agree (SA) = 5”, “Somewhat Agree (SWA) = 4”, “Neither (N) = 3”, “Somewhat Disagree (SWD) = 2”, “Strongly Disagree (SD) = 1” The data in table 11 is about the students’ rating about their confidence in internet data security. Students strongly disagree with being secure in putting their data online. But, neither felt safe or unsafe when downloading files on the internet. They also neither feel secure with all the websites that they browse through. With numerous legitimate antivirus apps online, students agreed that they are aware when downloading these kinds of applications for the protection and security of their online data. And most of the students strongly agree that they use and feel safe when using a strong password for their accounts online. 31 5. Data Security 5.1 Precautionary Measures when Browsing Online Table 12. Students’ Response to the Semantic Differential Scale Regarding their Data Security on the Internet VM SW N S VM Median Verbal Interpretation Secured 7 21 14 7 1 Unsecured 2 Somewhat Secured Safe 4 23 12 9 2 Unsafe 2 Somewhat Safe Careful 14 14 15 7 0 Careless 2 Neither Vigilant 1 19 14 5 1 Negligent 2 Somewhat Vigilant Overall Median 2 Legend: “Very Much (VM) = 1”, “Somewhat (SW) = 2”, “Neutral (N) = 3”, “Somewhat (SW) = 4”, “Very Much (VM) = 5” Table 12 showcases the Semantic Differential Scale for measuring data security on the internet. The overall median is 2 with a verbal interpretation of “Somewhat Protected” based on the legend. This means that they have some protection to keep themselves safe from minor viruses, but they do not regard malware from pirated content to be a very serious threat. This is proof that most grade 11 students don’t see malware embedded into pirated content as a very serious threat to their data security. 32 5.2 Data Security on Websites Table 13. Students’ Response to the Semantic Differential Scale Regarding their Data Security on Websites VM SW N S VM Median Verbal Interpretation Safe 2 17 22 6 3 Unsafe 3 Neither Secure 3 18 18 8 3 Unsecure 3 Neither Reliable 5 21 16 8 0 Unreliable 2 Somewhat Reliable Trustful 1 15 27 6 1 Distrustful 3 Neither Overall Median 3 Legend: “Very Much (VM) = 1”, “Somewhat (SW) = 2”, “Neutral (N) = 3”, “Somewhat (SW) = 4”, “Very Much (VM) = 5” Table 13 presents the Semantic Differential Scale for measuring data security on websites. The overall median is 3 with a verbal interpretation of “Neutral.” There are 2 possible conclusions that could be drawn from this: the respondents’ data security on websites is neither safe nor unsafe, or the respondents don’t know if it is safe or unsafe there at all. 33 5.3 Data Security Response of the Government Table 13. Students’ Response to the Semantic Differential Scale Regarding the Rate of the Government’s Response to Data Breach Problems VM SW N S VM Median Verbal Interpretation Satisfactory 0 7 21 12 10 Poor 3 Neither Fast 0 3 18 20 9 Slow 4 Somewhat Slow Responsive 0 11 21 13 5 Apathetic 3 Neither Dependable 1 9 18 16 6 Undependable 3 Neither Overall Median 3 Legend: “Very Much (VM) = 1”, “Somewhat (SW) = 2”, “Neutral (N) = 3”, “Somewhat (SW) = 4”, “Very Much (VM) = 5” Table 13 displays the Semantic Differential Scale for measuring the data security response of the government. The overall median is 3 with a verbal interpretation of “Neutral.” This means that the respondents perceive the government’s response to data breach problems to be neutral in terms of satisfaction, responsiveness, and dependability. In other words, the government does not seem to be proactive in dealing with data breach problems. 34 5.4 Knowledge About Data Security Table 14. Students’ Response to the Semantic Differential Scale Regarding their Rating of their Knowledge About Data Piracy VM SW N S VM Median Verbal Interpretation Good 14 17 11 7 1 Bad 2 Somewhat Good Useful 15 20 11 4 0 Useless 2 Somewhat Useful Helpful 17 21 10 2 0 Unhelpful 2 Somewhat Helpful Knowledgeable 14 22 10 4 0 Ignorant 2 Somewhat Knowledgeable Overall Median 2 Legend: “Very Much (VM) = 1”, “Somewhat (SW) = 2”, “Neutral (N) = 3”, “Somewhat (SW) = 4”, “Very Much (VM) = 5” Table 14 indicates the Semantic Differential Scale for measuring the respondents’ knowledge about data security. The overall median is 2, revealing that most of the respondents are “Somewhat Knowledgeable” about digital piracy. This means that they might have some knowledge about the topic and the effects that it has on data security. 35 6. Negative Factors of Digital Piracy to The Data Security 6.1 Creative Industry Table 15. Respondents' Response to the Guttman Scale if they Think that Pirating Content Online is Bad for the Creative Industry RESPONSES FREQUENCY RELATIVE FREQUENCY PERCENTAGE FREQUENCY YES 43 0.86 86% NO 7 0.14 14% Table 15 shows how bad pirating content online is to the creative industry. 43 or 86% of the respondents believe that piracy negatively affects the creative industry, but 7 or 14% still believe that it is fine, and piracy should have no problem. 6.2 Harmful Malware Threat Table 16. Respondents' Response to the Guttman Scale if they are threatened with the harmful malware that digital piracy imposes RESPONSES FREQUENCY RELATIVE FREQUENCY PERCENTAGE FREQUENCY YES 48 0.96 96% NO 2 0.04 4% 36 Table 16 above shows that most of the students are threatened with the effects harmful malware brings to their online data. However, 2 or 4% of the respondents do not feel threatened at all. 6.3 Harmful Malware Threat to School Organization Table 17. Respondents' Response to the Guttman Scale if they are threatened with harmful malware that might affect their school organization’s data security RESPONSES FREQUENCY RELATIVE FREQUENCY PERCENTAGE FREQUENCY YES 46 0.92 92% NO 4 0.08 8% Table 15 shows that 46 or 92% of respondents are threatened that their school organization’s data security might be affected by possible harmful malware. While 4 or 8% out of 50 students do not feel so. 6.4 Harmful Malware Threat to Family Table 18. Respondents' Response to the Guttman Scale if they are threatened with harmful malware that might affect their family’s online data RESPONSES FREQUENCY RELATIVE FREQUENCY PERCENTAGE FREQUENCY YES 49 0.98 98% NO 1 0.02 2% 37 Table 18 above shows that almost 98% of the respondents are worried about any harmful malware that may affect their family’s data. While only 2% do not feel any worries. 6.5 Harmful Malware Threat to Users Table 19. Respondents' Response to the Guttman Scale if they are threatened with harmful malware that might affect online data and security RESPONSES FREQUENCY RELATIVE FREQUENCY PERCENTAGE FREQUENCY YES 47 0.94 94% NO 3 0.06 6% Table 19 shows that 47 or 94% of the students are worried about any harmful malware posing a threat to their online data. Though 3 or 6% out of 50 respondents are not worried about it. 38 7. Practice of Safe Precautionary Measures When Browsing the Internet Table 20. Open-Ended Question About the Frequency of Grade 11 Students that Practice safe Precautionary Measures Responses Frequency Rarely 2 Somewhat Rarely 3 Neither 16 Somewhat Often 14 Often 15 Mode 3 Table 20 shows the frequency of Grade 11 students practicing safe precautionary measures online. The mode, or most frequent answer, is 3 which represents “Neither.” This implies that most respondents don’t practice safe precautionary measures online at all, since they don’t practice it “rarely”, nor do they practice it “often.” 39 8. Relationship Between Variables 8.1 Financial Capacity, Time and Willingness, and Accessibility and Availability Table 21. Spearman’s Rho: Relationship Between Financial Capacity and Other Factors that Influence Students to Commit Digital Piracy Financial Capacity. Factors Spearman’s Rho p-value Decision Remarks Time and Willingness 0.007 0.962 Failed to Reject Ho Not Significant Accessibility and Availability 0.236 0.098 Failed to Reject Ho Not Significant Note: If p-value is less than or equal to the level of significance, which is 0.05, reject the null hypothesis, otherwise accept. Correlation coefficient values: ±0-76 - ±0.99 Very Strong; ±0.51 - ±0.75 Strong; ±0.50 Moderate; ±0.11 - ±0.25 Weak; ±0.01 ±0.11 Very Weak. In table 21, all results show no significance to each other, because all of it is greater than the alpha level (0.05). This implies that financial capacity has no correlation with the other two factors being time and willingness, and accessibility and availability. These factors do not share any significant relationship with financial capacity. 40 8.2 Time and Willingness, Financial Capacity, and Accessibility and Availability Table 22. Spearman’s Rho: Relationship Between Time and Willingness and Other Factors that Influence Students to Commit Digital Piracy Time and Willingness. Factors Spearman’s Rho p-value Decision Remarks Financial and Capacity 0.007 0.962 Failed to Reject Ho Not Significant Accessibility and Availability 0.186 0.195 Failed to Reject Ho Not Significant Note: If p-value is less than or equal to the level of significance, which is 0.05, reject the null hypothesis, otherwise accept. Correlation coefficient values: ±0-76 - ±0.99 Very Strong; ±0.51 - ±0.75 Strong; ±0.50 Moderate; ±0.11 - ±0.25 Weak; ±0.01 ±0.11 Very Weak. In table 22, all results show no significance to each other because each of them is greater than the alpha (0.05). This implies that time and willingness do not correlate with financial capacity and accessibility and availability. 41 8.3 Accessibility and Availability, Time and Willingness, and Financial Capacity Table 23. Spearman’s Rho: Relationship Between Access and Availability and Other Factors that Influence Students to Commit Digital Piracy Accessibility and Availability. Factors Spearman’s Rho p-value Decision Remarks Financial and Capacity 0.236 0.098 Failed to Reject Ho Not Significant Time and Willingness 0.186 0.195 Failed to Reject Ho Not Significant Note: If p-value is less than or equal to the level of significance, which is 0.05, reject the null hypothesis, otherwise accept. Correlation coefficient values: ±0-76 - ±0.99 Very Strong; ±0.51 - ±0.75 Strong; ±0.50 Moderate; ±0.11 - ±0.25 Weak; ±0.01 ±0.11 Very Weak. Table 23 presents the relationship between access and availability, and other factors that influence students to commit digital piracy. Neither financial capacity nor time and willingness are factors that significantly affect accessibility and availability since it has a p-value greater than the alpha (0.05). This implies that a person’s financial capacity, time and willingness to purchase an original copy of a product pose no significant problem so long as that desired product is available and accessible to their region or area. 42 8.4 Data Security on the Internet, Data Security on Websites, Data Security Response of the Government, and Knowledge About Data Security Table 24. Spearman’s Rho: Relationship Between Data Security on the Internet and Other Variables that Affects Students’ Data Security Data Security on the Internet. Factors Spearman’s Rho p-value Decision Remarks Data Security on Websites 0.555 0.160 Failed to Reject Ho Not Significant Data Security Response of the Government 0.388 0.003 Reject Ho Significant Knowledge About Data Security 0.443 0.000 Reject Ho Significant Note: If p-value is less than or equal to the level of significance, which is 0.05, reject the null hypothesis, otherwise accept. Correlation coefficient values: ±0-76 - ±0.99 Very Strong; ±0.51 - ±0.75 Strong; ±0.50 Moderate; ±0.11 - ±0.25 Weak; ±0.01 ±0.11 Very Weak. In table 24, all results show significance to each other, except for the variable knowledge about data security on websites because it is greater than the alpha (0.05). This implies that the data security on the internet correlates with the data security response of the government and the knowledge about data security. The data security on websites does not show any significant relationship with the data security of the government. 43 8.5 Data Security on Websites, Data Security on the Internet, Data Security Response of the Government, and Knowledge About Data Security Table 25. Spearman’s Rho: Relationship Between Data Security on Websites and Other Variables that Affects Students’ Data Security Data Security on Websites. Factors Spearman’s Rho p-value Decision Remarks Data Security on the Internet 0.555 1.16 Failed to Reject Ho Not Significant Data Security Response of the Government 0.376 0.004 Reject Ho Significant Knowledge About Data Security 0.290 0.033 Reject Ho Significant Note: If p-value is less than or equal to the level of significance, which is 0.05, reject the null hypothesis, otherwise accept. Correlation coefficient values: ±0-76 - ±0.99 Very Strong; ±0.51 - ±0.75 Strong; ±0.50 Moderate; ±0.11 - ±0.25 Weak; ±0.01 ±0.11 Very Weak. In table 25, all results show significance to each other, except for the variable knowledge about data security on the internet because it is greater than the alpha (0.05). This implies that the data security on websites correlates with the data security response of the government and the knowledge about data security. The data security on the internet does not show any significant relationship with the data security of the government. 44 8.6 Data Security Response of the Government, Data Security on Websites, Data Security on the Internet, and Knowledge About Data Security Table 26. Spearman’s Rho: Relationship Between Data Security Response of the Government and Other Variables that Affects Students’ Data Security Data Security Response of the Government. Factors Spearman’s Rho p-value Decision Remarks Data Security on the Internet 0.388 0.003 Reject Ho Significant Data Security on Websites 0.376 0.004 Reject Ho Significant Knowledge About Data Security 0.179 0.205 Failed to Reject Ho Not Significant Note: If p-value is less than or equal to the level of significance, which is 0.05, reject the null hypothesis, otherwise accept. Correlation coefficient values: ±0-76 - ±0.99 Very Strong; ±0.51 - ±0.75 Strong; ±0.50 Moderate; ±0.11 - ±0.25 Weak; ±0.01 ±0.11 Very Weak. In table 26, all results show significance to each other, except for the variable knowledge about data security because it is greater than the alpha (0.05). This implies that the data security response of the government correlates with the data security on the internet and websites. The knowledge about data security does not show any significant relationship with the data security of the government. 45 8.7 Knowledge About Data Security, Data Security Response of the Government, Data Security on Websites, and Data Security on the Internet Table 27. Spearman’s Rho: Relationship Between Knowledge About Data Security and Other Variables that Affects Students’ Data Security Knowledge About Data Security. Factors Spearman’s Rho p-value Decision Remarks Data Security on the Internet 0.443 0.000 Reject Ho Significant Data Security on Websites 0.290 0.033 Reject Ho Significant Data Security Response of the Government 0.179 0.205 Failed to Reject Ho Not Significant Note: If p-value is less than or equal to the level of significance, which is 0.05, reject the null hypothesis, otherwise accept. Correlation coefficient values: ±0-76 - ±0.99 Very Strong; ±0.51 - ±0.75 Strong; ±0.50 Moderate; ±0.11 - ±0.25 Weak; ±0.01 ±0.11 Very Weak. In table 27, all results show significance to each other, except for the variable data security response of the government because it is greater than the alpha (0.05). This implies that the knowledge about data security correlates with the data security on the internet and websites. The data security response of the government does not show any significant relationship with the knowledge about data security. 46 Synthesis From the data accumulated from the survey conducted, the researchers lead to the conclusion that there is no significant relationship between the variables financial capacity, time and willingness, and accessibility and availability. Upon combining these factors, students show in tables 3, 4, and 5 their financial capacity, their time and willingness to go out and make time to buy the original content, and the availability and accessibility of the authorized copy in their region. With that being said, researchers then correlated these factors with one another to perceive results on whether these factors affect one another. In tables 21, 22, and 23, the results say otherwise. Meanwhile, the other variables do show significant relationships with one another. In tables 24, 25, 26, and 27, there are some factors that don't correlate with one another, but the others do. The researchers have concluded that only 1 factor in each table in 24, 25, 26, and 27 is not significant with the variable that is being correlated. 47 Chapter 5 Summary of Findings, Conclusions and Recommendations This chapter includes the summary of findings of the data presented in chapter 4, as well as the conclusion and recommendations for the previous chapters will also be discussed. Summary of Findings 1. Demographic Profile 1.1 Age Among the 50 respondents that participated in the online survey, 36 or 72% of the students are 17 years old. While the second highest number of respondents is from 16 years old students with a percentage of 22%. The remaining 3 or 6% is from 18 years old respondents. In conclusion, the highest group of respondents are aged 16-17 years old. 1.2 Grade and Section Sacred Heart Academy of Pasig’s grade 11 consists of 4 sections: 11 STEM A, 11 STEM B, 11 ABM C, 11 HUMSS/ArDes D. Out of those 4, 11 STEM A has the most responses with 15 or 30% of students. While the second highest number of respondents with 14 or 28% of students is from 11 STEM B. The 11 ABM C, the third highest number of participants, has 11 or 22% of the students who answered the online questionnaire. While the remaining 10 or 20% comes from 11 HUMSS/ArDes D. Overall, most of the respondents in the online survey are from 11 STEM A or B. 48 2. Factors that Influence Grade 11 Students to Commit Digital Piracy 2.1 Financial Capacity of the Respondents From the gathered data, the researchers have discovered that students strongly disagree that they spend money to buy pirated content just to manage their budget. Although, respondents neither agree nor disagree to be willing to pay double the price for an authorized copy. The participants strongly agree that they access pirated websites and contents because they do not have enough budget to purchase the original copy. However, if they would have the budget, they strongly agree to all means pay for the authorized copy. And lastly, respondents neither agree or disagree that they have the means to pay for the original copy but are not willing to spend more because pirated websites are cheaper and convenient. 2.2 Time and Willingness of the Respondents Based on the accumulated data, the respondents agree that they prefer to purchase or view authorized copy rather than the pirated version. However, the students neither agree or disagree that they prefer to purchase or view pirated copy rather than the original copy. Most of the participants neither agree nor disagree with always having a time to go out and buy the original content. When they were asked if they would make time to go out and buy the authorized content, they neither agreed or disagreed. Lastly, the respondents agree that they are much willing to spend more money for a higher level of security for protection of their online data. 49 2.3 Availability and Accessibility of Content of the Respondents With the gathered data, the researchers drew a conclusion that students agree that the original content they are trying to view or buy is not accessible or available to them, so they would look up pirated websites to have access to them. When they were asked if they use VPNs (Virtual Private Networks) as a channel to access restricted content in their area, they neither agreed nor disagreed. However, the participants agree that they are willing to wait for the unavailable content to be available in their region. If ever it would be available, they agree to by all means to purchase or view the original content if it is now viewable and or purchasable. And lastly, almost half of the respondents answered that they strongly agree to the question that they only view and buy pirated content because the authorized copy is not available in their area, but they do not intend to steal or illegally distribute the copy. 3. Secureness of Data Security From the results and data gathered, the researchers concluded that 31 or 62% of the respondents have not yet committed digital piracy. But, 32 or 64% of the participants have visited pirated websites such as YTS.AM, Cracked-Games.Org, etc. When they were questioned about their accounts being compromised, only 10 or 20% of them had experienced their account being hacked. As a follow-up question, the researchers asked whether the compromised accounts were a cause of visiting unauthorized websites, 7 or 14% of the students said it was. However, despite the consequences digital piracy imposes on the user’s online data, 31 or 62% of the participants are still willing to commit and continue to view pirated content and websites. 50 4. Data Security With the data gathered by the researchers with the use of Likert Scale, they have found out that respondents felt somewhat secured, safe, careful, and vigilant with the precautionary measures that they practice while browsing through the internet. However, the participants also felt neither safe, secured, reliable, and trustful with the websites’ data security that they browse into. When the students were asked how they would rate the government’s response regarding matters like data breach problems, they neither felt it was satisfactory, fast, responsive, nor dependable. The last question in the Likert Scale was about the respondent’s knowledge about data piracy. Their overall knowledge about digital piracy was somewhat good, useful, helpful, and knowledgeable. 5. Relationship Between Variables According to the data gathered, all of the first 3 factors that the researchers composed do not influence students to commit digital piracy. Respectively these are: financial capacity, time and willingness, and accessibility and availability. The 3 factors mentioned above do not share a significant relationship towards each other because they are all greater than the alpha (0.05). However, with the last set of factors which are 4, do influence one another except for one. Namely these are: data security on the internet, data security on websites, data security response of the government, and knowledge about data security. These four variables show significant relationships with each other. But, data security on the internet and data security on websites do not correlate. While, the data security response of the government does not share a relationship with knowledge about data security because they are greater than the alpha (0.05). These correlations prove that financial capacity, time and willingness, and accessibility and availability 51 of content is not a basis of factors that influence students to commit digital piracy. Thus, alteration of factors might be an alternative answer to why students commit digital piracy. But, in terms of other factors such as data security on the internet, data security on websites, data security response of the government, and knowledge about data security can actually influence one another. Hence, this can be a basis of variables that can be considered as to how serious students think digital piracy is. Conclusion A research paper always has a conclusion, and a requirement to create a conclusion is to provide hypotheses beforehand. The researchers wrote five hypotheses for the paper. The first hypothesis is said that if the data shows major results that contain students committing digital piracy, then the students may suffer serious consequences and show how massive the problem can be. The data did not show majority results of students committing data. Because of that, the data shows that only a few were given consequences such as their accounts being compromised by pirated websites. The second hypothesis is said that if the factors are perceived, then a solution can be made to lessen the usage of digital piracy and to protect their data and security. This hypothesis was proven to be true as the researchers were able to find the root cause why students commit digital piracy that being the lack of availability and accessibility. The third hypothesis is said that if the advantages and disadvantages of digital piracy are known, then the artists working in the creative industry will be more aware of the pros and cons of digital privacy. This hypothesis is proved to be true as it seems the respondents were aware of 52 the possible effects of digital piracy to the creative industry as they know that it is bad to pirate content. The fourth hypothesis is that if the data show the consequences of digital piracy to data security, then people can counteract digital piracy for further protection of their data. This hypothesis is proved to be true as the data was able to show that many are threatened by the possible dangers of digital piracy. With that, more following data shows that they are somewhat knowledgeable on what to do if ever digital piracy poses danger to their security. The fifth hypothesis is that if the ways used to bypass anti-piracy measures are revealed, then experts could strengthen the existing anti-piracy programs. This hypothesis is proved to be true as the data shows respondents are knowledgeable by them not being confident no matter what whenever their data security is at risk no matter the situation. They were able to make good decisions and proper cautions such as having strong passwords, downloading files, and looking for ways to have better security for their data such as willingness to pay for softwares that can heighten their online data security. Recommendations After accomplishing this study, the researchers have come up with the following recommendations for the future researchers and readers in order to attain a more precise outcome: 1. Few participants experienced consequences like their accounts being compromised. The researchers recommend raising more awareness by teaching students at schools about the possible consequences of digital piracy to avoid this kind of situation for their account’s security. 53 2. The research can be conducted in a different place, where it is intended for larger data. That’s why the researchers recommend the study should not be limited only to grade 11 students in Sacred Heart Academy of Pasig. Widening your selection of participants by conducting this study in larger areas like NCR, will increase data collection. Which can lead to more accurate results because of the different experience every person has on digital piracy. 3. Supposedly, the respondents of the research were other students in different schools. However, with the limited time and restricted setting, the researchers decided to focus more on the Grade 11 students of Sacred Heart Academy of Pasig. More time should be given to assess the study to accommodate a larger scope. 4. To avoid any possible dangers caused by digital piracy. The researchers highly recommend the use of strong passwords for the safety of their data. In that way, the hackers will not easily access your personal data due to the strong password you have because it can not be predicted easily. 5. The future researchers should find more factors and variables that influence students to commit digital piracy. In that way, there will be more information on what influences them to commit digital piracy regardless of the effects digital piracy brings on data security. With sufficient data and information, the future researchers will now perceive how to lessen the cases of students commiting digital piracy. 54 Bibliography Eisend, M. (2019, June 5). Explaining digital piracy: A meta-analysis. Information Systems Research. Retrieved from https://pubsonline.informs.org/doi/full/10.1287/isre.2018.0821 Busalim, A. H., Hussin, A. R. C., & Iahad, N. A. (n.d.). Factors influencing customer engagement in social commerce websites: A systematic literature review. Journal of theoretical and applied electronic commerce research. Retrieved from http://www.scielo.cl/scielo.php?script=sci_arttext&pid=S0718-18762019000200102 Fighting against digital piracy in the streaming age. Cartesian. (2021, June 15). Retrieved from https://www.cartesian.com/fighting-against-digital-piracy-in-the-streaming-age/ Virginia Commonwealth University VCU scholars compass. (n.d.). Retrieved from https://scholarscompass.vcu.edu/cgi/viewcontent.cgi?article=7602&context=etd Association, A. V. I. (2020, October 20). New survey shows Philippines among highest in online piracy in Southeast Asia. Retrieved from https://www.prnewswire.com/news-releases/new-survey-shows-philippines-among-highest-in-on line-piracy-in-southeast-asia-301154664.html Tom Gann May 01, Gann, T., Tom Gann Director, Director, & Tom Gann is the Chief Public Policy Officer at McAfee. In this capacity. (2019, May 1). Why data security is important. McAfee Blog. Retrieved from https://www.mcafee.com/blogs/other-blogs/executive-perspectives/why-data-security-is-importa nt vi David Harrington David is a professional writer and thought leadership consultant for enterprise technology brands, Harrington, D., David is a professional writer and thought leadership consultant for enterprise technology brands, Harrington, D., & By. (n.d.). Data security: Importance, types, and solutions. Varonis. Retrieved from https://www.varonis.com/blog/data-securitys/ What is Data Security? Digital Guardian. (2021, August 12). Retrieved February 8, 2022, from https://digitalguardian.com/blog/what-data-security What is Data Security: Threats, risks & solutions: Imperva. Learning Center. (2021, January 21). Retrieved from https://www.imperva.com/learn/data-security/data-security/ Data Privacy Faqs. Data Privacy Philippines. (n.d.). Retrieved from https://www.privacy.com.ph/learn-data-privacy-compliance/data-privacy-faqs/ LexisNexis. (n.d.). The Philippine privacy regime fails to live up to expectations. MLex Market Insight. Retrieved from https://mlexmarketinsight.com/news-hub/editors-picks/area-of-expertise/data-privacy-and-securit y/philippine-privacy-regime-fails-to-live-up-to-expectations F-Secure. (2020, July 3). Why do hackers want your personal information? F. Retrieved from https://www.f-secure.com/en/home/articles/why-do-hackers-want-your-personal-information#:~:t ext=Stolen%20data%20is%20used%20to,the%20scam%20as%20something%20legit Putman, P. (2019, January 8). The consequences of digital piracy. United States Cybersecurity Magazine. Retrieved from https://www.uscybersecurity.net/digital-piracy/ vii Network, M. P. (2019, February 13). What is a Torrent? Here's all that you need to know. My Private Network | Global VPN Service Provider. Retrieved from https://www.my-private-network.co.uk/what-is-a-torrent/ Filipinos don't see piracy as grave as shoplifting, says ... (n.d.). Retrieved from https://www.cnnphilippines.com/news/2021/1/4/Filipinos-piracy-shoplifting.html What is Data Security? data security definition and overview. IBM. (n.d.). Retrieved from https://www.ibm.com/topics/data-security The evolution and history of hacking. GradSchools.com. (2022, February 3). Retrieved from https://www.gradschools.com/degree-guide/evolution-of-computer-hacking Despard, M., Grinstein-Weiss, M., Chun, Y., & Roll, S. (2022, March 9). Covid-19 job and income loss leading to more hunger and financial hardship. Brookings. Retrieved from https://www.brookings.edu/blog/up-front/2020/07/13/covid-19-job-and-income-loss-leading-tomore-hunger-and-financial-hardship/ Jeremiah Lagran Follow. (n.d.). Online piracy paper. SlideShare a Scribd company. Retrieved from https://www.slideshare.net/JeremiahLagran/online-piracy-paper-69533230 viii Appendices Survey Questionnaire Link: Google Forms SHAP mail: https://docs.google.com/forms/d/e/1FAIpQLSep7wR9D9e_Nfg2FZDKa9Bj_ogWafgsJDNmIJpis mG4trybbA/viewform?usp=sf_link The contents of the survey can be seen on the next following pages. ix Good day, We are the student researchers from Sacred Heart Academy of Pasig and we are conducting a study on “The Effects of Digital Piracy in Data Security of Grade 11 Students in Sacred Heart Academy of Pasig” We would like you to participate in answering the following questions for our study. This will only take up at least 5-10 minutes of your time; so, we hope that you will help us by giving honest answers. If you have concerns regarding your personal information, rest assured that all of it will be kept safe and we won’t disclose any of it. Any questions regarding the survey could be asked to the researchers through their email accounts: Alisha Margareth Infante alisha.infante@shap.edu.ph Knurl Randel Abasola abasola.knurlrandel@shap.edu.ph Zion Garret Castillo castillo.ziongarret@shap.edu.ph x Dylan Edrich Gonzales gonzales.dylanedrich@shap.edu.ph Jayson Orje orje.jayson@shap.edu.ph Kyle Vincent Vizmonte vizmonte.kylevincent@shap.edu.ph Francine Hannah Santos santos.francinehannah@shap.edu.ph Thank you for lending us your time. By ticking this box, you are giving consent and your full honesty in answering this survey for the ongoing research entitled: The Effects of Digital Piracy in Data Security of Grade 11 Students in Sacred Heart Academy of Pasig. Name (OPTIONAL): Age: Section and strand: xi Guide Questions that Influence Students to Commit Digital Piracy Please rate yourself on the following: [1; strongly disagree, 2; somewhat disagree, 3; neither, 4; somewhat agree, 5; strongly agree] Financial Capacity I spend my money to buy pirated content to manage my budget. I am willing to pay double the price for an authorized copy. You access pirated content/websites to stream/download content because you do not have enough budget to pay for the original copy. If you have enough budget, you would pay for all means for the original copy. You have the means to pay for the original copy, but you are not willing to spend more because you believe pirated websites are cheaper and convenient. Strongly Disagree Somewhat Disagree Neither Somewhat agree Strongly agree 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 xii Guide Questions that Influence Students to Commit Digital Piracy Please rate yourself on the following: [1; strongly disagree, 2; somewhat disagree, 3; neither, 4; somewhat agree, 5; strongly agree] Time and Willingness Strongly Disagree Somewhat Disagree Neither Somewhat agree Strongly agree You prefer to purchase/view the authorized copy rather than the pirated version. 1 2 3 4 5 You prefer to purchase/view the pirated copy rather than the authorized version. 1 2 3 4 5 You always have the time to go out and buy the original content. 1 2 3 4 5 You would make time to go out and buy the authorized content. 1 2 3 4 5 1 2 3 4 5 You are willing to spend more money for a higher level of security for your online data. xiii Guide Questions that Influence Students to Commit Digital Piracy Please rate yourself on the following: [1; strongly disagree, 2; somewhat disagree, 3; neither, 4; somewhat agree, 5; strongly agree] Availability and Accessibility of Content The original content that you are trying to view/buy is not accessible or available in your region, so you would look up to pirated websites to access them. You use VPNs (Virtual Private Networks) to access the content that is not available to your region. You are willing to wait for the unavailable authorized content to be available in your area. You would by all means purchase/view the original content if it is available in your region. I only view/buy pirated content because it is not available in my area. But I do not intend to steal or illegally distribute the copy. Strongly Disagree Somewhat Disagree Neither Somewhat agree Strongly agree 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 xiv A Five-Item Binary Scale for Measuring Secureness of Data Security Please choose one appropriate answer [yes, no] by ticking the box. Has any of your device or social media accounts (Messenger, FaceBook, Gmail, etc.) ever been compromised? Yes No Have you ever visited an illegal website such as YTS.AM, Cracked-games.org, etc. that allows you to stream or download pirated content? Yes No Was your device or account compromised as a result of visiting an illegal website? Yes No Have you ever committed digital piracy? Yes No Would you still continue to commit digital piracy in spite of the consequences it poses on your data security? Yes No xv A Five-Item Likert Scale for Measuring Confidence in Internet Data Security Please rate yourself on the following: [1; strongly disagree, 2; somewhat disagree, 3; neutral, 4; somewhat agree, 5; strongly agree] Strongly Disagree Somewhat Neutral Disagree Somewhat agree Strongly agree I feel secure in putting my data online. 1 2 3 4 5 I feel safe when downloading files online. 1 2 3 4 5 I feel secure with all the websites I visit online. 1 2 3 4 5 I am cautious when I install anti-virus and malware protection for my security. 1 2 3 4 5 I feel safe when I use strong passwords for my accounts. 1 2 3 4 5 xvi Semantic Differential Scale for Measuring Data Security on The Internet Please rate yourself on the following: [1; very much, 2; somewhat, 3; neither, 4; somewhat, 5; very much] Q: How would you rate the precautionary measures you do when browsing online? Very Much Somewhat Neither Somewhat Very Much Secured Unsecured Safe Unsafe Careful Careless Vigilant Negligent Semantic Differential Scale for Measuring Data Security on Websites Please rate yourself on the following: [1; very much, 2; somewhat, 3; neither, 4; somewhat, 5; very much] Q: How would you rate the data secureness of the websites that you visit? Very Much Somewhat Neither Safe Somewhat Very Much Unsafe Secured Unsecured Reliable Unreliable Trustful Distrustful xviii Semantic Differential Scale for Measuring Data Security Response of the Government Please rate on the following: [1; very much, 2; somewhat, 3; neither, 4; somewhat, 5; very much] Q: How would you rate the response of the government about data breach problems? Very Much Somewhat Neither Somewhat Very Much Satisfactory Poor Fast Slow Responsive Apathetic Dependable Undependable Semantic Differential Scale for Measuring Data Security of Users Please rate yourself on the following: [1; very much, 2; somewhat, 3; neither, 4; somewhat, 5; very much] Q: How would you rate your online account’s security? Very Much Somewhat Safe Neither Somewhat Very Much Unsafe Secured Unsecured Reliable Unreliable Trustful Distrustful xix Semantic Differential Scale for Measuring Knowledge About Data Security Please rate yourself on the following: [1; very much, 2; somewhat, 3; neither, 4; somewhat, 5; very much] Q: How would you rate your knowledge about digital piracy? Very Much Somewhat Neither Somewhat Very Much Good Bad Useful Useless Helpful Unhelpful Knowledgeable Ignorant A Guttman Scale for Measuring Negative Factors of Digital Piracy to The Data Security Please choose one appropriate answer [yes, no] by ticking the box. 1. Do you think pirating content online is bad for the creative industry? Yes No 2. Do you think harmful malware (any type of software designed to exploit programmable devices and networks) from pirate websites pose a threat to peoples’ data security? Yes No 3. Would you be scared if harmful malware from pirate websites poses a threat to your school organization’s data security? Yes No 4. Are you worried about harmful malware posing a threat to your family’s online data? Yes No 5. Are you worried about harmful malware posing a threat to your online data? Yes No xx A Close-Ended Question To Measure Students’ Practices When Browsing the Internet Please rate yourself on the following: [1; very much, 2; somewhat, 3; neither, 4; somewhat, 5; very much] Q: How often do you practice safe precautionary measures to ensure the safety of our online data? Very Much Somewhat Rarely Neither Somewhat Very Much Often Thank you for truthfully answering our survey! Your answers will go a long way in our research. Have a good day! xxi Date: March 11, 2022 Subject: Letter of Invitation for Pilot Testing of Online Survey in Practical Research Dear Participant/s, Good day! We are group 1 from 11 STEM B, and the researchers have chosen you to be one of the participants in the pilot testing of the online survey for this research entitled “The Effects of Digital Piracy in Data Security of Grade 11 Students in Sacred Heart Academy of Pasig.” It will only take about 5-10 minutes of your time to complete the questionnaire. Please see attached link for the pilot test: https://forms.gle/xNHnqWCaQgVH4TeRA If you have any queries about the survey, you may contact the researchers through their SHAP mails, or feel free to contact the research leader, Alisha Margareth L. Infante (alisha.infante@shap.edu.ph). Thank you for allocating your time and effort in answering the pilot testing of our survey. Have a nice day! Sincerely yours, Alisha Margareth L. Infante Group 1 Representative of 11 STEM - B xxii ABASOLA, Knurl Randel B. 110 Matahimik St. Tawiran Extension, Santolan, Pasig City Contact Number: 09205802014 Email Address: abasola.knurlrandel@shap.edu.ph EDUCATIONAL BACKGROUND 2012 - Present : Sacred Heart Academy Of Pasig 2009 – 2012 : LRC Learning Center ACHIEVEMENTS 2018 – 2020 : Sepak Takraw PAPRISA Champion | Division Meet 1st Runner Up | Sepak Takraw | PAPRISA Champion | Division Meet 1 st Runner Up 2014 - 2020 : With Honors 2012 – 2013 : Top 4 | 3rd Place Word Factory | Buwan ng Wika Quiz Bee Awardee xxiii CASTILLO, Zion Garret N. 305 Senja, East Raya Gardens Mercedes Ave. Pasig City Contact Number: 09178859986 Email Address: castillo.ziongarret@shap.edu.ph EDUCATIONAL BACKGROUND 2021 - Present : Sacred Heart Academy of Pasig 2017 - 2021 : Sacred Heart Academy of Pasig 2008 - 2016 : Nest Elementary School, Quezon City ACADEMIC ACHIEVEMENTS 2018 - 2020 : With Honors 2019 : 2nd Place Soccer Paprisa 2018 : 3rd Place Cheer Dance Competition xxiv GONZALES, Dylan Edrich P. Hampton Gardens C. Raymundo Ave., Maybunga Pasig City Contact Number: 09532669813 Email Address: gonzales.dylanedrich@shap.edu.ph EDUCATIONAL BACKGROUND 2010 - Present : Sacred Heart Academy Of Pasig ACHIEVEMENTS 2018 - 2020 : With Honors 2010 - 2017 : Merit Awardee 2014 – 2015 : MTAP – DepEd – NCR Participant xxv ORJE, Jayson T. Blk 3 Lot 34 Molave St., Greenwoods Executive Village Cainta City Contact Number: 09662032740 Email Address: orje.jayson@shap.edu.ph EDUCATIONAL BACKGROUND 2017 - Present : Sacred Heart Academy of Pasig City 2012 - 2017 : St. Joseph Children's Center 2010 - 2013 : Lord’s Hand Academy ACHIEVEMENTS 2011 - 2020 : With Honors xxvi VIZMONTE, Kyle Vincent T. Blk 31 Lot 17 Rosewood St., Greenwoods Executive Village Cainta City Contact Number: 09178175512 Email Address: vizmonte.kylevincent@shap.edu.ph EDUCATIONAL BACKGROUND 2014 - Present : Sacred Heart Academy of Pasig 2012-2014 : Pasig Catholic College ACHIEVEMENTS 2018 - 2020 : With Honors xxvii INFANTE, Alisha Margareth L. Blk. 2 Lot 13 Somerset Avenue, Somerset Place Manggahan Pasig City Contact Number: 09054552544 Email Address: alisha.infante@shap.edu.ph EDUCATIONAL BACKGROUND 2021 – Present : Sacred Heart Academy of Pasig 2018 – 2021 : ADT Montessori School 2014 – 2018 : Sister’s of Mount Carmel Catholic School 2010 – 2014 : Prince N’ Princess School 2009 – 2010 : Maybunga Child Devt. Center ACHIEVEMENTS 2020 - 2021 : With Honors 2018 - 2020 : Merit Awardee 2015 - 2016 : Araling Panlipunan Quiz Bee Awardee xxviii FRANCINE HANNAH D. SANTOS Blk. 9 Lot. 5 Millenium Gardens Maybunga, Pasig City Contact Number: 09171460868 Email Address: santos.francinehannah@shap.edu.ph EDUCATIONAL BACKGROUND 2012 - Present : Sacred Heart Academy of Pasig 2010 - 2012 : Holy Spirit School 2007 - 2010 : Kindercare Learning Center ACADEMIC ACHIEVEMENTS 2018 - 2021 : With Honors 2017 With Honors | Participation Award MTAP-DepEd-NCR Saturday Program : 2012 - 2017 : With High Honors xxix