book

Cybercrime Law in Phillipino School Curriculums

21 Pages 2752 Words 1557 Views

In the generation today, most of the people say that they can’t live without the internet. However, internet is becoming the manipulator instead of humans being the ones manipulating it. In Carr (2010)’s book, he stated that the internet affects people’s lives by changing the way humans read, think, act and say, and how short a person’s attention span could be. Technologies have changed the way humans think and act as well. Carr also mentioned that the internet changes they way on how people use their emotions and intelligence. It’s possible to say that people want to have a good reputation in every facet. Once a person has a bad reputation, it will be hard to clean. The internet has innovated itself in many ways for it to be more entertaining; therefore, creating social media – having reputations online. In the internet, reputations can be destroyed even in just one click of a person’s mouse. In Fertik’s book (2010), it says it’s fine to fight back and defend one self’s reputation as long as he is the one who’s right. When a person’s a cultured man, he wouldn’t let someone’s life be destroyed. And this destruction usually happens in social media. Social media is created to build and reunite friendships, checking and seeing updates, announcements and promotions, buying and selling items, voicing out opinions, reactions and suggestions, and communicating to people who are usually hard to speak to instantly and easier. Christakis (2009) said that by the humans’ emotions, people become peripheral in networks – being too attached in social media. When a person’s unhappy, he becomes more peripheral –wanting to express more than a person usually does in his daily life in the internet by buying, venting, making impulsive choices. Social media is likely to be either risky or handy because they are proofs against or for someone. Cotterell (2007) stated in his book that social media could be either a good or bad influence, depending on the upbringing of one’s family, influence of people around a person, and the user himself. Social networks and media help shape the youth and adolescents’ life experiences with how they treat it. It will be considered an abuse when a person actually starts to spy, track or stalk someone online, which primarily leads to invasion of privacy, hacking, posing and identity theft. These abuses in the internet are called cybercrimes. People for their personal advantages popularly do these cybercrimes. There are many solutions for this problem to lessen. And the simplest and easiest way to start reducing this problem is by letting everyone know about a law that opposes these wrongdoings, particularly the Philippine cybercrime law. In order to prevent cybercrimes, the principals and other faculties should start imparting in the students what should be done, specifically students who are in Junior High School: Grades 7-10, ages 12-16. According to, Brenda Corpuz, Ph.D., K-12’s goal is to improve the quality education in the country. Since that’s the goal, schools must discuss and include in their K-12 Junior High School classes the negative effects of hacking, invasion of privacy and posing so that they would be alert if they get hacked, posed or invaded and be informed what the consequences may be if they do such crimes, which are mentioned in the Philippine cybercrime law. The Philippine cybercrime law should be included in the lesson plan. There’s a reason why such law is regulated hence students should be aware about it – for everyone’s own good. When the students know about the Philippines cybercrime law, then they will have bigger chances in the prevention of hacking, invasion of privacy and posing. The Philippine cybercrime law, particularly in Chapter II, Section 4 A and B outlaw such wrongdoings. Nowadays, some people have been hacking, posing, invading of privacy and stealing identities of other people. There are many ways that people may victimize other people but there are also ways to counteract it. Giving too much personal information can make people track other people and lead them to invading someone’s privacy and hacking might commence if too much invasion of privacy has been done. Invasion of privacy is looking at a person’s profile like their personal information, videos, photos, status updates, tweets a lot than usual and taking note every change and update the person has done. Hacking is when you know the username and password of a person and use it without permission. Using it in a way that the person has no benefit with what the hacker is doing to his profile, and sometimes the hacker changes the owner’s password. People should be really cautious with what they display and post because many spy people. It’s unavoidable to be not tracked on. People have different stalkers and each of them have different intentions. Even experts get tracked and invaded. People are so used to other people invading their privacy t

Read Full Essay