Professional Documents
Culture Documents
Researchers:
Escribano, Nadezhda A.
Mañalac, Ericka Gae B.
Napiñas, Erika Kyle T.
Ople, Princess Mae B.
Sarita, Jared Jehu V.
Serrano, Ma. Natalie Dominic
Presented to
SCITECS Teacher
TABLE OF CONTENTS
CHAPTER I
INTRODUCTION 3
1.1 Background of the Study 3-4
1.2 Statement of the Problem 4-5
1.3 Objectives 5
1.4 Significance of the Study 5-7
1.5 Scope and Limitations 7-8
CHAPTER II
REVIEW OF RELATED LITERATURE AND STUDIES 9
2.1 Expense Tracker 9-11
2.2 Impulsive Buying 11-13
2.3 Online Scams Experienced by Individuals 13-15
2.4 Technological Issues in Cyber World 16-21
CHAPTER III
METHODOLOGY 22
3.1 Research Design 22
3.2 Locale of the Study 22
3.3 Population and Sampling Design 23
3.4 Statistical Treatment for Sampling Design 23-24
3.5 Data Gathering Tool 24-25
3.6 Data Gathering Procedures 25
3.7 Statistical Treatment Applied for the Results 25
3.8 Step-by-step process on how the researchers came up
with the Innovation of EXTRACK Application 26-27
FEATURES OF THE INNOVATION 27
Checklist Summary of Features 27-28
Explanation for the EXTRACK logo 29-30
APPENDICES 31-33
REFERENCE LIST 34-36
2
CHAPTER I
INTRODUCTION
3
proper allocation of financial resources and also grants the opportunity to
observe spending habits.
Many users have realized through the hard way that their usage of
e-banking might put their financial data at danger since the advent of
internet banking to the banking sector. As a result, both banks and users
have become concerned about security. (Alsayed and Bilgrami, 2017)
4
3. How efficient is EXTRACT towards addressing the consumer's needs
in terms of:
a. Customer assistance in budgeting finances
b. Monitoring accounts, expenses, and transactions
c. Setting expenditure limits
d. Recording account balances
1.3 Objectives
As the majority of both international and local banks also offer their
services through online and mobile platforms, there were many incidents
wherein security issues arose. Cyber attackers have devised a number of
5
evasive strategies for stealing money from internet banking. The findings of
this study will be greatly beneficial to the following:
6
D. Investors
F. Other Researchers
7
or Credit Cards registered in devices and online shops, and (3) Electronic
Wallets or e-wallets. EXTRACK does not involve transactions paid in hard
cash and physical money.
8
CHAPTER II
9
expenses and keep the track of the expenditure”. So, in relation to that,
expense trackers are also focused on budgeting. There is a need to do
budgeting with the finances because people buy their needs and wants
with money, so there is an obligation to evenly distribute the resources
appropriately. As stated in their research, “Budgeting is an integral part of
society. Budget Tracking involves recording and analyzing the incomes and
expenses of a person or an organization over a particular period of time.
Today, since we are living in a hurry to get it done, many people are
looking forward to efficient ways to budget their time and money” (Bekaroo
and Sunhaloo, 2017).
10
responsible with their money and help alleviate any of their economic
problems.
11
CHARACTERISTICS OF IMPULSIVE BUYER
3. Lack of self-control
12
self-control when it comes to purchasing an item without being tempted on
buying other products aside from what is needed.
The fact that there are instances where students browse unrestricted
websites in a search for textbooks that would cost them lesser than those
offered or prescribed by their school poses a threat to these students of
being scammed. There are also many products that students browse on
these unrestricted websites that are not sold locally, and in despair of
wanting to have such products at a lower cost, they end up giving away
private information such as their credit card number. The same could also
apply to teachers who seek cheaper textbooks just to be able to discuss
their lessons with the guidance of the prescribed textbook of the school,
13
and also other products they browse on unrestricted websites, as they
could also be possible victims of fraud. (Hache & Ryder, 2011).
I look forward to reading from you in a view to knowing more about your
pieces of inventory. As a matter of importance, I would also like to know if
you accept a check as a means of payment.
Regards,
Jamie W”
14
Not to mention the grammatical errors, the blogger was suspicious as
the potential seems to be in a hurry in purchasing the artwork of his wife.
Also, the potential buyer mentioned the use of a check as a means of
payment. The blogger’s wife exchanged emails with the potential buyer
and ended up not having a transaction with the potential buyer due to
different factors such as the use of a check as a means of payment, the
change of note name from Jaime to Wilfred in his succeeding mails,
offering an unnamed shipping agent he prefers, and suggesting to issue a
check that is more than the amount due and later on ask Tom’s wife to
send the excess money back to him.
The victim left a message for those who committed the fraudulent
activity and said in an interview, “I hope they don’t use the talents the Lord
gave them on bad deeds. They do not know the hardships endured by
those they are stealing from. I hope they are bothered by their
conscience,”. Benjo Basas, the Teacher’s Dignity Coalition chairman,
mentioned that Landbank should have alerted its clients about suspicious
transactions before such fraudulent activities could happen. Landbank, on
the other hand, promised to cooperate with the NBI in performing an
international investigation but nonetheless maintained that its system is
secured from hacking.
15
2.4 Technological Issues in the Cyber World
Phishing
Phishing operations have been in the cyber world for decades, and
they are a worldwide critical problem that also poses a danger in the cyber
world. Cyber intruders are using a variety of innovative and inventive
tactics to carry out phishing operations, which are on the rise. Since an
outcome, this is relevant to the researchers’ study, as EXTRACK application
has been modified to protect and avoid this sort of technical problem. The
reviewed paper (Alabdan, 2020) defines phishing as a social engineering
approach that seeks to persuade the target of an attack to expose personal
information, such as an email address, login, password, or financial
information, using a variety of techniques. According to the study, the FBI
received roughly 100 complaints worldwide in 2018, with the most typically
targeted sectors being healthcare, education, and air travel, resulting in a
total net loss of nearly USD 100 million. In that case, phishing is a serious
crime and a dangerous threat for all institutions, not just, but also to
individuals, because hackers frequently use trusted organizations'
reputations to dupe their victims into revealing private data, including
financial information, which can lead to money theft without the victim's
knowledge. In addition, phishing emails were used to contract workers and
get their login credentials.
16
connected to the New Network phishing site, which had details on the
giveaway as well as a fake scrolling chat bar to give the appearance of
credibility. However, this phishing attack has a process of phishing that is
elaborated, as phrased by Proposed Phishing Anatomy. In this modern
world, we are engaged in advanced technology which could be a victim of
phishing. According to Alkhalil et al., 2021, the initial step in the phishing
process is to obtain the personal information of the victims. As part of the
preparation process, the phisher then chooses which attack strategy will be
used in the phishing attack. The next step is the preparation phase, in
which the phisher begins to look for weaknesses that might lead to the
victim being cornered. In the third step, the phisher launches his operation
and waits for the victim to respond. In the valuables acquisition phase,
which is the last stage in the phishing process, the attacker might then
collect the spoils.
17
Fraud
18
(10) years, as well as a fine of P10,000.00 or twice the value of the access
device acquired, whichever is more than, for anybody who uses an access
device, notably a credit card, without the owner's permission.
Estafa
19
Article 315 of the Revised Penal Code provided that estafa may be
executed through:
3. Fraudulent means:
a. Inducing another, through deceit, to sign any document;
b. Resorting to fraudulent practice to ensure success in a
gambling game;
c. Removing, concealing or destroying – in whole or in part – any
court record, office files, document, or any other papers.“
20
In relation to the Republic Act of 10175 or the Cybercrime Prevention
Act of 2012, Kistiakowsky, 29, is facing charges of estafa and was brought
to the Pasay City Police Station for documentation prior to the procedural
return of the warrant of arrest to the Pasay City Regional Trial Court Branch
117.. Sinas also encouraged those who were victimized by Kistiakowsky to
file a case against the offender, and assured the further investigation on
the bitcoin anomalies allegedly committed.
On the same day, Kli Ban Rapista Agarrado alias Marco Castro
Margarico was arrested in an entrapment operation in his condominium
unit in Taguig City by the Philippine National Police-Anti-Cybercrime Group
(PNP-ACG) together with its director, Brig. Gen. Dennis Agustin. Agarrado,
22, is an inline seller who allegedly committed credit card fraud (Caliwan,
2020).
21
CHAPTER III
METHODOLOGY
22
3.3 Population and Sampling Design
The participants are the citizens of the Zamboanga City, ages from 15
years old to 50 and they will be given a chance to try the EXTRACK
application for a month and a half for free, and after the experience they
will be given a survey questionnaire through the use of Google Forms
related to the Statement of the Problem and will be analyzed through the
use of Slovin’s Formula for statistical presentation.
Shown below are the following steps to achieve the 35 sample size, by
using the Slovin’s Formula.
23
n=50/1+(50x0.05)^2
n=6.8 or 7
- For Western Mindanao State University
n=50/1+(50x0.05)^2
n=6.8 or 7
- For Universidad de Zamboanga
n=50/1+(50x0.05)^2
n=6.8 or 7
- For Pilar College of Zamboanga, Inc.
n=50/1+(50x0.05)^2
n=6.8 or 7
- For Southern City College
n=50/1+(50x0.05)^2
n=6.8 or 7
3. After solving for each college’s sample size, add them up or multiply
the answer of one college into 5.
- 7 sample sizes for each college times 5 colleges equals 35.
Solution :
7(5) = 35
24
The 5-point Likert Scale Questionnaire consists of different degrees such as
strongly agree for the highest and strongly disagree for the lowest.
The statistical tool to be used for the statement of the problem in this
study is the solving for the Percentage of the average scores of the
answers given by the participants, based on the questions stated in the
survey questionnaire.
25
3.8 Step-by-step processes of how the researchers came up with
the innovation of EXTRACK Application:
1. Ask a question
- The researchers put a question about how much some of the
students, employees, and other citizens of Zamboanga City spend
through an online transaction.
2. Do background research
- After inquiring about the issue to the people, they immediately
conduct a background check to determine if there was an application
that provides a tracker of every expense made in the online setting.
3. Construct a hypothesis
- The hypothesis of the innovation is “If I used online platforms for
shopping, paying my expenses, and other inquiries, it would lead me
to experience technological issues such as phishing, fraud, estafa
action, and other issues.”
26
of Expense, Two-Factor Authentication, and Periodical Updates on
User’s Finances to prevent the following technological issues of
phishing, fraud, estafa actions, and other issues.
- NOTE:
1. EXTRACK (combination of EXpense and TRACKer)
2. Lightweight (only utilizes a minimal amount of RAM & small
amount of device memory)
3. Small compact (one place access)
27
users will not be able to use their e-money unless it is highly
necessary.
5. The EXTRACK app will connect with the users' online banking,
financial applications, and e-wallets. Because this application serves
as one of many types of online banking, financial applications, and
e-wallets, every transaction in those areas will be immediately logged
in the expenditure tracker for the convenience of users.
28
Explanation of EXTRACK logo:
The researchers decided that “less is more”, which is why the design
of our icon is simple but eye-catching in a way that the details of the
design are precise, and not overpowering since the elements are carefully
selected because the researchers want to avoid messy formats that is
uncomfortable to the eyes of the users. The researchers also opted to
make the application look very organized and understandable (easy to use)
wherein the users know how to navigate and locate each section.
29
As mentioned earlier in this paper, the EXTRACK comes from the
words EXpense and TRACKer, and the researchers combined those letters
from the two words to create the brand name. EXTRACK is the name
simply because the application is all about tracking expenses. It is an easy
word to remember since it is short, surely that individuals could easily recall
right away the name of the application.
● Elements
30
Appendices
Survey Questionnaire:
EXTRACK APPLICATION
Survey Questionnaire
Name:_________________________________________________
Age:_________________________
School:________________________________________________
Check the suitable box for you below:
Student
Faculty
Non-teaching Personnel (NTP)
31
information, etc.)
a. It controls my budget/expenses
for the month.
32
Working Model: Icon of the Application:
33
REFERENCE LIST
Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021, January 01). Phishing
attacks: A recent comprehensive study and a new anatomy. Retrieved
April 21, 2022, from
https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full
Chauhan, S., Banerjee, R., & Dagar, V. (2021, September 13). Analysis of
impulse buying ... - journals.sagepub.com. Retrieved April 19, 2022,
from
https://journals.sagepub.com/doi/full/10.1177/09763996211041215
34
Fraud triangle. (2022). Retrieved April 20, 2022, from
https://www.agacgfm.org/Intergov/Fraud-Prevention/Fraud-Awareness
-Mitigation/Fraud-Triangle.aspx
Gupta, H., Singh, A., Kumar, N., & Blessy, J. (2020, December 25). Expense
tracker : A smart approach to track everyday expense. Retrieved April
18, 2022, from https://easychair.org/publications/preprint/73S7
How to file an estafa case. (2019, April 22). Retrieved April 20, 2022, from
https://www.duranschulze.com/how-to-file-an-estafa-case/
Kazi, A., Kherade, P., Vilankar, R., & Sawani, P. (2021, May). Expense
tracker - irejournals.com. Retrieved April 18, 2022, from
https://irejournals.com/formatedpaper/1702687.pdf
Pendergast, T. (2021, November 09). Art scam. Retrieved April 19, 2022,
from
35
https://staysafeonline.org/blog/art-scam/?fbclid=IwAR3JV5DvlNckmjdy
OL5d64yEsIW0ZKPtIfh1X0yL3IUH-gR7zrJmiWipP6g
Safeena, R., Kammani, A., & Date, H. (2010, April). Customer perspectives
on E-business value: Case study on ... Retrieved April 18, 2022, from
https://www.researchgate.net/publication/265967922_Customer_Persp
ectives_on_E-business_Value_Case_Study_on_Internet_Banking
Singh, U., Et al. (2021). Spending tracker: A smart approach to track daily
expense. Retrieved April 18, 2022, from
https://turcomat.org/index.php/turkbilmat/article/view/8759
Teravainen, T. (2020, April 16). What is single sign-on (SSO) and how does
it work? Retrieved April 21, 2022, from
https://www.techtarget.com/searchsecurity/definition/single-sign-on
Williams, E., Beardmore, A., & Joinson, A. (2017, March 06). Individual
differences in susceptibility to online influence: A theoretical review.
Retrieved April 22, 2022, from
https://www.sciencedirect.com/science/article/pii/S0747563217301504
36