Professional Documents
Culture Documents
A Research Proposal to
Rodriguez, Rizal
In Partial Fulfillment
Submitted by:
Macapagal, Zayin
Cañadas, James
Cais, Jasper
Baja, Wenmark
Submitted to:
Instructor
YEAR 2022-2023
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Table of Contents
Approval Sheet…………………………………………………………………………………………………. I
Abstract ………………………………………………………………………………………………….…..…. II
Dedication ……………………………………………………………………………………………………… IV
Chapter 1 …………………………………………………………………………………………….……….. 1 - 8
Introduction ……………………………………………………………………………………………………. 1
Chapter 2 ……………………………………………………………………………………………………... 9 - 14
Chapter 3 ……………………………………………………………………………………………………... 15 - 19
APPROVAL SHEET
This research entitled SECURED DATABASE SYSTEM: A CASE STUDY OF THREATS IN SOCIAL MEDIA
STUDENTS AT ASIAN INSTITUTE OF COMPUTER STUDIES MONTALBAN BRANCH S.Y 2022-2023 was
written and submitted by MACAPAGAL, CAÑADAS, BAJA, AND CAIS. In partial fulfillment of the requirements
for Practical Research 1: Quantitative Research for educational purposes. It is hereby recommended for approval and
Instructor
I
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
ABSTRACT
The purpose of this study is to know what are the threats to the privacy and personal data in social media of students
and its users and how it occurs. This research offers awareness and knowledge about hacking, phishing, and other
types of cyberattacks. A survey-type and one-on-one interview approach to data collection is used by the researchers to
know what is the prior knowledge of the respondents about the threats online and how it happens, and does it affect
society. Given that the scale's validity and reliability of the sources had been examined, it is reliable. The study has
respondents of 50 students in the Information Communication and Technology strand at the Asian Institute of
Computer Studies Montalban branch. The goal of this study is to know what are the types of cyberattacks and how it
occurs.
II
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
ACKNOWLEDGEMENT
The researchers of this study want to extend their gratitude and appreciation to everyone who gives precious
To our instructor Mr. Jerald Y. Alquiza, we the researchers want to express our gratitude for your patience, effort, and
consideration in guiding us through our journey, and for allowing us to understand, learn more, and explore which help
To the respondents who participated in our research, thank you for your willingness to help us by giving us the
To our parents, guardians, and friends we want to thank you for giving us support and motivation that help us to
And especially to our Almighty God, we want to express our gratitude for giving us knowledge, wisdom, and strength
III
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
DEDICATION
This study is dedicated to the students, to give them awareness about how the threats of social media to the privacy
and personal data that was restored in a database online happened, the researchers also dedicated this study especially
to our instructor Mr. Alquiza that guide us to make this research successful and for being always there to help us in
different types of difficulties, and for giving many considerations to us Lastly were very thankful to our Almighty God
IV
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Chapter 1
Introduction
In this chapter of the paper presents the problem and the setting of the study. It includes the background of the study,
statement of the problem, theoretical framework, conceptual framework, the significance of the study, scope and
The ere nowadays the cyber era where everyone depends on social media sites for communication, and storing our
private data online through database systems, has many threats. Threats that might endanger our privacy and dignity
The database is one of the most important things on any social media site it consists of the private information of a
social media user. social media like Facebook became popular nowadays for teenagers to connect and share. but there
is still an issue according to the privacy and security of databases on social media platforms like Facebook. Hacking,
malicious malware, and phishing are still threats on social media accounts. there are cases of Hacking data leakage or
data breaches on Facebook and this happens due to a lack of provide more secure security and a lack of knowledge of
According to Greenwood et al- (2016), "majority...now say they get news via social media and half of the public has
1
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
According to Krasha et al-(2010), “modern data processing system one designed to be general-purpose in that day
they can handle a wide variety of different schemas, data types, and data distributions and aim to provide efficient
access to that data via the use of the optimizers and cost models."
According to (Garneija, 2014), "worried about their security and privacy on Facebook... It was according to the
According to Duffany and Galbah (2018), "many privacy mechanisms of the online community are purposefully
weak to facilitate Joining the community and sharing information... there is also a problem with poor interface design,
permissive default settings, social conformance, and inherent trust in the online community... many cases users are
unwilling or unable to put forth the effort to modify and manage their privacy settings to protect their personal
information."
According to Heiligenstein (2022) “ the most recent Facebook data breach happened in April 2021, where personal
data pertaining to 533 million Facebook users was made public on an online forum."
This study aims to determine what are the possible threats in Social Media Sites, Database Systems, and the lives of
Grade 11 Information and Communication and Technology students at the Asian Institute of Computer Studies. This
1.) Why teenagers are more prone to getting their accounts hacked?
2.) On what basis can you tell that your account on social media got hacked?
2
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
3.) What are the responsibilities of social media users to prevent their accounts from getting hacked?
5.) What are the responsibilities of social media companies to make their database more secure?
Theoretical Framework
Social media is essential to many people, it is a means of communication, enjoyment, and business for everyone.
Social media and its database security system is an essential feature because it contains millions of people's personal
information worldwide.
Social media companies are still improving their security systems and spreading awareness to avoid hacking, data
leakage, and data breaches. But still, a few social media users has lacking knowledge on how to protect their own data.
Due to this reason, hackers use this chance to steal someone's account and personal information. Increasing the cases
of hacking through malicious links, data leakage, phishing, and many more using social media. For this reason, social
media users also have contributed to hacking issues. This theory is also known as Systems Theory. First proposed by
the biologist Ludwig von Bertalanffy (1940’s) and it was known back then as the General Systems Theory (1968), it
was also, furthered by W. Ross Ashby introduced in An Introduction to Cybernetics (1956), introduced also by George
Bateson in Mind and nature; A necessary unity (1979), and was mentioned in the book of “Encyclopedia of Child
Behavior and Development” by Lee A. Wilkinson (2012), said that the Systems theory is a … principle that the
component parts of a system can best be understood in the context of the relationships with each other and with other
systems, rather than in isolation. The Online MSW Program Introduction to System Theory mentioned the System
Theory in their work on “Social Work”. According to Online MSW Program, the key concept of systems theory,
regardless of which discipline it’s being applied to, is that the whole is greater than the sum of its parts. Systems theory
3
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
seeks to explain and develop hypotheses around characteristics that arise within complex systems that seemingly could
not arise in any single system within the whole… that means it has characteristics its properties do not display on their
own (OnlineMSWProgram). This theory states that everyone or every single component has a contribution to its result.
The social media users also have a contribution on why their account got hacked by the hackers, due to still lacking
knowledge on how to secure their account and data and lack of awareness on malicious malware and links that others
However, this theory could not hold all reasons for data leakages and phishing events on someone's social media
accounts. This theory has many loopholes which are nearly impossible to acknowledge, cause it will take a longer
period of time. Hacking and cyber malware had many types that focus to attack databases and user accounts of many
social media platforms. This theory does not cover all types of hacking and cyber malware attacks, like malicious
Conceptual Framework
- Social Media User - Hacker post or send a - Social media user accounts
- Hacker
4
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Figure 1: social media users, hackers, databases, and malicious links were the primary components that do the
work on why hacking happens and other cyber attacks. In the process, the hacker uploads and sends malicious links
with the means of social media sites, and social media users who lack information about malicious links might click
them. It will result in getting social media users to get their accounts hacked, and the hacker might change or steal his
This study will be conducted to determine how hacking happens on social media and its threats to the database
system.
This study's sole aim is to determine the reasons why hacking happened and what are the contributions of social
media users on why they got hacked. The findings of this study may provide deeper insight and new knowledge on
what are the contributions of everyone to hacking, and its bad effect on social media users.
The findings of this study may provide knowledge and new pieces of information on how social media companies
and their users, protect their own accounts and data, and on how they might improve their security system for their
5
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
To Students - the results may serve as a guide and warning on how to protect their social media accounts against
phishing, hacking, data leakage, etc. It will be beneficial for the students to be more careful while using social media to
avoid hacking.
Teachers- the results may serve as information and a warning to be more cautious while using social media. It will be
beneficial for the teachers because it can help them to be aware while using social media to avoid hacking that might
cause misinformation to his/her students and they can warn their students to be cautious about everything in social
media.
School - the results may serve as information that will be a guide to make their social media page more secure. It will
be beneficial for the school because they can avoid hacking that might post wrong information, wrong announcements,
and fake news that might cause confusion to the students and they can send awareness about hacking to their students.
Administration - the results may serve as information and a guide to securing their social media pages. It will be
beneficial to the administration to avoid hacking on their pages that might leak confidential information and spread
fake news, the results can also be a guide to amend new laws or revising a law and enactment to stop hacking.
Community - the result may serve as information, a warning, and a guide to spread awareness about hacking in social
media to the community. It will be beneficial to the community because with this information the community can
avoid the unintentional spread out of malicious links, phishing, and data leakage that may increase hacking cases.
To Future Researchers - The results may serve as a reference and information to provide relevant ideas about
secured database systems, social media, phishing, hacking, reasons for hacking, and the contribution of social media
users on hacking events, in conducting a future study that is coherent with this study itself.
6
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
This study intends to focus on Secured Database Systems, the reason why social media accounts got hacked, the
types of hacking, and the cyber attack method they use. The researchers will conduct an interview with 50 randomly
selected students in Grade 11 Information Communication and Technology Student at the Asian Institute of Computer
Studies Montalban Branch this S.Y. 2022 - 2023. The coverage of this study will focus on Secured Data Base
Systems, the reason why social media accounts got hacked, the types of hacking, and the cyber attack method they use.
Definition of Terms
The following words are defined for a better understanding of this study:
Cyber Attack - An attack, via cyberspace, targeting an enterprise's use of cyberspace for the purpose of disrupting,
Data Breaches - A data breach is a security violation, in which sensitive, protected, or confidential data is copied,
Exploitation - The act of selfishly taking advantage of someone or a group of people in order to profit from them or
7
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Malicious Content - viruses, worms, time bombs, Trojan horses, and other harmful or malicious code, files, scripts,
agents, or programs.
Phishing - A technique for attempting to acquire sensitive data, such as bank account numbers, through fraudulent
solicitation in email or on a website, in which the perpetrator masquerades as a legitimate business or reputable person.
Tech-Savvy - well-informed about or proficient in the use of modern technology, especially computers.
Vulnerability - the quality or state of being exposed to the possibility of being attacked or harmed, either physically
or emotionally.
White Hat Hackers - an ethical security hacker Under the owner's consent, white hat hackers aim to identify any
8
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
CHAPTER 2
Foreign Literature
Pinnock (2022) Social media oversharing can be a danger to people, their children and their companies. Mentioned
that sharing every detail of our lives on social media might be a risk, they conclude in their article that there was a
study in 2021 that personal data was involved in 45% of all data breaches, and in 2020 researchers found a 42 %
increase in identity theft and partly blame on that is due to over-sharing our personal and professional details online.
Because the more we post the more the risk of cybercrime on happening. This is proof that every year cases of
hacking, identity theft, and other cyberattacks are still rising up, against the security system of social media.
Myhre (2023), Privacy on Social Media Guards Against Identity Theft Privacy on Social Media Guards Against
Identity Theft. Mentioned here that social media is all about sharing information, photos, articles, and thoughts. But
sharing identity and private information on social media may not be the best idea. Social media-based identity theft is
on the rise, and what we share and how we handle our social accounts can determine whether or not we become
victims. This shows that things that peoples usually post is also a great threat to their security online.
Struyk (2023), 7 Sneaky Ways Hackers Can Get Your Facebook Password. Mentioned here that even though social
media sites were a great way to communicate and stay in contact with friends and families, they can still make us
vulnerable and expose us to different kinds of cyberattacks that can endanger our accounts and personal information.
9
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
(RS)WEBSOLS (2023) Privacy, Security & Health Risks of Social Media! How to Avoid Them? Stated that social
media was a great way through connecting with others that special to us, but hackers are always lurking in the
background, and due to that everybody needs to be informed and proactive with precautionary measures to protect our
selves online against cyber attacks because no matter how old a person was or what level of education that person
attained everyone is vulnerable to online security threats. That's why no matter who the person is, he/she is always
Suciu (2020) There Isn't Enough Privacy On Social Media And That Is A Real Problem. Mentioned that according
to the report from RiskBasedSecurity.com, more than 250,000 social media users, may also have their identity fully
exposed on a deep web hacking forum. This kind of many social media user identity leakage was a great threat to
everyone’s data.
Turow (2020) The dangers of sharing personal information on social media. Mentioned that sharing photos and
tagging in a post on social media can reflect the context of a person and their relation to others and can denote their
location and information which in turns allow hackers to have greater access on their personal information on their
social media.
Wilcox and Bhattacharya (2020) in their study A Human Dimension of Hacking: Social Engineering through Social
Media. Stated that social engineering at social media channels was one of the most challenging security threats
because it can avoid the security system of a social media site because it was a human error or being naiveté of a
10
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Fernandz (2020) in his study Investigation of social media security: A Critical Review. Mentioned here that even
though the utilization of social media security is widely discussed, people still do not seem to have a concerned about
the security in social media and the risk of it to our personal information.
Abulayhi and Khedii (2022) A Comprehensive Study on Privacy and Security on Social Media. Mentioned their that
People exchange a lot of information across social media, but the user must feel the importance of preserving the
privacy of their data and how valuable the thing that they are posting. Because maintaining privacy and security in
Governor State University (2017) Investigation on Security Issues and Features in Social Media Sites (Face Book,
Twitter, & Google+). Mentioned that these days social media sites were also widely used by hackers and unauthorized
users, overused of social media everywhere lead to increase privacy issue across social media site. To resolve this issue
the administrator of social media have implemented many secured anti-privacy attack techniques but still, they are not
totally successfully providing 100% security to the user privacy over social networking sites, and still prone to
cyberattacks.
Local Literature
Hani (2021) Strengthening Cybersecurity Readiness in the Philippines. Stated there that even though the Philippines
ranks 30th in the world for e-security which is 20% better than the global average we were still extremely vulnerable
to cyber-attacks, and incidents due to the large social media-savvy population and lack of data protection mechanism.
It also mentioned there that the data online become an invaluable resource for hackers to gain something, especially a
financial benefit.
11
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Castañeda (2021) 9 ways to protect your social media account from hackers, scammers. Mentioned that cybercrimes
rose by 400% in 2020 and their top modus is to steal information via social media sites, they commonly target old
women or anyone who uses the internet frequently but is not necessarily tech-savvy, they tend to make the users guard
down when they were in social media to implement their hacking techniques such as links or games that will ask you
Adriano (2023) Ilocos Norte wants anti-cybercrime office after hacking incident. Mentioned that The Sangguniang
Panlalawigan (SP) or provincial board has approved a draft resolution creating the Ilocos Norte Cyber-Response Team
Office to counter internet crimes and pursue cyber criminals at the provincial level. Vice Governor Cecilia
Araneta-Marcos said on Tuesday the Ilocos Norte provincial government was requesting the Philippine National
Police (PNP) central office to establish the anti-cybercrime satellite office at the Camp Valentin S. Juan here. To
Baclig (2022) PH biggest target of phishing in Southeast Asia—cybersecurity report. Stated that From February to
April this year, nearly seven out of 10—or 68.95 percent—phishing attacks recorded in the Philippines targeted
finance-related transactions, according to cybersecurity firm Kaspersky. Data from Kaspersky Security Network
(KSN) showed that cases of finance-related phishing attempts from February to April this year were highest in the
Philippines among Southeast Asian countries. The portion of finance-related phishing attempts during the same period
was 65.90 percent in Indonesia, 55.67 percent in Singapore, 55.63 percent in Thailand, 50.58 percent in Malaysia, and
36.12 in Vietnam. A separate report released by Kaspersky last April showed that the Philippines was the most hit by
Sadongdong (2022) Serious security breach as hacker takes over NDRRMC's Facebook page. Mentioned there that
the official social media account of the government's primary inter-agency council on disaster
12
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
response has been hacked in the middle of the Tropical Depression “Maymay” that was headed towards Luzon and
threatened to pound provinces, and NDRRMC’s posts for warnings and updates on impending calamities. Due to this
reason, there are questions raised as to the capability of the government to deter cyber attacks.
Mallari Jr. (2022) Warning: Some Lucena teachers’ social media account hacked; students targeted. Stated here that
several public school teachers in Lucena got hacked, due to these hacks use the social media accounts of many
teachers to be used for official communication to the students-learners. The hackers sent personal messages via the
social media of the teachers to the students-learners demanding to submit videos with malicious and sensitive content
as a part of school requirements. They also sent awareness to be vigilant in clicking electronic mail and short message
Agcaoili (2022) Phishing, hacking attacks on the rise – AMLC. Mentioned here that the Philippines’ sole financial
intelligence unit and the Anti-Money Laundering Council have noted a steady rise in suspicious transactions that
involved phishing and hacking in the country, with the value involved amounting to P16.4 billion over the past decade.
Also, in 2021, it shows that 64 percent of the total or 13,116 STRs were again reported by electronic money issuers
due to complaints pertaining to account takeover that involved incidents of customers as victims of phishing through
various means, such as calls, SMS, e-mails, phishing links, fake pages, other fake pages on the social media platform,
chat via an e-commerce platform app, stolen phones, and other unknown means initiated by perpetrators, that has been
used by hackers to gain money without being detected or being anonymous to the public and to the government
officials.
Samaniego (2022) Protect your privacy: The dangers of sharing photos on social media. As stated here, the holidays
we celebrate where we mostly share and upload photos on social media were dangerous. An example here is the
Christmas season, which is the season when everyone posts and shares photos online on social media of their reunions
13
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
with their friends and family, but it has a risk and pitfall for the privacy and information of a person and due to that we
have to be aware and mindful about what we are going to post, to ensure our safety.
Corrales (2023) It was a data leak, not a breach or a hack – PNP. The Philippine National Police database has a
serious lapse or data leakage after more than a million identity documents and private records of police personnel and
applicants were exposed online. The PNP made it clear that it's not a breach or hacking, but even though it's a leakage
there's a chance that hackers might copy their exposed confidential information and use it against the country
BusinessWorld (2021) Ethical hackers expected to help address Philippine cybersecurity gap. Mentioned here that
white hat hackers or ethical hackers will help the Philippines to create a country digitally secured, with the help of
their skills they can address the country’s cybersecurity gaps. If we hear the word hacker it commonly gives us
negative connotations, but not all hackers were bad there are white hackers or ethical hackers that want to use their
14
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Chapter 3
This chapter will explain the method adopted to finish this research. This chapter will mention every component
involved in conducting this research from research design, research method, research approach, data collection, sample
Research Design
This research is a qualitative study using the case study approach, it focuses on the reason why and how hacking
Hacking refers to gaining unauthorized access to computer systems, networks, or digital devices to manipulate,
modify or extract information or disrupt their normal functioning. It involves the exploration and exploitation of
vulnerabilities and weaknesses in computer systems or software to bypass security measures and gain control or access
to sensitive data. Hacking often occurs in specific organizational, social, or technological contexts. By using a case
study design, researchers can conduct an in-depth investigation and explore the unique contextual factors that
influence hacking activities, This includes examining the targeted systems, the motivations of the hacker the
vulnerabilities exploited, and the consequences of the hacking incident. “Case studies can explore multiple dimensions
and perspectives of a situation… They can also illustrate how theory and practice interact in specific contexts, and how
different stakeholders experience and respond to the phenomenon. Case studies can generate new and unexpected
15
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Research Method
The researchers gather the data with a combination of a survey questionnaire (open-ended questions) and a
one-on-one interview method in order to know the different opinions of people from grade 11 Information
Communication and Technology students at the Asian Institute of Computer Studies Montalban Branch. The reason
why the researchers chose this type of research method it's because using a survey questionnaire is a much more
effective way to gather the data of 50 respondents, and one-on-one interviews for a more reliable response, and much
more organized on having the same question for every respondent without additional questions that might result in
confusion and uncertainty with the gathered data. Using survey questions also has disadvantages “Respondents may
not feel encouraged to provide accurate, honest answers. Respondents may not feel comfortable providing answers that
present themselves in an unfavorable manner. Respondents may not be fully aware of their reasons for any given
answer because of a lack of memory on the subject, or even boredom.” (Defranzo, Snap Surveys). According to Bell
(n.d.), “The best part of one-on-one interviewing is how we get to know people in the context of their own lives. We
Survey Questions:
1. Did you experience your social media account getting hacked? When and how
2. What kind of hacking did you experience? How can you say so?
3. What are the reasons that a person got hacked? Does the social media user also have a
4. What social media site has experienced the most hacking issue? What do you think is
the reason that this social media site got the most hacking experience?
16
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
5. In what way do social media sites experience data breaches on their own?
7. How does this kind of hacking event affect you as a social media user?
10. How do you think social media companies can improve their security system for the
Research Approach
The research approach that was used and followed for the purpose of this research was the deductive one. The
researchers based first on the existing theory and gathered other sources and literature. According to Streefkerk (2019),
Deductive reasoning aims at testing an existing theory… When conducting deductive research, you always start with a
theory... Reasoning deductively means testing these theories. Bachelor Print (2021) This approach is used when there
is an existing theory that you or another person has developed. You try to deduct “facts” that can explain the causal
relationship between certain variables; therefore, you prove or disprove that theory. Deductive reasoning is used when
resources are abundant, a short timeframe to finish the research, and to keep risk to the minimum.
Data Collection
For the purposes of this research, survey questionnaires and one-on-one interviews were used in order to gather the
data needed with open-ended questions. It stated that this type of research allows for a variety of methods to recruit
participants, collect data, and utilize various methods of instrumentation. “Survey research can use quantitative
17
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
research strategies (e.g., using questionnaires with numerically rated items), qualitative research strategies (e.g., using
open-ended questions), or both strategies (i.e., mixed methods). As it is often used to describe and explore human
behavior, surveys are therefore frequently used in social and psychological research” (Singleton & Straits, 2009).
According to Cullen (2023), Open-ended questions start with “Why?” “How?” and “What?” They encourage a full
answer, rather than the simple “yes” or “no” response that is usually given to a closed-ended question. Not only are
these questions designed to elicit a longer and more detailed response, but they, likewise, ask the respondent to take
extra time to consider what is being asked of them and what they should say… open-ended questions are for gathering
Sample Selection
The researchers gather the respondents using a combination of volunteer sampling and purposive sampling methods.
By drawing, the researchers draw the names of 50 grade 11 Information Communication and Technology students, but
due to some problem occur the researchers kindly ask other grade 11 Information Communication and Technology
students to be the respondents and answer the survey questionnaire or have a one-on-one interview. According to
Arikunto (2010), purposive sampling is the process of selecting a sample by taking a subject that is not based on the
level of the area but is taken based on the specific purpose. (Hassan, 2022) “Volunteer sampling is commonly used in
studies that involve recruiting participants… It is often used when it is difficult to access the population of interest, or
when researchers have limited resources to recruit participants…Volunteer sampling can be useful in certain research
scenarios, particularly when the research question involves studying a specific group or population that is difficult to
access or identify using other sampling methods”. The sample participants in the current study were chosen because
they had a specific connection to the research issue. Which are the threats in social media and in the database system.
18
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Research Process
Meetings while doing the research were held during the months of May and June of 2023 at the Asian Institute of
Computer Studies to finish this research. The meetings held to gain acceptance of the participation of the respondents
were held approximately 20 to 30 minutes while gathering data through a survey questionnaire and one-on-one
interviews in the last 2 weeks of May more specifically, the researcher comes in touch with them and asked them to
participate in the research after explaining some of the questions in the survey questionnaire and by telling them the
title of our research. In general terms, the respondents were willing to participate in the research by answering the
survey questionnaire, or through one-on-one interviews. The discussion took place at the Asian Institute of Computer
Studies.
Ethical Considerations
The current study was Subject to certain ethical issues. The researchers ask permission from all participants
regarding their willingness to participate in the research. At the same time, they agree to answer the survey
questionnaire some were written and others via audio recording. The survey was to reassure participants that their
participation in the research is with their consent and that they were free to share their experience from it at any point
and for any reason. Next to this, participants were fully informed regarding the objectives of the study, while they were
reassured that their answers were treated as confidential and used only for academic purposes and only for the process
of the research. Except for the above, participants were not harmed or abused, both physically and psychologically
during the conduction of the research. In contrast, the researcher attempts to create and maintain awareness and
comfort.
19
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway
Research Limitations
• In research of RRL
The local related literatures are hard to find because most in the Philippines related literature about social media and
hacking are online news article, and there only a few literatures that are connected in the database system. Some local
studies and research were hard to find that connects to this research topic.
A few respondents that were obtained by drawing declined to participate in our research by answering the survey
Some respondents were given survey questionnaires but for some reason they did not return it on the time that we
agreed on, and there were no valid reasons why they lost the survey questionnaire.
Some respondents that have been given the survey questionnaire were not complete and there were deficiencies in
their answers and there were other answers that were no longer appropriate nor connected to the topic.
20