You are on page 1of 20

HACK YARN?

: GRADE 12 HUMSS STUDENTS OF MONCADA NATIONAL HIGH


SCHOOL PROTECTING THEIR SOCIAL MEDIA IDENTITY.

A Thesis Presented
to the faculty of the
CIT Colleges of Paniqui Foundation, Inc.
Paniqui, Tarlac

In Partial Fulfillment
of the Requirements for the subject
Major 20: Research in Social Studies

MAICAH R. SACALAMITAO
ANGELA CARMONA
VINCE IVAN DEL ROSARIO
JOHN RAYMOND GABAYAN
RENANTE AGUSTIN
ERICK RESPECIO
ALEXANDER DELOS SANTOS

2023
Chapter 1

THE PROBLEM AND ITS BACKGROUND

Background of the Study

Keeping people safe in social media is a huge task for authorities, no entity or

government has the perfect solution to completely eliminate these crimes, but they can

build capacities and enforce law to cover possible legal gaps, and strengthen international

cooperation and dialogue between governments and the united nation (Fedotov 2023).

One of the most inevitable terms that defines the youths of many countries right

now is “Cyber”. This term dominates people from their day-to-day basis. And even though

we, humans still have remaining questions about the future of cybersecurity, we still and

continue to risk our privacy by being connected in cyberworld. Spread of Malwares,

ransomware, hacking and other misuse of social media are just some of the crimes related

to cybercrime. Authorities needs to understand how these crimes must have the

appropriate tools for them to be able to protect everyone in cyberworld.

The era of fruitfully mysterious for the rest of us but at the same time, it is

accessible. According to Kate Eichhorn, a media historian, this new era made some kind

of profound effect of development of identity and were not sure of its effects are in our

daily lives. On the other hand, she believed that children to teen agers gained a new level

of control to their identity, that they do not have before. Looking at the past, adults never

believed in the idea of individualism. They idolized the idea of kids being innocence and

pure. The arrival of photos in one click allowed the people to have the sense of rewinding

the memories. Technology, especially smartphones allowed us to narrate our lives in the

sense of we have the freedom to choose what to remember.

In these present times there are many victims of various types of crime, especially

what we call cybercrime, where various cases are taking place that often involve young
people because they are exposed to it and use any online applications, platforms and

other things, especially social media. Various types of crimes appear that can take place

right in front of their phone screen (Villanueva and Gravino 2021).

This is where the problem starts because there are so many predators lurking

anywhere in the screen world that can destroy a young person because of the lack of

security when it comes to identifying a person. It contains various events that may happen

unexpectedly online scams, libel, cybersex, illegal fraud computer related, child

pornography, and others caused by improper use of the device or lack of knowledge when

it comes to his security.

In terms of privacy problems, Social media combines technological aspects while

they interact with disclosing and protecting users. To ensure proper social

communications, users should stay accessible on users' accounts, and the nature of

personal information should be assessed from a privacy preservation spectrum. Social

media is a broad platform that can access all information that we want to know to a certain

person. Privacy is a "multifaceted concept" which includes social components (Villanueva

and Gravino 2021). A multidisciplinary approach is therefore required, taking into account

psychological, social, and cultural factors. These factors need to ensure users' privacy

when deciding when, how, and what information is exposed on social media.

People in recent days rely a lot on social media. It became part of the daily life and

has been used for communication and networking to discover the latest happenings

around them. As user's grow exponentially, social media has become the most important

tool whether on school matter, workplace and even on our homes. Since social media is

a public platform, many potential harms may occur on its user's. Every single day theirs a

case of an account that has been hacked. Many individuals face mental problems due to

stress on the exposure of their accounts, particularly those things were not meant to be

posted publicly. In such kind of alarming situations users we are encouraged to read and
analyze very scrutinous the terms and conditions applied on the apps that they want to

use. On the other hand, the loss of identity of the owner has been used and abused by

the so called “Hackers”. On some cases it is been used to harass someone by forcing

them to compensate and pay money in exchange of not publicizing their personal

accounts. As the technological advancement takes place, some people still unaware on

how to protect themselves including privacy violations, identity theft and many more. As a

public demand, the government were urged to make laws to protect their citizens on the

said threat.

The spread of digital devices and platforms is a fundamental element of the twenty-

first century. Smartphones, tablets, computers, and other digital gadgets have become

commonplace, allowing users to stay connected and access information at any time and

from any location. The internet, which provides access to massive amounts of information,

communication tools, and online services, has also become a vital part of our everyday

life. The rapid speed of technological innovation, on the other hand, has created worries

about privacy, security, and the influence of technology on society (Althibyani and Al-

Zahrani 2023).

With the growing technology in our society, social media/online social networks

had gained popularity over the last few years. The reason behind this phenomenon is the

ability of online social networks to provide different social media apps/platforms that the

user can use to connect to their family, friends, and love ones. The information that the

user share to his/her social network and media spreads very fast which make it attractive

for attackers to gain information (Jain, Sahoo, et al. 2021). There are a lot of security and

privacy issues related to the user's shared information such as photos, videos, and audios.

The attacker can maliciously use shared information for illegitimate purposes. The risk is

even higher if children are targeted. To address these issues, this study conduct a
throughout review of different security and privacy threats and existing solution that can

provide the user a secure social media experience.

It is important to ensure cyber safety when talking and or communicating on

different online platforms, site, application, social media. In general, maintaining youth

safety and well-being online through social media is crucial. Young people may take

advantage of social media's positive effects while keeping safe and secure online by being

aware of the hazards and taking the necessary precautions.

The researchers conducted online survey on randomly selected young adults

through google form. Whereas, it aims to collect essential data regarding their personal

experience about poser accounts and hacking in different social media platforms.

According to the respondents who answered the survey, they already experienced being

hacked on social media, became a victim of poser accounts, bullying and became a

laughingstock or meme. The result of the online survey revealed that, most of the young

adults had already become a victim of hacking and poser accounts in social media. The

majority of the respondents indicated that they have experienced being a victim of account

hacking.

According to the survey, 30% of respondents had poser in different social media

platform. 26.67% of them are involved in any cyberbullying. 16.67% already experienced

to become a meme on Facebook, and 33.33% experienced hacking on their account. The

pre-survey results inspired the researchers to conduct this study for the reason of, thought

it was pertinent and timely to help the senior high school students to prevent committing

or being a victim of any cybercrime related issue such as hacking.

The findings of this study will become a basis and foundation by the researchers

to develop recommendations that will aid the future senior high school students in

providing necessary information to secure their social media accounts and protect their

social media identity in different platforms. Moreover, the researchers survey confirmed
that only one (1), out of thirty (30) responders, never experienced any cybercrime related

issues. As a result, these may call an attention to all social media users to be a media and

digital literate individuals. The researchers came to the conclusion that this study was the

only way to address the issue.

This study was therefore conducted to determine how well aware the students are

to cybersecurity and how do senior high school learners, specifically Grade 12 students

of Moncada National high school protect their social media identity. Their ways of

protecting their social media identity were further identified through the use of an interview.

Furthermore, the effects of cyber security and Protection of social media identity of these

students were also sought out.

Review of Related Literature and Studies

Social media identity theft is growing more prevalent as we integrate social

networks into our daily lives. Simple mistakes can compromise our personal information,

allowing scammers to steal our identity. But some scammers can use your personal

information and photos to create fake Twitter, Facebook, Instagram, and LinkedIn

accounts with your name and images on them. They could then use these fake social

media profiles to scam others out of money or to tarnish your reputation. And every time

they trick someone into sending money to a fake charity or spread hateful messages, your

friends, family members, and co-workers may think you're the one committing the crime

or promoting hate speech. Fortunately, there are steps to help protect yourself against

these scammers. We just need to be careful about the information we share online,

manage our social media privacy settings, and report fake social media accounts (Rafter

2020)

People are more online than we were compare to the last five years of our society.

Paying bills online, booking appointments and shopping online are some of the

advantages of the cyberworld. On the other hand, these advantages can also put us to
risk, especially identity theft. When cybercriminals take someone’s information like their

birthdate, social security number, home address, and phone number, authorities consider

that as Identity theft. Phishing is one great example of this. It involves pretending other

people or agency to get sensitive information. (Mcafee.org 2021)

The pervasive use of social media in the Philippines greatly affected the manner

by which Filipinos interact and communicate. Many live in the “always available mode”.

While the Philippines is not an information-based society, it is very much a networked

culture. This development in information and communications technology impacted

Filipinos conception of privacy. The concept of privacy is not, as we like to imagine, a

universal one. (Kabigting, Avhril, et al 2021). Traditionally, the right to privacy is concisely

defined as the right to be left alone. It has also been defined as the right of a person to be

free from n today’s world most of the young adults rely a lot on social media. For them it

is another way to show or express what they feel about something. Social media plays a

big role in teenagers, it became their partners in life. This may seem norm to them, and

looks like they can’t live without it.

Looking into it more deeply, teenagers nowadays had insufficient knowledge about

protecting their social media from harmful sites which may result in hacking (Ospina,

2019). undesired publicity or disclosure and as the right to live without unwarranted

interference by the public in matters with which the public is not necessarily concerned. In

the Philippines, privacy is traditionally viewed as a person’s right against unreasonable

seizure which is the person’s right over his/her house, office or any place where he/she

has expectation of privacy wherein the state/government cannot enter without warrant.

Social media is an open platform which granted everyone to have an access

whether on personal use or in workplace. People can freely express their feelings,

opinions, sympathy about an issue. Social media became a tool for us to know more about

a particular person, by simply looking at the user’s account. From that, a narrative identity
was formed. Using different platforms does not only give us the latest information but also

connects everyone despite the distance they had. Individual differences were given, but

sometimes people can’t avoid comparing themselves to others. In order to hop on the

latest trend, they copy everything they see, and this is where narrative identity came from.

Narrative identity is an identity given by that person to another. That identity is usually

seen in social media, they can make judgement about the person by simply judging the

user’s account (Pasupathi et al., 2019).

According to Eigenio (2021) the average Filipino social media user is four hours in

clicking, and sharing everything about their daily lives, lifestyle, travels. Filipino users

usually don't practice the "think before you click" they are just using social media for what

they want to share in order to flash it on online platforms. It is shown based on the statistics

that 29.7% are average internet users which have a time limit. Those who took caution

over what is real or fake on the internet is 57.2%, while the Filipino users who's concerned

about their personal data is 38.2%.

Cybersecurity for students has received much attention and has become a rapidly

growing topic due to the increased availability of the internet to students and their

consequent exposure to various online risks. (F.Quayyum,D.Cruzes, et al 2021) They

have performed a systematic literature review on cybersecurity awareness for children.

Cybersecurity risks and awareness-raising approaches shows a list of cybersecurity risks

for children, a list of theories for raising cybersecurity awareness among children, and a

list of factors that researchers have considered when evaluating cybersecurity awareness

approaches and solutions. All users, regardless of age, are exposed to various security

risks when spending significant time on the internet. Different terms are used to address

these risks that internet users get exposed to in their everyday lives. Cybersecurity, online

security, online safety and internet security are used interchangeably in the literature to

address security concerns in the digital world.


The Internet has provided people worldwide with vast opportunities, including

criminal opportunities (Reyns et al., 2011). Not only does the Internet allow individuals to

connect with others, communicate with family and friends, develop new relationships, build

social capital, and expand social networks, it also gives people the opportunity for non-

collocated and non-face-to-face interaction (Bossler & Holt, 2009). Arguably, the Internet

has altered how people communicate and connect so much so that it has modified routines

and lifestyles (Bossler & Holt, 2009; Bossler et al., 2012). Indeed, the Internet has also

paved the way and provided a space for new forms of criminal activities, such as

cyberbullying, cyber impersonation, and identity theft, to mention a few. These activities

occur in the various functionalities of the Internet, and social media sites such as Twitter,

Instagram, and Facebook are not exempt (Reyns et al., 2012)

In the Philippines, the 1987 constitution provides provisions with regards to every

right to privacy under the bill of rights; The right against unreasonable searches and

seizures and the right to privacy of communication and correspondence. From these two,

it is said that the right to privacy can be defined as the right to be left alone. It is right of a

person to have the freedom from undesired publicity as the right to live without

unwarranted interference from the public matters. In the civil code of the Philippines,

Provisions are related to privacy can be seen from the Second chapter, under the human

relation. In which, the Article 26 states that “Every person shall respect the dignity,

personality, privacy and peace of mind of his neighbors and other persons.” Even though

it is not considered as criminal offense, it identified acts that can produce a cause of

actions for damages.

One of the strongest laws in the Philippines to be passed to protect the social

media identity of every Filipinos, is the Republic act No. 10173, also known as the Data

Privacy act of 2012. This law aims to protect every individual’s personal information. It

mandates both public and private institutions to protect and preserve the integrity and
confidentiality of all personal data that they may gather during the process of processing

personal and sensitive information. This law also sets boundaries or parameters on when

and on what premise data processing of personal information that can be allowed within

the basic premise when data subject has given direct consent.

Teenagers in the Philippines, aged ten to seventeen showed that most of them are

in Facebook. Most of them are encouraged by their peers to connect in the cyberworld to

hang out and be part of the online community. Many people joined or formed groups to

keep in touch or be updated of the happenings in the social media. Facebook had become

one of the most convenient ways to stay connected to everyone, despite of the distance.

Most Facebook users uses their mobile phone to access the website. (Brutas, n.d.). Most

focus group discussions showed that teenagers in the Philippines had many good and

bad experiences in using Facebook. One said that she experienced bullying because of

the trend circulating online called “Face-off” in which she had no idea that her photo was

used on such post and people started posting offensive comments and remarks that

eventually led to a physical fight.

According to Aguilar (2019), Philippines land on top when it comes to the most

time spent on the internet. They spent almost half of day using their social media. There

were several reasons why people stay on social media, maybe because their business

was in their or they use it for school purposes. The mentioned reasons were just one of

those many causes why people use social media. There are a lot of ways to be

resourceful. People may instantly gain knowledge in just a few seconds because of the

availability of all the materials in internet. Students’ can have an access on their

assignment or activity virtually (Villarin, 2020). They can also do advance studying so that

they could be more prepare in class discussion. Teachers may also encourage their

students to study asynchronously by giving the lesson advanced.


Sharing identities in social media is a complex event. People often present

idealized versions of themselves, carefully selecting what aspects of their identity to

reveal. This selective sharing can lead to both authenticity and deception, as users may

feel pressure to conform to online norms. However, it's essential to remember that these

online identities are just facets of a person's overall self, and true understanding often

requires a deeper, offline connection. The quick sharing and exchanging of information on

social media have been referred to as hyper-sharing. According to The Guardian, the

researchers were able to infer "race, IQ, sexuality, substance use, personality or political

views" from the data, and anyone else could too. Many people also have the practice of

"snacking," which involves accessing mobile internet whenever there is a chance, allowing

one to monitor online activity. In certain cases, context-aware software forces users to

engage in actions that really make it possible to learn more about them. It instantly

transfers to a person's computer.

Social media has a wide influence on all people besides their age, gender and

such. One of the influences of social media is communication. If they have the electronic

devices they can access social media, make friends, interact, share information and a lot

of things are possible using social media. According to a study of Renner (2019) people

nowadays use social media to skip to reality. They are building a new world in social media

that they can express themselves through posting pictures, thoughts, arts and more. In

addition, using social media is like a power they can do whatever they want and one

example of this is bullying, some students using social media to make fun of their friends,

classmates and even about their teachers.

Social media has a huge number of people interacting and participating in activities

on social media and because of that they need to develop security and privacy for the

users. According to Beigi et al. (2018) the reasons why the users having a problem in their

account privacy and security is because of the anonymous friends and connection online,
they don't really know the person or people they interact with on social media platforms.

Furthermore, gender plays a minor role in security and privacy because of their wants to

communicate with specially the students they want to explore, express and know more

people online. Users also faking their identity to get the information that they want and use

it to hack, scam and share fake news about the other users.

Social media is an increasingly important part of students' lives. In fact, the average

teen spends nearly an hour and a half a day using social media. (Higgin 2022)

Unfortunately, some study shows that students spend on average just 7 to 12 minutes per

day on creative activities. To be true digital citizens, our students need teachers who

model prosocial, creative, and responsible social media use.

The most common mistake of people is the oversharing of the personal information

particularly in unfamiliar sites that they visit. Lack of knowledge on everything can lead to

a more serious problem. Even those educated people can be a victim. In using social

media, people shouldn’t be too much attached about someone. No feelings should be

involved so that the possibility of being scammed may be lessen. More importantly social

media must be used in a more educated way. As a responsible citizen and user of social

media platforms, people should know the limitations and the possible consequences of

their actions. Social media may be helpful in other way but not all the time. Either educated

or not, everyone has the responsibility once they enter the world of social media (Cinta,

2018).

Many students might not realize just how invasive some digital safety measures

have become. Social media can be an advantage to students who use it with positive

ways, it can help them provide information and knowledge for their academic and

intellectual curiosity (Knutson 2020).

The negative effects of social media on the social identity of adolescents are a

growing concern within the field of social work. Social media can contribute to a distorted
self-image, as adolescents are often exposed to idealized representations of beauty,

success, and popularity, leading to feelings of inadequacy and low self-esteem. Excessive

social media use can foster a sense of social isolation as it replaces face-to-face

interactions with digital ones, weakening interpersonal skills and meaningful connections.

Additionally, cyberbullying on social media platforms can have devastating effects on an

adolescent's self-worth and mental well-being, sometimes requiring intervention from

social workers.

According to the study made by Bakkar, the most crucial time for children and

young people is adolescence, which is the moment of cultural and social formation. In

order to form a sense of social identity, the adolescent will spend the majority of his time

examining and reflecting on the general beliefs and behaviors he sees if his family and

school don't provide any guidance, attention, or follow-up.

This study relies on students expressing social identity in social media. According

to some studies the students are using social media because it's trending, easy to

communicate and socialize online. In addition, the related studies show that social media

users are experiencing cybercrime which is always with the use of the internet. With the

help of the readings and questions about this research supported by a lot of local and

foreign studies, researchers show what is the knowledge of the students in showing their

social identities in social media, what are the reasons why they're doing, showing and

sharing such things online. Social media plays a significant role in the lives of students

today. It offers a platform for educational enrichment through access to a vast pool of

information and resources. It facilitates communication and collaboration among peers,

enhancing the learning experience. It nurtures digital literacy, a crucial skill in the modern

world. It's an useful tool that shapes and enriches the educational journey of students.

(Higging 2022).
This research introduces the study about social identity of the students in social

media because of broader studies and readings, this study will help the students to know

if they're aware of using social media and become more responsible in using it. The

influence of the internet has fundamentally transformed users' lives, and the effect of

spending most of our time online is extreme. It has changed the communication patterns,

with people increasingly relying on digital platforms for social interaction, potentially

decreasing real life connections. Social media has reshaped the way the students express

themselves, interact, socialize and access information (Aguilar 2019).

In conclusion, studying the students' habits in using social media, talking about

their social identity, privacy and security is needed nowadays because the use of social

media is growing and it's so active. Every student needs to realize how important this

study is and it serves as their reference if they are protecting themselves from any kind of

issues and judgement from other people by simply sharing, posting, saying anything in

social media can be used against them and make them wrong in so many ways.

Theoretical Framework

This study is anchored on Cultivation Theory in Media by Ayesh Perera, hacking

behaviors of Atkinson, Online Disinhibition effect theory by John Suler, frustration–

aggression–displacement theory proposed by John Dollard, Neal Miller,et al, Abraham

Maslow ‘s “Maslow’s Hierarchy of needs”

Cultivation Theory in Media by Ayesh Perera is a theory is about how to examine

the influence of television on viewers. This theory holds that long term exposure to media

shapes how netizens see the world and conduct themselves. It said that the more

television people watch, the more likely they are to hold a view of reality closer to

television’s depiction. For many individuals, the distorted and partial reality portrayed on

television represents what the world is “really” like.


In addition to that is the hacking behaviors (Atkinson, 2019). Studies of hacker

cultures imply that the sub-cultural elements present in the hacker community give them

a place where they are free to express themselves with people who share their interests.

This is especially relevant to new hackers because they often look for ways to fit in with

the subculture. However, there are several communities of hackers within this subculture,

including some who might have higher consciences and avoid from engaging in unlawful

behavior and those who may have lower consciences and choose to engage in illegal

behavior if it is useful to them.

On the other side, the researchers also anchored this on the Online Disinhibition

effect theory by John Suler. This theory suggests that when individuals are behind a

screen and can hide their true identities, they may behave in ways they wouldn't in face-

to-face interactions. When someone's social media account is hacked, it can lead to a

sense of anonymity for the hacker, potentially resulting in more negative or harmful

actions, such as spreading false information, harassment, or stealing personal

information. This theory highlights the impact of online anonymity and its consequences

when social media accounts are compromised.

Additionally, frustration–aggression–displacement theory, is a theory of

aggression proposed by John Dollard, Neal Miller,et al. This theory attempts to explain

why people scapegoat It attempts to give an explanation as to the cause of violence.

According to Dollard and colleagues, frustration is the "condition which exists when a goal-

response suffers interference", while aggression is defined as "an act whose goal-

response is injury to an organism (or an organism surrogate)". The theory says that

frustration causes aggression, but when the source of the frustration cannot be

challenged, the aggression gets displaced onto an innocent target. For example, if a man

is disrespected and humiliated at his work, but cannot respond to this for fear of losing his

job, he may go home and take his anger and frustration out on his family.
They also based their research on the psychologist Abraham Maslow created this

“Maslow’s Hierarchy of needs” He believed that people could not focus on the needs

higher up the pyramid until they had mostly obtained Trusted Source the needs in the

lower levels. Maslow also felt that fulfillment in life results from being able to meet the

needs in all five levels. Maslow’s hierarchy of needs is a model for understanding the

motivations for human behavior. It maps different motivations onto a pyramid, with each

level representing a different human need. These include physiological needs, safety, love

and belonging, esteem, and self-actualization.

Statement of the Problem

This study aims to determine the ways of how senior high school students protect

their social media identity. Specifically, it sought to answer the following questions.

1. How do the Grade 12 HUMSS Students of Moncada national Highschool view the

importance of protecting one’s social media against identity theft online?

2. How do students ensure their social media accounts against identity theft online?

3. How does the implication of protecting the senior high school student’s social

media identity affects their learning of media and information literacy?

4. What implications to social media protection can be drawn from the findings?
CONCEPTUAL FRAMEWORK

Implication to
Student’s usage Protecting social daily social media
of social media media identity interaction

Figure 1: Paradigm of the study

This study determined the senior high school students’ usage of social media, their

ways of protecting their social media identity against identity theft and its implication to

their daily social media interaction.


METHODOLOGY

This portion of the research presents and discusses the method, respondents,

sampling method, instruments, data collection procedure, and data analysis used

implemented in the conduct of the study.

Type of Research

This research implemented a case study methodology. A case study is an

empirical investigation that looks at a phenomenon in its actual setting (Yin 2009). As case

study research entails an in-depth examination of a phenomenon, many data collection

techniques are used. Yin also pointed out, that a case study is not a technique for

gathering data but rather a plan or strategy for researching a social unit. This type of

research is appropriate as used because the present study will describe the implication of

protecting one’s social media identity to students, specifically the Grade 12 HUMSS

students of Moncada National High School.

Respondents

A total of ten (10) Senior High school students Teachers participated in this study

that underwent interview by the researchers. The students are belongs to the Senior High

School Department of Moncada National Highschool during the school year 2023-2024,

The respondents were chosen to participate in this study because they are competent and

intellectually capable students that uses social media on a daily bas that can be use by

the researcher to as their primary basis in gathering data for this research. With this,

complete enumeration has been used.

Sampling Method

The researcher used purposive critical case sampling. According to Vijayamohan

(2022), involves choosing samples from the total sample size depending on the survey

taker's or researcher's assessment. Because the researchers took into account their
restricted time for data collection, the purposive sampling approach is the one that applies

to this study the most.

Instrument

The researchers employed unstructured interviews as the primary data collection

strategy to determine the problems of junior high school instructors. The researchers

created this, and the advisor approved it. Unstructured interviews, according to George

(2022), are a style of data collection that rely on asking participants questions to learn

more about a subject.

Specifically, the researchers created an open-ended question for their interview

guide and follows up questions. Wherein, the researchers varied upon their answers that

determine their ways of protecting their social media identity and their experiences on

identity theft.

Data Gathering Procedure

The research was revised by the researchers' thesis adviser for ideas and

comments on both the technical and content elements. The researchers coordinated with

the administration of Moncada National Highschool in the actual implementation of the

questionnaires after having the article defended to the Thesis Committee and

incorporating its criticisms, judgments, and suggestions.

The researcher used a letter to request approval from the school's principal before

administering the instruments. They then requested the senior high school students'

consent to fill out the survey questionnaire. We chose ten students to participate in an

interview with the researchers after deriving the results. The chosen ten senior high school

students were asked if they would consent to being interviewed. The researchers gave

assurance to the chosen respondents that they will remain anonymous and the

confidential data gathered during the interview will remain a secret between the

researchers themselves.
The problem statement for the researcher's thesis served as the questions.

Teachers were provided with an interview guide to get acquainted with. The researchers

only had 30 minutes to ask the questions and conduct the interview, so They might gather

sufficient information to back up their study. then, researchers fully transform the gathered

data into findings.

Ethical Consideration

The researcher followed an ethical way on gathering the data by providing a letter

that shows the goal of the study. The letter is signed and presented to the principal before

gathering data to the respondents in order to answer the given questionnaire. The

respondents profile is not required to give and voluntarily answered the given

questionnaire with honesty to have a good and valid study. The information collected in

this study is used in research purposes only and it's well explained to them that their

information is safe during the research.

Data Analysis

Case studies are in-depth investigations into phenomena within a specific

context, and using various data sources (Rashid et al., 2019). The case study method was

used to:

Describe the ways of senior high school students to protect their social media

identity and their various experienced on different cybercrimes, specifically identity theft,

personal interviews were undertaken.

Narrate findings based on students’ responses; collecting information via voice

recording was used.

The researchers’ used the triangulation method in order to validate the answer of the

respondents.

You might also like