Professional Documents
Culture Documents
0 03082023 / Page 1 of 4
RAFAL, RIZALEEN L.
Proposed Research
Adviser
Proposed Research No 01
Title Study of Securing Accounts in Social Media: Effectiveness of Protecting A Personal Identity for the Selected
Students of University of Cabuyao
According to Hussain, A. (2022) Identity theft is the act of obtaining another person’s financial
or personal information with the intent to use it to conduct fraud, such as making unlawful
purchases or transactions. There are numerous ways to commit identity theft, and the victims
frequently suffer consequences to their reputation, wealth, and credit. The stolen data can be
used to incur debt, obtain credit, buy products and services in the victim’s name, or give the thief
fraudulent identification. Rarely, a fraudster may provide a fraudulent ID to law enforcement,
resulting in a criminal record or unfulfilled arrest warrants for the individual whose identity has
been stolen. (Lutkevich B. 2021). According to a poll by the data analytics company Fico,
almost 4.5 percent of adult Filipinos, or 5 million people, reported having been victims of
identity theft, which could have cost them money. Additionally, 6.7 million Filipinos, or 6%,
think their identity was fraudulently used to open a financial account, according to Fico, who
said that this indicated a growing awareness of such scams. (Piad, T.J.C. 2022).
With these life-threatening situations, many victims of the identity theft face the consequences
for the act they did not do. According to Givens, B. (2000) The organizations that provided the
identifying information to the victims offer little assistance. Investigations into these offenses
are rare by law enforcement. Victims frequently invest a lot of effort in resolving the problem.
Identity theft is a crime according to both federal and state regulations. To encourage the credit
industry to improve how they conduct business, new laws are however required. The
requirements of victims who have false criminal records must likewise be covered by legislation.
Lists of identity theft-related publications and websites.
II. OBJECTIVES:
The purpose of this study is to know the effectiveness of securing account in social media of the
selected students of University of Cabuyao.
• To know different things that cause the problems of today’s technology based on the results of
the surveys and how they affect the security of social accounts
• To determine the reasons behind some students turning their personal accounts in private
• To analyze the number of students who have been privating an account for their security
PNC:PRE-FO-66 rev.0 03082023 / Page 2 of 4
• To compare all the collected datas of students who are privating an account and its
effectiveness
☐ High Governance
☐ Quality Education
Theoretical Drive Please check the research design you will use to accomplish the objectives.
☐ Mix-Methods Research
☐ Convergent Parallel
☐ Explanatory Sequential
☐ Exploratory Sequential
☐ Embedded Design
☐ Transformative Design
☐ Multiphase Design
☐ Others, please specify
_______________________
Methods Please check the methods of analysis you will use to accomplish the objectives.
Cassim, F. (2015) "Protecting personal information in the era of identity theft: Just how safe is our personal
information from identity thieves?" https://www.ajol.info/index.php/pelj/article/view/121286
Joey Dibley (November 14, 2022) National Institute of Standards and Technology (NIST), a U.S. federal agency
https://blog.netwrix.com/2022/11/14/nist-password-guidelines/
Barth (2016) Dammam 31441, Saudi Arabia: Factors Affecting Cybersecurity Awareness among University
Students https://www.mdpi.com/1525042
Proposed Research No 02
Title Study of Using Virtual Apps: Effectiveness of Online Business on Selected Online Seller University of Cabuyao
Students' Sales and Marketing
PNC:PRE-FO-66 rev.0 03082023 / Page 4 of 4
II. OBJECTIVES:
The purpose of this research study is to determine the effectiveness of online business and its
effects on the sales and marketing of the products of selected online seller students at the
University of Cabuyao.
• To analyze the different ways of promoting online businesses and how they affect the
marketing strategy
☐ High Governance
☐ Quality Education
PNC:PRE-FO-66 rev.0 03082023 / Page 5 of 4
Theoretical Drive Please check the research design you will use to accomplish the objectives.
☐ Mix-Methods Research
☐ Convergent Parallel
☐ Explanatory Sequential
☐ Exploratory Sequential
☐ Embedded Design
☐ Transformative Design
☐ Multiphase Design
☐ Others, please specify
_______________________
Methods Please check the methods of analysis you will use to accomplish the objectives.
Park, S., Chung, S., & Lee, S. (2019). The effects of online product reviews on sales performance: Focusing on
number, extremity, and length. Journal of Distribution Science, 17(5), 85-94.
https://doi.org/10.15722/JDS.17.5.201905.85
The impact of online sales on consumers and firms. Evidence from consumer electronics,
PNC:PRE-FO-66 rev.0 03082023 / Page 6 of 4
Apiradee Wongkitrungrueng, Nassim Dehouche & Nuttapol Assarut (2020) Live streaming commerce from the
sellers’ perspective: implications for online relationship marketing, Journal of Marketing Management, 36:5-6,
488-518, DOI: 10.1080/0267257X.2020.1748895
Li, H., Fang, Y., Wang, Y., Lim, K.H. and Liang, L. (2015), “Are all signals equal? Investigating the differential
effects of online signals on the sales performance of e-marketplace sellers”, Information Technology & People,
Vol. 28 No. 3, pp. 699-723. https://doi.org/10.1108/ITP-11-2014-0265
Duch-Brown N. Et al., (2015). The Impact of Online Sales on Consumers and Firms: Evidence from Household
Appliances. Retrieved from https://joint-research-centre.ec.europa.eu/system/files/2015-11/JRC98079.pdf
Pinaroc J. (2022). Live Shopping from Home: How Live Selling Enhances Online Shopping. Retrieved from
https://golocad.com/blog/how-live-selling-enhances-online-shopping/
Tabuena, A. C., Necio, S. M. L., Macaspac, K. K., Bernardo, M. P. E., Domingo, D. I., & De Leon, P. D. M.
(2022). A Literature Review on Digital Marketing Strategies and Its Impact on Online Business Sellers During
the COVID-19 Crisis. Asian Journal of Management, Entrepreneurship and Social Science, 2(01), 141-153.
Romero, Regina Yvette and Somova, Hauvre, Understanding the E-commerce Participation of Filipino Women
Microentrepreneurs (July 14, 2023). AIM RSN PCC POLICY BRIEF 2023-01, Available at SSRN:
https://ssrn.com/abstract=4513518 or http://dx.doi.org/10.2139/ssrn.4513518
Proposed Research No 03
Title Study of Power Interruption: Effectiveness of Using Powerbank WiFi During Online Sessions for the Selected
Students of University of Cabuyao
According to Lin, H. L. (2016) This device can boost the performance of low-access Wi-Fi and
provide data transmission and communication of the routing function on the data network. Layer
between an Internet Service Provider (ISP) and a participant’s. According to Academia.edu, As
our daily use of our phones, tablets, and portable media players exceeds their battery life, power
banks have grown in popularity. Power banks work with almost all USB-charged devices.
Devices like cameras, MP3 players, mobile phones, and tablets. The power bank Wi-Fi can help
us to provide the means of recharging without the need to wait for the electric power supply to
be restored if we experience a brownout at home. The present invention relates to a portable
power bank, more specifically to a multifunctional portable power bank that is usable and allows
include on both data access and access device expansion via local or wireless networks as well
as the supply of electricity charging of other electronic devices.
II. OBJECTIVES:
The purpose of this research study is to know the effectiveness of using Power Bank WiFi for
online class of selected Grade 12 students of University of Cabuyao.
• To determine the different types of Power Bank WiFi that students’ use during online sessions
• To show the number of students who are using power bank wifi for their online class sessions
PNC:PRE-FO-66 rev.0 03082023 / Page 7 of 4
☐ High Governance
☐ Quality Education
Theoretical Drive Please check the research design you will use to accomplish the objectives.
☐ Mix-Methods Research
☐ Convergent Parallel
☐ Explanatory Sequential
☐ Exploratory Sequential
☐ Embedded Design
☐ Transformative Design
☐ Multiphase Design
☐ Others, please specify
_______________________
Methods Please check the methods of analysis you will use to accomplish the objectives.
REFERENCES:
Wong, J. (2013). U.S. Patent No. 8,541,985. Washington, DC: U.S. Patent and Trademark Office.
Al Neyadi, Eiman, et al. “Discovering public Wi-Fi vulnerabilities using raspberry pi and Kali Linux.” 2020 12th
Annual Undergraduate Research Conference on Applied Computing (URC). IEEE, 2020.9.
Wong, J. (2013). U.S. Patent No. 8,547,061. Washington, DC: U.S. Patent and Trademark Office.
Michigan S.U (2013), BOTI is a Johannesburg based.Africa and South Africa: Business Optimazition Traning
Institute (BOTI)Effect of Power Outages on Learning https://www.boti.co.za/virtual-learning-when-the-power-
goes-out/
Edison I. (September 25, 2020) Ways to Connected Online During a Power Outage
https://energized.edison.com/stories/ways-to-stay-connected-online-during-a-power-outage
PNC:PRE-FO-66 rev.0 03082023 / Page 9 of 4
Goh, S. H., Di Gangi, P. M., Rivera, J. C., & Worrell, J. L. (2016). Graduate student perceptions of personal
social media risk: A comparison study. Issues in Information Systems, 17(4), 109-119.
https://files.eric.ed.gov/fulltext/EJ1246231.pdf
Sharma, B. K., Jain, M., & Tiwari, D. (2015). Students perception towards social media with special reference to
management students of Bhopal Madhya Pradesh. International Journal of Engineering and Applied Sciences,
2(1), 30-34. https://files.eric.ed.gov/fulltext/EJ1246231.pdf