Professional Documents
Culture Documents
A Thesis Presented
to the faculty of the
CIT Colleges of Paniqui Foundation, Inc.
Paniqui, Tarlac
In Partial Fulfillment
of the Requirements for the subject
Major 20: Research in Social Studies
MAICAH R. SACALAMITAO
ANGELA CARMONA
VINCE IVAN DEL ROSARIO
JOHN RAYMOND GABAYAN
RENANTE AGUSTIN
ERICK RESPECIO
ALEXANDER DELOS SANTOS
2023
Chapter 1
Keeping people safe in social media is a huge task for authorities, no entity or
government has the perfect solution to completely eliminate these crimes, but they can
build capacities and enforce law to cover possible legal gaps, and strengthen international
cooperation and dialogue between governments and the united nation (Fedotov 2023).
One of the most inevitable terms that defines the youths of many countries right
now is “Cyber”. This term dominates people from their day-to-day basis. And even though
we, humans still have remaining questions about the future of cybersecurity, we still and
ransomware, hacking and other misuse of social media are just some of the crimes related
to cybercrime. Authorities needs to understand how these crimes must have the
The era of fruitfully mysterious for the rest of us but at the same time, it is
accessible. According to Kate Eichhorn, a media historian, this new era made some kind
of profound effect of development of identity and were not sure of its effects are in our
daily lives. On the other hand, she believed that children to teen agers gained a new level
of control to their identity, that they do not have before. Looking at the past, adults never
believed in the idea of individualism. They idolized the idea of kids being innocence and
pure. The arrival of photos in one click allowed the people to have the sense of rewinding
the memories. Technology, especially smartphones allowed us to narrate our lives in the
In these present times there are many victims of various types of crime, especially
what we call cybercrime, where various cases are taking place that often involve young
people because they are exposed to it and use any online applications, platforms and
other things, especially social media. Various types of crimes appear that can take place
This is where the problem starts because there are so many predators lurking
anywhere in the screen world that can destroy a young person because of the lack of
security when it comes to identifying a person. It contains various events that may happen
unexpectedly online scams, libel, cybersex, illegal fraud computer related, child
pornography, and others caused by improper use of the device or lack of knowledge when
they interact with disclosing and protecting users. To ensure proper social
communications, users should stay accessible on users' accounts, and the nature of
media is a broad platform that can access all information that we want to know to a certain
and Gravino 2021). A multidisciplinary approach is therefore required, taking into account
psychological, social, and cultural factors. These factors need to ensure users' privacy
when deciding when, how, and what information is exposed on social media.
People in recent days rely a lot on social media. It became part of the daily life and
has been used for communication and networking to discover the latest happenings
around them. As user's grow exponentially, social media has become the most important
tool whether on school matter, workplace and even on our homes. Since social media is
a public platform, many potential harms may occur on its user's. Every single day theirs a
case of an account that has been hacked. Many individuals face mental problems due to
stress on the exposure of their accounts, particularly those things were not meant to be
posted publicly. In such kind of alarming situations users we are encouraged to read and
analyze very scrutinous the terms and conditions applied on the apps that they want to
use. On the other hand, the loss of identity of the owner has been used and abused by
the so called “Hackers”. On some cases it is been used to harass someone by forcing
them to compensate and pay money in exchange of not publicizing their personal
accounts. As the technological advancement takes place, some people still unaware on
how to protect themselves including privacy violations, identity theft and many more. As a
public demand, the government were urged to make laws to protect their citizens on the
said threat.
The spread of digital devices and platforms is a fundamental element of the twenty-
first century. Smartphones, tablets, computers, and other digital gadgets have become
commonplace, allowing users to stay connected and access information at any time and
from any location. The internet, which provides access to massive amounts of information,
communication tools, and online services, has also become a vital part of our everyday
life. The rapid speed of technological innovation, on the other hand, has created worries
about privacy, security, and the influence of technology on society (Althibyani and Al-
Zahrani 2023).
With the growing technology in our society, social media/online social networks
had gained popularity over the last few years. The reason behind this phenomenon is the
ability of online social networks to provide different social media apps/platforms that the
user can use to connect to their family, friends, and love ones. The information that the
user share to his/her social network and media spreads very fast which make it attractive
for attackers to gain information (Jain, Sahoo, et al. 2021). There are a lot of security and
privacy issues related to the user's shared information such as photos, videos, and audios.
The attacker can maliciously use shared information for illegitimate purposes. The risk is
even higher if children are targeted. To address these issues, this study conduct a
throughout review of different security and privacy threats and existing solution that can
different online platforms, site, application, social media. In general, maintaining youth
safety and well-being online through social media is crucial. Young people may take
advantage of social media's positive effects while keeping safe and secure online by being
through google form. Whereas, it aims to collect essential data regarding their personal
experience about poser accounts and hacking in different social media platforms.
According to the respondents who answered the survey, they already experienced being
hacked on social media, became a victim of poser accounts, bullying and became a
laughingstock or meme. The result of the online survey revealed that, most of the young
adults had already become a victim of hacking and poser accounts in social media. The
majority of the respondents indicated that they have experienced being a victim of account
hacking.
According to the survey, 30% of respondents had poser in different social media
platform. 26.67% of them are involved in any cyberbullying. 16.67% already experienced
to become a meme on Facebook, and 33.33% experienced hacking on their account. The
pre-survey results inspired the researchers to conduct this study for the reason of, thought
it was pertinent and timely to help the senior high school students to prevent committing
The findings of this study will become a basis and foundation by the researchers
to develop recommendations that will aid the future senior high school students in
providing necessary information to secure their social media accounts and protect their
social media identity in different platforms. Moreover, the researchers survey confirmed
that only one (1), out of thirty (30) responders, never experienced any cybercrime related
issues. As a result, these may call an attention to all social media users to be a media and
digital literate individuals. The researchers came to the conclusion that this study was the
This study was therefore conducted to determine how well aware the students are
to cybersecurity and how do senior high school learners, specifically Grade 12 students
of Moncada National high school protect their social media identity. Their ways of
protecting their social media identity were further identified through the use of an interview.
Furthermore, the effects of cyber security and Protection of social media identity of these
networks into our daily lives. Simple mistakes can compromise our personal information,
allowing scammers to steal our identity. But some scammers can use your personal
information and photos to create fake Twitter, Facebook, Instagram, and LinkedIn
accounts with your name and images on them. They could then use these fake social
media profiles to scam others out of money or to tarnish your reputation. And every time
they trick someone into sending money to a fake charity or spread hateful messages, your
friends, family members, and co-workers may think you're the one committing the crime
or promoting hate speech. Fortunately, there are steps to help protect yourself against
these scammers. We just need to be careful about the information we share online,
manage our social media privacy settings, and report fake social media accounts (Rafter
2020)
People are more online than we were compare to the last five years of our society.
Paying bills online, booking appointments and shopping online are some of the
advantages of the cyberworld. On the other hand, these advantages can also put us to
risk, especially identity theft. When cybercriminals take someone’s information like their
birthdate, social security number, home address, and phone number, authorities consider
that as Identity theft. Phishing is one great example of this. It involves pretending other
The pervasive use of social media in the Philippines greatly affected the manner
by which Filipinos interact and communicate. Many live in the “always available mode”.
universal one. (Kabigting, Avhril, et al 2021). Traditionally, the right to privacy is concisely
defined as the right to be left alone. It has also been defined as the right of a person to be
free from n today’s world most of the young adults rely a lot on social media. For them it
is another way to show or express what they feel about something. Social media plays a
big role in teenagers, it became their partners in life. This may seem norm to them, and
Looking into it more deeply, teenagers nowadays had insufficient knowledge about
protecting their social media from harmful sites which may result in hacking (Ospina,
2019). undesired publicity or disclosure and as the right to live without unwarranted
interference by the public in matters with which the public is not necessarily concerned. In
seizure which is the person’s right over his/her house, office or any place where he/she
has expectation of privacy wherein the state/government cannot enter without warrant.
whether on personal use or in workplace. People can freely express their feelings,
opinions, sympathy about an issue. Social media became a tool for us to know more about
a particular person, by simply looking at the user’s account. From that, a narrative identity
was formed. Using different platforms does not only give us the latest information but also
connects everyone despite the distance they had. Individual differences were given, but
sometimes people can’t avoid comparing themselves to others. In order to hop on the
latest trend, they copy everything they see, and this is where narrative identity came from.
Narrative identity is an identity given by that person to another. That identity is usually
seen in social media, they can make judgement about the person by simply judging the
According to Eigenio (2021) the average Filipino social media user is four hours in
clicking, and sharing everything about their daily lives, lifestyle, travels. Filipino users
usually don't practice the "think before you click" they are just using social media for what
they want to share in order to flash it on online platforms. It is shown based on the statistics
that 29.7% are average internet users which have a time limit. Those who took caution
over what is real or fake on the internet is 57.2%, while the Filipino users who's concerned
Cybersecurity for students has received much attention and has become a rapidly
growing topic due to the increased availability of the internet to students and their
for children, a list of theories for raising cybersecurity awareness among children, and a
list of factors that researchers have considered when evaluating cybersecurity awareness
approaches and solutions. All users, regardless of age, are exposed to various security
risks when spending significant time on the internet. Different terms are used to address
these risks that internet users get exposed to in their everyday lives. Cybersecurity, online
security, online safety and internet security are used interchangeably in the literature to
criminal opportunities (Reyns et al., 2011). Not only does the Internet allow individuals to
connect with others, communicate with family and friends, develop new relationships, build
social capital, and expand social networks, it also gives people the opportunity for non-
collocated and non-face-to-face interaction (Bossler & Holt, 2009). Arguably, the Internet
has altered how people communicate and connect so much so that it has modified routines
and lifestyles (Bossler & Holt, 2009; Bossler et al., 2012). Indeed, the Internet has also
paved the way and provided a space for new forms of criminal activities, such as
cyberbullying, cyber impersonation, and identity theft, to mention a few. These activities
occur in the various functionalities of the Internet, and social media sites such as Twitter,
In the Philippines, the 1987 constitution provides provisions with regards to every
right to privacy under the bill of rights; The right against unreasonable searches and
seizures and the right to privacy of communication and correspondence. From these two,
it is said that the right to privacy can be defined as the right to be left alone. It is right of a
person to have the freedom from undesired publicity as the right to live without
unwarranted interference from the public matters. In the civil code of the Philippines,
Provisions are related to privacy can be seen from the Second chapter, under the human
relation. In which, the Article 26 states that “Every person shall respect the dignity,
personality, privacy and peace of mind of his neighbors and other persons.” Even though
it is not considered as criminal offense, it identified acts that can produce a cause of
One of the strongest laws in the Philippines to be passed to protect the social
media identity of every Filipinos, is the Republic act No. 10173, also known as the Data
Privacy act of 2012. This law aims to protect every individual’s personal information. It
mandates both public and private institutions to protect and preserve the integrity and
confidentiality of all personal data that they may gather during the process of processing
personal and sensitive information. This law also sets boundaries or parameters on when
and on what premise data processing of personal information that can be allowed within
the basic premise when data subject has given direct consent.
Teenagers in the Philippines, aged ten to seventeen showed that most of them are
in Facebook. Most of them are encouraged by their peers to connect in the cyberworld to
hang out and be part of the online community. Many people joined or formed groups to
keep in touch or be updated of the happenings in the social media. Facebook had become
one of the most convenient ways to stay connected to everyone, despite of the distance.
Most Facebook users uses their mobile phone to access the website. (Brutas, n.d.). Most
focus group discussions showed that teenagers in the Philippines had many good and
bad experiences in using Facebook. One said that she experienced bullying because of
the trend circulating online called “Face-off” in which she had no idea that her photo was
used on such post and people started posting offensive comments and remarks that
According to Aguilar (2019), Philippines land on top when it comes to the most
time spent on the internet. They spent almost half of day using their social media. There
were several reasons why people stay on social media, maybe because their business
was in their or they use it for school purposes. The mentioned reasons were just one of
those many causes why people use social media. There are a lot of ways to be
resourceful. People may instantly gain knowledge in just a few seconds because of the
availability of all the materials in internet. Students’ can have an access on their
assignment or activity virtually (Villarin, 2020). They can also do advance studying so that
they could be more prepare in class discussion. Teachers may also encourage their
reveal. This selective sharing can lead to both authenticity and deception, as users may
feel pressure to conform to online norms. However, it's essential to remember that these
online identities are just facets of a person's overall self, and true understanding often
requires a deeper, offline connection. The quick sharing and exchanging of information on
social media have been referred to as hyper-sharing. According to The Guardian, the
researchers were able to infer "race, IQ, sexuality, substance use, personality or political
views" from the data, and anyone else could too. Many people also have the practice of
"snacking," which involves accessing mobile internet whenever there is a chance, allowing
one to monitor online activity. In certain cases, context-aware software forces users to
engage in actions that really make it possible to learn more about them. It instantly
Social media has a wide influence on all people besides their age, gender and
such. One of the influences of social media is communication. If they have the electronic
devices they can access social media, make friends, interact, share information and a lot
of things are possible using social media. According to a study of Renner (2019) people
nowadays use social media to skip to reality. They are building a new world in social media
that they can express themselves through posting pictures, thoughts, arts and more. In
addition, using social media is like a power they can do whatever they want and one
example of this is bullying, some students using social media to make fun of their friends,
Social media has a huge number of people interacting and participating in activities
on social media and because of that they need to develop security and privacy for the
users. According to Beigi et al. (2018) the reasons why the users having a problem in their
account privacy and security is because of the anonymous friends and connection online,
they don't really know the person or people they interact with on social media platforms.
Furthermore, gender plays a minor role in security and privacy because of their wants to
communicate with specially the students they want to explore, express and know more
people online. Users also faking their identity to get the information that they want and use
it to hack, scam and share fake news about the other users.
Social media is an increasingly important part of students' lives. In fact, the average
teen spends nearly an hour and a half a day using social media. (Higgin 2022)
Unfortunately, some study shows that students spend on average just 7 to 12 minutes per
day on creative activities. To be true digital citizens, our students need teachers who
The most common mistake of people is the oversharing of the personal information
particularly in unfamiliar sites that they visit. Lack of knowledge on everything can lead to
a more serious problem. Even those educated people can be a victim. In using social
media, people shouldn’t be too much attached about someone. No feelings should be
involved so that the possibility of being scammed may be lessen. More importantly social
media must be used in a more educated way. As a responsible citizen and user of social
media platforms, people should know the limitations and the possible consequences of
their actions. Social media may be helpful in other way but not all the time. Either educated
or not, everyone has the responsibility once they enter the world of social media (Cinta,
2018).
Many students might not realize just how invasive some digital safety measures
have become. Social media can be an advantage to students who use it with positive
ways, it can help them provide information and knowledge for their academic and
The negative effects of social media on the social identity of adolescents are a
growing concern within the field of social work. Social media can contribute to a distorted
self-image, as adolescents are often exposed to idealized representations of beauty,
success, and popularity, leading to feelings of inadequacy and low self-esteem. Excessive
social media use can foster a sense of social isolation as it replaces face-to-face
interactions with digital ones, weakening interpersonal skills and meaningful connections.
social workers.
According to the study made by Bakkar, the most crucial time for children and
young people is adolescence, which is the moment of cultural and social formation. In
order to form a sense of social identity, the adolescent will spend the majority of his time
examining and reflecting on the general beliefs and behaviors he sees if his family and
This study relies on students expressing social identity in social media. According
to some studies the students are using social media because it's trending, easy to
communicate and socialize online. In addition, the related studies show that social media
users are experiencing cybercrime which is always with the use of the internet. With the
help of the readings and questions about this research supported by a lot of local and
foreign studies, researchers show what is the knowledge of the students in showing their
social identities in social media, what are the reasons why they're doing, showing and
sharing such things online. Social media plays a significant role in the lives of students
today. It offers a platform for educational enrichment through access to a vast pool of
enhancing the learning experience. It nurtures digital literacy, a crucial skill in the modern
world. It's an useful tool that shapes and enriches the educational journey of students.
(Higging 2022).
This research introduces the study about social identity of the students in social
media because of broader studies and readings, this study will help the students to know
if they're aware of using social media and become more responsible in using it. The
influence of the internet has fundamentally transformed users' lives, and the effect of
spending most of our time online is extreme. It has changed the communication patterns,
with people increasingly relying on digital platforms for social interaction, potentially
decreasing real life connections. Social media has reshaped the way the students express
In conclusion, studying the students' habits in using social media, talking about
their social identity, privacy and security is needed nowadays because the use of social
media is growing and it's so active. Every student needs to realize how important this
study is and it serves as their reference if they are protecting themselves from any kind of
issues and judgement from other people by simply sharing, posting, saying anything in
social media can be used against them and make them wrong in so many ways.
Theoretical Framework
the influence of television on viewers. This theory holds that long term exposure to media
shapes how netizens see the world and conduct themselves. It said that the more
television people watch, the more likely they are to hold a view of reality closer to
television’s depiction. For many individuals, the distorted and partial reality portrayed on
cultures imply that the sub-cultural elements present in the hacker community give them
a place where they are free to express themselves with people who share their interests.
This is especially relevant to new hackers because they often look for ways to fit in with
the subculture. However, there are several communities of hackers within this subculture,
including some who might have higher consciences and avoid from engaging in unlawful
behavior and those who may have lower consciences and choose to engage in illegal
On the other side, the researchers also anchored this on the Online Disinhibition
effect theory by John Suler. This theory suggests that when individuals are behind a
screen and can hide their true identities, they may behave in ways they wouldn't in face-
to-face interactions. When someone's social media account is hacked, it can lead to a
sense of anonymity for the hacker, potentially resulting in more negative or harmful
information. This theory highlights the impact of online anonymity and its consequences
aggression proposed by John Dollard, Neal Miller,et al. This theory attempts to explain
According to Dollard and colleagues, frustration is the "condition which exists when a goal-
response suffers interference", while aggression is defined as "an act whose goal-
response is injury to an organism (or an organism surrogate)". The theory says that
frustration causes aggression, but when the source of the frustration cannot be
challenged, the aggression gets displaced onto an innocent target. For example, if a man
is disrespected and humiliated at his work, but cannot respond to this for fear of losing his
job, he may go home and take his anger and frustration out on his family.
They also based their research on the psychologist Abraham Maslow created this
“Maslow’s Hierarchy of needs” He believed that people could not focus on the needs
higher up the pyramid until they had mostly obtained Trusted Source the needs in the
lower levels. Maslow also felt that fulfillment in life results from being able to meet the
needs in all five levels. Maslow’s hierarchy of needs is a model for understanding the
motivations for human behavior. It maps different motivations onto a pyramid, with each
level representing a different human need. These include physiological needs, safety, love
This study aims to determine the ways of how senior high school students protect
their social media identity. Specifically, it sought to answer the following questions.
1. How do the Grade 12 HUMSS Students of Moncada national Highschool view the
2. How do students ensure their social media accounts against identity theft online?
3. How does the implication of protecting the senior high school student’s social
4. What implications to social media protection can be drawn from the findings?
CONCEPTUAL FRAMEWORK
Implication to
Student’s usage Protecting social daily social media
of social media media identity interaction
This study determined the senior high school students’ usage of social media, their
ways of protecting their social media identity against identity theft and its implication to
This portion of the research presents and discusses the method, respondents,
sampling method, instruments, data collection procedure, and data analysis used
Type of Research
empirical investigation that looks at a phenomenon in its actual setting (Yin 2009). As case
techniques are used. Yin also pointed out, that a case study is not a technique for
gathering data but rather a plan or strategy for researching a social unit. This type of
research is appropriate as used because the present study will describe the implication of
protecting one’s social media identity to students, specifically the Grade 12 HUMSS
Respondents
A total of ten (10) Senior High school students Teachers participated in this study
that underwent interview by the researchers. The students are belongs to the Senior High
School Department of Moncada National Highschool during the school year 2023-2024,
The respondents were chosen to participate in this study because they are competent and
intellectually capable students that uses social media on a daily bas that can be use by
the researcher to as their primary basis in gathering data for this research. With this,
Sampling Method
(2022), involves choosing samples from the total sample size depending on the survey
taker's or researcher's assessment. Because the researchers took into account their
restricted time for data collection, the purposive sampling approach is the one that applies
Instrument
strategy to determine the problems of junior high school instructors. The researchers
created this, and the advisor approved it. Unstructured interviews, according to George
(2022), are a style of data collection that rely on asking participants questions to learn
guide and follows up questions. Wherein, the researchers varied upon their answers that
determine their ways of protecting their social media identity and their experiences on
identity theft.
The research was revised by the researchers' thesis adviser for ideas and
comments on both the technical and content elements. The researchers coordinated with
questionnaires after having the article defended to the Thesis Committee and
The researcher used a letter to request approval from the school's principal before
administering the instruments. They then requested the senior high school students'
consent to fill out the survey questionnaire. We chose ten students to participate in an
interview with the researchers after deriving the results. The chosen ten senior high school
students were asked if they would consent to being interviewed. The researchers gave
assurance to the chosen respondents that they will remain anonymous and the
confidential data gathered during the interview will remain a secret between the
researchers themselves.
The problem statement for the researcher's thesis served as the questions.
Teachers were provided with an interview guide to get acquainted with. The researchers
only had 30 minutes to ask the questions and conduct the interview, so They might gather
sufficient information to back up their study. then, researchers fully transform the gathered
Ethical Consideration
The researcher followed an ethical way on gathering the data by providing a letter
that shows the goal of the study. The letter is signed and presented to the principal before
gathering data to the respondents in order to answer the given questionnaire. The
respondents profile is not required to give and voluntarily answered the given
questionnaire with honesty to have a good and valid study. The information collected in
this study is used in research purposes only and it's well explained to them that their
Data Analysis
context, and using various data sources (Rashid et al., 2019). The case study method was
used to:
Describe the ways of senior high school students to protect their social media
identity and their various experienced on different cybercrimes, specifically identity theft,
The researchers’ used the triangulation method in order to validate the answer of the
respondents.