You are on page 1of 26

ASIAN INSTITUTE OF COMPUTER STUDIES

Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Secured Database System: A Case Study of Threats in Social Media Sites

Among Grade 11 Information Communication and Technology Students at

Asian Institute of Computer Studies Montalban Branch S.Y. 2022-2023

A Research Proposal to

Asian Institute of Computer Studies

Rodriguez, Rizal

In Partial Fulfillment

of the Requirements for

Practical Research 1: Qualitative Research

Submitted by:

Macapagal, Zayin

Cañadas, James

Cais, Jasper

Baja, Wenmark

Submitted to:

Mr. Jerald Y. Alquiza

Instructor

YEAR 2022-2023
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Table of Contents

Approval Sheet…………………………………………………………………………………………………. I

Abstract ………………………………………………………………………………………………….…..…. II

Acknowledgment ………………………………………………………………………………………………. III

Dedication ……………………………………………………………………………………………………… IV

Chapter 1 …………………………………………………………………………………………….……….. 1 - 8

Introduction ……………………………………………………………………………………………………. 1

Background of the Study ……………………………………………………………….……………………… 1 - 2

Statement of the Problem ………………………………………………………………………………….…... 2 - 3

Theoretical Framework …………………………………………………………………………………….….. 3 - 4

Conceptual Framework ………………………………………………………………………………………... 4 - 5

Significance of the Study ……………………………………………………………………………………… 5 - 6

Scope and Limitation ………………………………………………………………………………………….. 7

Definition of terms …………………………………………………………………………………………….. 7 - 8

Chapter 2 ……………………………………………………………………………………………………... 9 - 14

Review Related Literatures ……………………………………………………………………………………. 9 - 14

Chapter 3 ……………………………………………………………………………………………………... 15 - 19

Research Design ……………………………………………………………………………………………….. 15

Research Method ………………………………………………………………………………………………. 16

Research Approach ……………………………………………………………………………………………. 17

Data Collection ………………………………………………………………………………………………... 17 - 18

Sample Selection ………………………………………………………………………………………………. 18

Research Process ……………………………………………………………………………………………… 19

Ethical Considerations ………………………………………………………………………………………... 19

Research Limitation ………………………………………………………………………………………….. 20


ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

APPROVAL SHEET

This research entitled SECURED DATABASE SYSTEM: A CASE STUDY OF THREATS IN SOCIAL MEDIA

SITES AMONG GRADE 11 STUDENTS IN INFORMATION COMMUNICATION AND TECHNOLOGY

STUDENTS AT ASIAN INSTITUTE OF COMPUTER STUDIES MONTALBAN BRANCH S.Y 2022-2023 was

written and submitted by MACAPAGAL, CAÑADAS, BAJA, AND CAIS. In partial fulfillment of the requirements

for Practical Research 1: Quantitative Research for educational purposes. It is hereby recommended for approval and

acceptance and has been examined.

Date: MR. JERALD Y. ALQUIZA

Instructor

I
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

ABSTRACT

The purpose of this study is to know what are the threats to the privacy and personal data in social media of students

and its users and how it occurs. This research offers awareness and knowledge about hacking, phishing, and other

types of cyberattacks. A survey-type and one-on-one interview approach to data collection is used by the researchers to

know what is the prior knowledge of the respondents about the threats online and how it happens, and does it affect

society. Given that the scale's validity and reliability of the sources had been examined, it is reliable. The study has

respondents of 50 students in the Information Communication and Technology strand at the Asian Institute of

Computer Studies Montalban branch. The goal of this study is to know what are the types of cyberattacks and how it

occurs.

II
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

ACKNOWLEDGEMENT

The researchers of this study want to extend their gratitude and appreciation to everyone who gives precious

contributions, time, and effort towards completing this research.

To our instructor Mr. Jerald Y. Alquiza, we the researchers want to express our gratitude for your patience, effort, and

consideration in guiding us through our journey, and for allowing us to understand, learn more, and explore which help

us to accomplish this research.

To the respondents who participated in our research, thank you for your willingness to help us by giving us the

opportunity on going this far by finishing this research.

To our parents, guardians, and friends we want to thank you for giving us support and motivation that help us to

accomplish this research.

And especially to our Almighty God, we want to express our gratitude for giving us knowledge, wisdom, and strength

and for guiding us through our journey

To God be the Glory!

III
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

DEDICATION

This study is dedicated to the students, to give them awareness about how the threats of social media to the privacy

and personal data that was restored in a database online happened, the researchers also dedicated this study especially

to our instructor Mr. Alquiza that guide us to make this research successful and for being always there to help us in

different types of difficulties, and for giving many considerations to us Lastly were very thankful to our Almighty God

that give us strength and knowledge to accomplish this study.

IV
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Chapter 1

Introduction

In this chapter of the paper presents the problem and the setting of the study. It includes the background of the study,

statement of the problem, theoretical framework, conceptual framework, the significance of the study, scope and

limitation, and definition of terms.

The ere nowadays the cyber era where everyone depends on social media sites for communication, and storing our

private data online through database systems, has many threats. Threats that might endanger our privacy and dignity

online that has a great impact on our personal life.

Background of the Study

The database is one of the most important things on any social media site it consists of the private information of a

social media user. social media like Facebook became popular nowadays for teenagers to connect and share. but there

is still an issue according to the privacy and security of databases on social media platforms like Facebook. Hacking,

malicious malware, and phishing are still threats on social media accounts. there are cases of Hacking data leakage or

data breaches on Facebook and this happens due to a lack of provide more secure security and a lack of knowledge of

users on how to protect their own accounts.

According to Greenwood et al- (2016), "majority...now say they get news via social media and half of the public has

turned to these sites to learn about the 2016 presidential election."

1
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

According to Krasha et al-(2010), “modern data processing system one designed to be general-purpose in that day

they can handle a wide variety of different schemas, data types, and data distributions and aim to provide efficient

access to that data via the use of the optimizers and cost models."

According to (Garneija, 2014), "worried about their security and privacy on Facebook... It was according to the

research of the University of Vienna, Stefan Stieger, Ph.D. in psychology."

According to Duffany and Galbah (2018), "many privacy mechanisms of the online community are purposefully

weak to facilitate Joining the community and sharing information... there is also a problem with poor interface design,

permissive default settings, social conformance, and inherent trust in the online community... many cases users are

unwilling or unable to put forth the effort to modify and manage their privacy settings to protect their personal

information."

According to Heiligenstein (2022) “ the most recent Facebook data breach happened in April 2021, where personal

data pertaining to 533 million Facebook users was made public on an online forum."

Statement of the Problem

This study aims to determine what are the possible threats in Social Media Sites, Database Systems, and the lives of

Grade 11 Information and Communication and Technology students at the Asian Institute of Computer Studies. This

study seeks answers to the following research questions in particular:

1.) Why teenagers are more prone to getting their accounts hacked?

2.) On what basis can you tell that your account on social media got hacked?

2
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

3.) What are the responsibilities of social media users to prevent their accounts from getting hacked?

4.) What are the capabilities of a secured database against Hacking?

5.) What are the responsibilities of social media companies to make their database more secure?

Theoretical Framework

Social media is essential to many people, it is a means of communication, enjoyment, and business for everyone.

Social media and its database security system is an essential feature because it contains millions of people's personal

information worldwide.

Social media companies are still improving their security systems and spreading awareness to avoid hacking, data

leakage, and data breaches. But still, a few social media users has lacking knowledge on how to protect their own data.

Due to this reason, hackers use this chance to steal someone's account and personal information. Increasing the cases

of hacking through malicious links, data leakage, phishing, and many more using social media. For this reason, social

media users also have contributed to hacking issues. This theory is also known as Systems Theory. First proposed by

the biologist Ludwig von Bertalanffy (1940’s) and it was known back then as the General Systems Theory (1968), it

was also, furthered by W. Ross Ashby introduced in An Introduction to Cybernetics (1956), introduced also by George

Bateson in Mind and nature; A necessary unity (1979), and was mentioned in the book of “Encyclopedia of Child

Behavior and Development” by Lee A. Wilkinson (2012), said that the Systems theory is a … principle that the

component parts of a system can best be understood in the context of the relationships with each other and with other

systems, rather than in isolation. The Online MSW Program Introduction to System Theory mentioned the System

Theory in their work on “Social Work”. According to Online MSW Program, the key concept of systems theory,

regardless of which discipline it’s being applied to, is that the whole is greater than the sum of its parts. Systems theory
3
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

seeks to explain and develop hypotheses around characteristics that arise within complex systems that seemingly could

not arise in any single system within the whole… that means it has characteristics its properties do not display on their

own (OnlineMSWProgram). This theory states that everyone or every single component has a contribution to its result.

The social media users also have a contribution on why their account got hacked by the hackers, due to still lacking

knowledge on how to secure their account and data and lack of awareness on malicious malware and links that others

might click that will result in getting their account hacked.

However, this theory could not hold all reasons for data leakages and phishing events on someone's social media

accounts. This theory has many loopholes which are nearly impossible to acknowledge, cause it will take a longer

period of time. Hacking and cyber malware had many types that focus to attack databases and user accounts of many

social media platforms. This theory does not cover all types of hacking and cyber malware attacks, like malicious

insiders, white hat hackers, red hat hackers, etc.

Conceptual Framework

INPUT PROCESS OUTPUT

- Social Media User - Hacker post or send a - Social media user accounts

malicious link or malware. will be hacked.

- Hacker

- Social media users click the - Hackers change some of

- Malicious links or other link. your data like passwords on

cyber attacks the database of social media

- Social media database sites.

4
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Figure 1. Conceptual Framework

Figure 1: social media users, hackers, databases, and malicious links were the primary components that do the

work on why hacking happens and other cyber attacks. In the process, the hacker uploads and sends malicious links

with the means of social media sites, and social media users who lack information about malicious links might click

them. It will result in getting social media users to get their accounts hacked, and the hacker might change or steal his

personal information by getting in, in the database of social media sites.

Significance of the Study

This study will be conducted to determine how hacking happens on social media and its threats to the database

system.

This study's sole aim is to determine the reasons why hacking happened and what are the contributions of social

media users on why they got hacked. The findings of this study may provide deeper insight and new knowledge on

what are the contributions of everyone to hacking, and its bad effect on social media users.

The findings of this study may provide knowledge and new pieces of information on how social media companies

and their users, protect their own accounts and data, and on how they might improve their security system for their

users and their database system.

5
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

To Students - the results may serve as a guide and warning on how to protect their social media accounts against

phishing, hacking, data leakage, etc. It will be beneficial for the students to be more careful while using social media to

avoid hacking.

Teachers- the results may serve as information and a warning to be more cautious while using social media. It will be

beneficial for the teachers because it can help them to be aware while using social media to avoid hacking that might

cause misinformation to his/her students and they can warn their students to be cautious about everything in social

media.

School - the results may serve as information that will be a guide to make their social media page more secure. It will

be beneficial for the school because they can avoid hacking that might post wrong information, wrong announcements,

and fake news that might cause confusion to the students and they can send awareness about hacking to their students.

Administration - the results may serve as information and a guide to securing their social media pages. It will be

beneficial to the administration to avoid hacking on their pages that might leak confidential information and spread

fake news, the results can also be a guide to amend new laws or revising a law and enactment to stop hacking.

Community - the result may serve as information, a warning, and a guide to spread awareness about hacking in social

media to the community. It will be beneficial to the community because with this information the community can

avoid the unintentional spread out of malicious links, phishing, and data leakage that may increase hacking cases.

To Future Researchers - The results may serve as a reference and information to provide relevant ideas about

secured database systems, social media, phishing, hacking, reasons for hacking, and the contribution of social media

users on hacking events, in conducting a future study that is coherent with this study itself.

6
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Scope and Limitation

This study intends to focus on Secured Database Systems, the reason why social media accounts got hacked, the

types of hacking, and the cyber attack method they use. The researchers will conduct an interview with 50 randomly

selected students in Grade 11 Information Communication and Technology Student at the Asian Institute of Computer

Studies Montalban Branch this S.Y. 2022 - 2023. The coverage of this study will focus on Secured Data Base

Systems, the reason why social media accounts got hacked, the types of hacking, and the cyber attack method they use.

Definition of Terms

The following words are defined for a better understanding of this study:

Cyber Attack - An attack, via cyberspace, targeting an enterprise's use of cyberspace for the purpose of disrupting,

disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of

the data or stealing controlled information.

Data Breaches - A data breach is a security violation, in which sensitive, protected, or confidential data is copied,

transmitted, viewed, stolen, altered, or used by an individual unauthorized to do so.

Exploitation - The act of selfishly taking advantage of someone or a group of people in order to profit from them or

otherwise benefit oneself.

7
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Malicious Content - viruses, worms, time bombs, Trojan horses, and other harmful or malicious code, files, scripts,

agents, or programs.

Phishing - A technique for attempting to acquire sensitive data, such as bank account numbers, through fraudulent

solicitation in email or on a website, in which the perpetrator masquerades as a legitimate business or reputable person.

Reassure - say or do something to remove the doubts or fears of someone.

Tech-Savvy - well-informed about or proficient in the use of modern technology, especially computers.

Vigilant - keeping careful watch for possible danger or difficulties.

Vulnerability - the quality or state of being exposed to the possibility of being attacked or harmed, either physically

or emotionally.

White Hat Hackers - an ethical security hacker Under the owner's consent, white hat hackers aim to identify any

vulnerabilities or security issues the current system has.

8
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

CHAPTER 2

Review of Related Literature

Foreign Literature

Pinnock (2022) Social media oversharing can be a danger to people, their children and their companies. Mentioned

that sharing every detail of our lives on social media might be a risk, they conclude in their article that there was a

study in 2021 that personal data was involved in 45% of all data breaches, and in 2020 researchers found a 42 %

increase in identity theft and partly blame on that is due to over-sharing our personal and professional details online.

Because the more we post the more the risk of cybercrime on happening. This is proof that every year cases of

hacking, identity theft, and other cyberattacks are still rising up, against the security system of social media.

Myhre (2023), Privacy on Social Media Guards Against Identity Theft Privacy on Social Media Guards Against

Identity Theft. Mentioned here that social media is all about sharing information, photos, articles, and thoughts. But

sharing identity and private information on social media may not be the best idea. Social media-based identity theft is

on the rise, and what we share and how we handle our social accounts can determine whether or not we become

victims. This shows that things that peoples usually post is also a great threat to their security online.

Struyk (2023), 7 Sneaky Ways Hackers Can Get Your Facebook Password. Mentioned here that even though social

media sites were a great way to communicate and stay in contact with friends and families, they can still make us

vulnerable and expose us to different kinds of cyberattacks that can endanger our accounts and personal information.

9
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

(RS)WEBSOLS (2023) Privacy, Security & Health Risks of Social Media! How to Avoid Them? Stated that social

media was a great way through connecting with others that special to us, but hackers are always lurking in the

background, and due to that everybody needs to be informed and proactive with precautionary measures to protect our

selves online against cyber attacks because no matter how old a person was or what level of education that person

attained everyone is vulnerable to online security threats. That's why no matter who the person is, he/she is always

vulnerable to any kind of cyberattacks if they were not aware.

Suciu (2020) There Isn't Enough Privacy On Social Media And That Is A Real Problem. Mentioned that according

to the report from RiskBasedSecurity.com, more than 250,000 social media users, may also have their identity fully

exposed on a deep web hacking forum. This kind of many social media user identity leakage was a great threat to

everyone’s data.

Turow (2020) The dangers of sharing personal information on social media. Mentioned that sharing photos and

tagging in a post on social media can reflect the context of a person and their relation to others and can denote their

location and information which in turns allow hackers to have greater access on their personal information on their

social media.

Wilcox and Bhattacharya (2020) in their study A Human Dimension of Hacking: Social Engineering through Social

Media. Stated that social engineering at social media channels was one of the most challenging security threats

because it can avoid the security system of a social media site because it was a human error or being naiveté of a

person or an infiltration into companies network.

10
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Fernandz (2020) in his study Investigation of social media security: A Critical Review. Mentioned here that even

though the utilization of social media security is widely discussed, people still do not seem to have a concerned about

the security in social media and the risk of it to our personal information.

Abulayhi and Khedii (2022) A Comprehensive Study on Privacy and Security on Social Media. Mentioned their that

People exchange a lot of information across social media, but the user must feel the importance of preserving the

privacy of their data and how valuable the thing that they are posting. Because maintaining privacy and security in

social media is still a main challenge, especially against hacking events.

Governor State University (2017) Investigation on Security Issues and Features in Social Media Sites (Face Book,

Twitter, & Google+). Mentioned that these days social media sites were also widely used by hackers and unauthorized

users, overused of social media everywhere lead to increase privacy issue across social media site. To resolve this issue

the administrator of social media have implemented many secured anti-privacy attack techniques but still, they are not

totally successfully providing 100% security to the user privacy over social networking sites, and still prone to

cyberattacks.

Local Literature

Hani (2021) Strengthening Cybersecurity Readiness in the Philippines. Stated there that even though the Philippines

ranks 30th in the world for e-security which is 20% better than the global average we were still extremely vulnerable

to cyber-attacks, and incidents due to the large social media-savvy population and lack of data protection mechanism.

It also mentioned there that the data online become an invaluable resource for hackers to gain something, especially a

financial benefit.
11
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Castañeda (2021) 9 ways to protect your social media account from hackers, scammers. Mentioned that cybercrimes

rose by 400% in 2020 and their top modus is to steal information via social media sites, they commonly target old

women or anyone who uses the internet frequently but is not necessarily tech-savvy, they tend to make the users guard

down when they were in social media to implement their hacking techniques such as links or games that will ask you

to log-in and take your password.

Adriano (2023) Ilocos Norte wants anti-cybercrime office after hacking incident. Mentioned that The Sangguniang

Panlalawigan (SP) or provincial board has approved a draft resolution creating the Ilocos Norte Cyber-Response Team

Office to counter internet crimes and pursue cyber criminals at the provincial level. Vice Governor Cecilia

Araneta-Marcos said on Tuesday the Ilocos Norte provincial government was requesting the Philippine National

Police (PNP) central office to establish the anti-cybercrime satellite office at the Camp Valentin S. Juan here. To

prevent this incident again.

Baclig (2022) PH biggest target of phishing in Southeast Asia—cybersecurity report. Stated that From February to

April this year, nearly seven out of 10—or 68.95 percent—phishing attacks recorded in the Philippines targeted

finance-related transactions, according to cybersecurity firm Kaspersky. Data from Kaspersky Security Network

(KSN) showed that cases of finance-related phishing attempts from February to April this year were highest in the

Philippines among Southeast Asian countries. The portion of finance-related phishing attempts during the same period

was 65.90 percent in Indonesia, 55.67 percent in Singapore, 55.63 percent in Thailand, 50.58 percent in Malaysia, and

36.12 in Vietnam. A separate report released by Kaspersky last April showed that the Philippines was the most hit by

phishing attacks last year in the region.

Sadongdong (2022) Serious security breach as hacker takes over NDRRMC's Facebook page. Mentioned there that

the official social media account of the government's primary inter-agency council on disaster

12
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

response has been hacked in the middle of the Tropical Depression “Maymay” that was headed towards Luzon and

threatened to pound provinces, and NDRRMC’s posts for warnings and updates on impending calamities. Due to this

reason, there are questions raised as to the capability of the government to deter cyber attacks.

Mallari Jr. (2022) Warning: Some Lucena teachers’ social media account hacked; students targeted. Stated here that

several public school teachers in Lucena got hacked, due to these hacks use the social media accounts of many

teachers to be used for official communication to the students-learners. The hackers sent personal messages via the

social media of the teachers to the students-learners demanding to submit videos with malicious and sensitive content

as a part of school requirements. They also sent awareness to be vigilant in clicking electronic mail and short message

services that might compromise their personal information.

Agcaoili (2022) Phishing, hacking attacks on the rise – AMLC. Mentioned here that the Philippines’ sole financial

intelligence unit and the Anti-Money Laundering Council have noted a steady rise in suspicious transactions that

involved phishing and hacking in the country, with the value involved amounting to P16.4 billion over the past decade.

Also, in 2021, it shows that 64 percent of the total or 13,116 STRs were again reported by electronic money issuers

due to complaints pertaining to account takeover that involved incidents of customers as victims of phishing through

various means, such as calls, SMS, e-mails, phishing links, fake pages, other fake pages on the social media platform,

chat via an e-commerce platform app, stolen phones, and other unknown means initiated by perpetrators, that has been

used by hackers to gain money without being detected or being anonymous to the public and to the government

officials.

Samaniego (2022) Protect your privacy: The dangers of sharing photos on social media. As stated here, the holidays

we celebrate where we mostly share and upload photos on social media were dangerous. An example here is the

Christmas season, which is the season when everyone posts and shares photos online on social media of their reunions
13
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

with their friends and family, but it has a risk and pitfall for the privacy and information of a person and due to that we

have to be aware and mindful about what we are going to post, to ensure our safety.

Corrales (2023) It was a data leak, not a breach or a hack – PNP. The Philippine National Police database has a

serious lapse or data leakage after more than a million identity documents and private records of police personnel and

applicants were exposed online. The PNP made it clear that it's not a breach or hacking, but even though it's a leakage

there's a chance that hackers might copy their exposed confidential information and use it against the country

BusinessWorld (2021) Ethical hackers expected to help address Philippine cybersecurity gap. Mentioned here that

white hat hackers or ethical hackers will help the Philippines to create a country digitally secured, with the help of

their skills they can address the country’s cybersecurity gaps. If we hear the word hacker it commonly gives us

negative connotations, but not all hackers were bad there are white hackers or ethical hackers that want to use their

hacking skills to make cyberspace safe and secure.

14
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Chapter 3

Research Design and Methodology

This chapter will explain the method adopted to finish this research. This chapter will mention every component

involved in conducting this research from research design, research method, research approach, data collection, sample

selection, research process, ethical consideration, and research limitation.

Research Design

This research is a qualitative study using the case study approach, it focuses on the reason why and how hacking

events occur and what are the types of hacking.

Hacking refers to gaining unauthorized access to computer systems, networks, or digital devices to manipulate,

modify or extract information or disrupt their normal functioning. It involves the exploration and exploitation of

vulnerabilities and weaknesses in computer systems or software to bypass security measures and gain control or access

to sensitive data. Hacking often occurs in specific organizational, social, or technological contexts. By using a case

study design, researchers can conduct an in-depth investigation and explore the unique contextual factors that

influence hacking activities, This includes examining the targeted systems, the motivations of the hacker the

vulnerabilities exploited, and the consequences of the hacking incident. “Case studies can explore multiple dimensions

and perspectives of a situation… They can also illustrate how theory and practice interact in specific contexts, and how

different stakeholders experience and respond to the phenomenon. Case studies can generate new and unexpected

findings, as well as test and refine existing theories” (LinkedIn, 2023).

15
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Research Method

The researchers gather the data with a combination of a survey questionnaire (open-ended questions) and a

one-on-one interview method in order to know the different opinions of people from grade 11 Information

Communication and Technology students at the Asian Institute of Computer Studies Montalban Branch. The reason

why the researchers chose this type of research method it's because using a survey questionnaire is a much more

effective way to gather the data of 50 respondents, and one-on-one interviews for a more reliable response, and much

more organized on having the same question for every respondent without additional questions that might result in

confusion and uncertainty with the gathered data. Using survey questions also has disadvantages “Respondents may

not feel encouraged to provide accurate, honest answers. Respondents may not feel comfortable providing answers that

present themselves in an unfavorable manner. Respondents may not be fully aware of their reasons for any given

answer because of a lack of memory on the subject, or even boredom.” (Defranzo, Snap Surveys). According to Bell

(n.d.), “The best part of one-on-one interviewing is how we get to know people in the context of their own lives. We

achieve much deeper insights this way.”

Survey Questions:

1. Did you experience your social media account getting hacked? When and how

did you react to it?

2. What kind of hacking did you experience? How can you say so?

3. What are the reasons that a person got hacked? Does the social media user also have a

part in why they got hacked? Why?

4. What social media site has experienced the most hacking issue? What do you think is

the reason that this social media site got the most hacking experience?

16
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

5. In what way do social media sites experience data breaches on their own?

6. Why do hackers mainly target social media to be hacked?

7. How does this kind of hacking event affect you as a social media user?

8. How do data breaches and hacking effects social media companies?

9. .What is the importance of a secured database on social media?

10. How do you think social media companies can improve their security system for the

database to make it more secure?

Research Approach

The research approach that was used and followed for the purpose of this research was the deductive one. The

researchers based first on the existing theory and gathered other sources and literature. According to Streefkerk (2019),

Deductive reasoning aims at testing an existing theory… When conducting deductive research, you always start with a

theory... Reasoning deductively means testing these theories. Bachelor Print (2021) This approach is used when there

is an existing theory that you or another person has developed. You try to deduct “facts” that can explain the causal

relationship between certain variables; therefore, you prove or disprove that theory. Deductive reasoning is used when

resources are abundant, a short timeframe to finish the research, and to keep risk to the minimum.

Data Collection

For the purposes of this research, survey questionnaires and one-on-one interviews were used in order to gather the

data needed with open-ended questions. It stated that this type of research allows for a variety of methods to recruit

participants, collect data, and utilize various methods of instrumentation. “Survey research can use quantitative

17
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

research strategies (e.g., using questionnaires with numerically rated items), qualitative research strategies (e.g., using

open-ended questions), or both strategies (i.e., mixed methods). As it is often used to describe and explore human

behavior, surveys are therefore frequently used in social and psychological research” (Singleton & Straits, 2009).

According to Cullen (2023), Open-ended questions start with “Why?” “How?” and “What?” They encourage a full

answer, rather than the simple “yes” or “no” response that is usually given to a closed-ended question. Not only are

these questions designed to elicit a longer and more detailed response, but they, likewise, ask the respondent to take

extra time to consider what is being asked of them and what they should say… open-ended questions are for gathering

insights rather than just answers.

Sample Selection

The researchers gather the respondents using a combination of volunteer sampling and purposive sampling methods.

By drawing, the researchers draw the names of 50 grade 11 Information Communication and Technology students, but

due to some problem occur the researchers kindly ask other grade 11 Information Communication and Technology

students to be the respondents and answer the survey questionnaire or have a one-on-one interview. According to

Arikunto (2010), purposive sampling is the process of selecting a sample by taking a subject that is not based on the

level of the area but is taken based on the specific purpose. (Hassan, 2022) “Volunteer sampling is commonly used in

studies that involve recruiting participants… It is often used when it is difficult to access the population of interest, or

when researchers have limited resources to recruit participants…Volunteer sampling can be useful in certain research

scenarios, particularly when the research question involves studying a specific group or population that is difficult to

access or identify using other sampling methods”. The sample participants in the current study were chosen because

they had a specific connection to the research issue. Which are the threats in social media and in the database system.

18
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Research Process

Meetings while doing the research were held during the months of May and June of 2023 at the Asian Institute of

Computer Studies to finish this research. The meetings held to gain acceptance of the participation of the respondents

were held approximately 20 to 30 minutes while gathering data through a survey questionnaire and one-on-one

interviews in the last 2 weeks of May more specifically, the researcher comes in touch with them and asked them to

participate in the research after explaining some of the questions in the survey questionnaire and by telling them the

title of our research. In general terms, the respondents were willing to participate in the research by answering the

survey questionnaire, or through one-on-one interviews. The discussion took place at the Asian Institute of Computer

Studies.

Ethical Considerations

The current study was Subject to certain ethical issues. The researchers ask permission from all participants

regarding their willingness to participate in the research. At the same time, they agree to answer the survey

questionnaire some were written and others via audio recording. The survey was to reassure participants that their

participation in the research is with their consent and that they were free to share their experience from it at any point

and for any reason. Next to this, participants were fully informed regarding the objectives of the study, while they were

reassured that their answers were treated as confidential and used only for academic purposes and only for the process

of the research. Except for the above, participants were not harmed or abused, both physically and psychologically

during the conduction of the research. In contrast, the researcher attempts to create and maintain awareness and

comfort.

19
ASIAN INSTITUTE OF COMPUTER STUDIES
Montalban Town Center, E. Rodriguez Highway

Barangay San Jose Rodriguez, Rizal

Research Limitations

As it is for every study, this desertion had the following limitations:

• In research of RRL

The local related literatures are hard to find because most in the Philippines related literature about social media and

hacking are online news article, and there only a few literatures that are connected in the database system. Some local

studies and research were hard to find that connects to this research topic.

• Draws on the obtained respondents declined

A few respondents that were obtained by drawing declined to participate in our research by answering the survey

questionnaire or participating in one-on-one interviews, and some were absent.

• Other respondents lost the survey questionnaire

Some respondents were given survey questionnaires but for some reason they did not return it on the time that we

agreed on, and there were no valid reasons why they lost the survey questionnaire.

• Inadequate in answering the survey questions

Some respondents that have been given the survey questionnaire were not complete and there were deficiencies in

their answers and there were other answers that were no longer appropriate nor connected to the topic.

20

You might also like