Professional Documents
Culture Documents
IDENTITY
IDENTITY
IDENTITY
Calamba Campus
COLLEGE OF CRIMINOLOGY
By
Darias,Renz Paolo B.
Gabarda,Edmundo A.
Guevarra,John Noel E.
Chapter I
INTRODUCTION
Nowadays Identity theft has been a big problem in the whole world and also in
our country. This is the one of the worst cases of cybercrime and this is due to the
increase in the use of electronic transactions like virtual payment card, bank transfer,
digital wallet mobile pay, etc. When people use several types of electronic
transactions, their personal identities are revealed and it can be seen by people with
knowledge of hacking it is easy for hackers to use different identities to defraud and
Today, the Internet is the fastest expanding infrastructure in everyday life. Due
information, and as a result, Identity theft is becoming more prevalent daily. Some
commercial transactions are conducted through online; therefore, this industry needed
an elevated level of security for the most reliable and transparent transactions. It is
crucial for any country's security and economic well-being to improve cyber security
The best way to prevent identity theft is always check and secure your
personal information, Monitor Your Credit Reports, Bank and Credit Accounts and
Ask Questions Before You Share Your Information and this way being victim of
still not enough because there are so many people who know how to hack and gather
In the Philippines there are some identity theft cases which have been reported Our
government should pay more attention for this kind of cybercrime, and they
claim to have encountered identity theft while 6% or around 6.7 million individuals
believe that their identity was used to open financial accounts fraudulently. The
growing number of identity frauds could lead to financial losses, Fico said. The report
found financial institutions’ authorized push payment APP where scammers trick
users into sending them money as one of the emerging frauds in the country.
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
AP
P fraud is becoming a bigger problem in the Philippines as we see a boom in the use
of real-time payments, said CK Leo, Fico lead for fraud, security, and financial crime
in the Asia-Pacific. Fraudsters are attracted to these frauds as the victim's bypass
checks by authorizing the payments themselves, with the funds clearing instantly and
laundered through a maze of accounts,” Leo added. Meanwhile, two in five Filipinos
consider fraud and fraud protection as top priority when opening banks and other
financial accounts.
consumers are filtering financial providers to find those with the strongest fraud
protection, that’s a market of more than 23 million, Leo said. This is a significant
opportunity and shows that good fraud protection can be a bank’s biggest sales asset
protection including identity checks set by banks, 28% of users reduced or stopped the
In this light the researchers decided to conduct this study, to help investigate
and gather information to avoid being victim of identity theft, may our research helps
to educate and prevent people from harm and cybercriminals who initiated identity
theft.
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
Identity theft used to be a violent crime. The original identity thieves actually
killed their victims before stealing their identities. The criminal would just grab the
victim's name, social security number, and other personal data once the corpse had
been properly disposed of. The motivation was typically more about gaining a new
identity than it was about making money. Each situation was unique, thus it was hard
and his associates, needing to flee, and seeking a fresh start in California using false
when you take into account the society of the time. In a sense, the victim's physical
Theoretical Framework
on the mediating role played by five risk factors: exposure, guardianship, proximity to
specific crimes themselves. Propositions are derived pertaining to the bivariate and
multivariate-partial (main) effects expected from the theory and tested in analyses
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
based on
a representative sample of the U.S. population for the crimes of assault, burglary, and
personal larceny. These data indicate that the relationship between the dimensions of
social stratification and the offenses studied here is complex, and that, other things
being equal, those usually thought to be most vulnerable economically and socially
the poor, the nonwhite, the old-are not the most likely victims of crime. Race has little
direct effect on victimization risk, while age is inversely related to each type of crime
at both the bivariate and multivariate levels of analyses. The findings are largely
Conceptual Framework
Data from
respondents
*Identity theft
investigation cases Proposed enhanced
in calamba city Data analysis preventive to avoid
laguna identity theft in the
Data Gathering community
*Identity theft
prevention and
safety program
Figure 1.
Research Paradigm
The researchers take the identity theft cases in calamba city laguna prevention and
investigation to collect some information from the victim of identity theft and to share
our gathered information into other individuals that helps them to prevent identity
theft.
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
This study will be conducted to investigate and prevent identity theft in calamba
city laguna.
Central Questions:
city laguna
Corollary Question:
3. What are the emerging themes from the testimonies of the participants?
results of this study will be of great help in improving the teaching and learning
process of criminology education. They can identify aspects of criminology that can
be added to the curriculum. A true researcher can apply what he learns from the
results of this study, and he can apply this knowledge when he joins the police force.
This will bring new knowledge to future researchers and will be an important
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
breakthrough in further research in this field. However, the study would also be
The profesors. The result of this study will offer teachers who do not have
enough knowledge in identity theft, they can share this to their students.
This will also help our people to have enough knowledge on preventing being a
This study will focus on reducing cybercrime and strengthening cyber security.
The primary subject of this research study will consist of the random College Student
Help System Dalta Calamba Campus. if they have encountered a lack of security that
Definition of Terms
Identity theft. occurs when someone uses another person's personal identifying
information, like their name, identifying number, or credit card number, without their
permission, to commit fraud or other crimes. The term identity theft was coined in
1964.
network. The computer may have been used in committing the crime, or it may be the
by non-standard means
CHAPTER II
This chapter presents the related literature and studies which are relevant to
Foreign Literature
Nowadays there are many cases of identitytheft and cyber criminals are taking
advantage of the low rate of cyber security. Additionally, the new, emerging technologies'
lack of security and privacy as well as their users' ignorance present a serious threat to our
personal lives. Online scams are one of the most common identitythet issues.
According to (Yu, 2012). Every year, digital piracy accounts for worldwide financial
losses in billions. In terms of fear of online scam, Roberts and her colleagues (2013) found
that Internet exposure predicts fear of online identity theft, but their study did not include any
of the major predictors, namely “perceived risk”, “perceived seriousness”, and “victimization
experience”.
Besides, identity theft is only one aspect of online fraud, which means more work is
certainly needed to understand fear of online scam. Tounsi and Rais (2018) provides an
overview of the open source/free threat intelligence tools and compare their features with
those from AlliaCERT TI.2 Their analysis found that the fast sharing of threat intelligence
(i.e., Fernández Vázquez et al., 2012; Jasper, 2017), as encouraged by any organization in
order to cooperate, is not enough to avoid targeted attacks. 66 Furthermore, if Tounsi et al.
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
focus on
what is the best way to keep the trust among organizations and at the same time share
information about cyber threats, in Toch et al. (2018) the authors place the accent on the type
of data required from those cybersecurity systems that are supposed to protect our privacy
The Kaspersky company gives guidelines (Kaspersky Lab daily, 2018) on how to
address incident response to contain a cybersecurity attack. Kaspersky listed some key-points
necessary for a company to avoid and contain attacks: (i) the speed, rapid remediation is a key
To limiting the costs, (ii) proactive protection, (iii) presence of internal specialists.
threats and their impact on the American population. Mobile malware and third-party app
stores seem to be a new concern. If, until 2017, spyware, ransomware, and viruses were
focusing mainly on laptop and desktop PC, after 2017, has been recognized an evolution of
malware attacks for mobile and an increment of 54%. According to the Symantec report, in
2023, cybercriminals will be able to steal something like 33 billion records that might include
names, addresses, credit card information, or Social Security numbers. The impact of this
identity theft will impact 60 millioon Americans, and the average costs have been estimated at
$3.86 million (U.S. dollars) for the companies worldwide and $7.91 million (U.S. dollars) for
dominated by organized crime groups and what form or structure such groups may take
(Lusthaus, 2013).
A study by Javelin Strategy & Research found that about 1 in 20 people nationwide
were affected by identity fraud in 2019. Losses rose to a total of $16.9 billion, up 13% from
2018.
Scammers take advantage of any opportunity they can, including the COVID--19 crisis, and
frequent data breaches mean your information may already be exposed. In this new reality, it
is smart to take steps to prevent malicious actors from using your personal information and
Local literature
2010 and it is rising every year in this country. Criminal Investigation and Detection Group
(CIDG) revealed that the Philippine police reported 4,673 cyber-crimes last year while there
were only 527 cybercriminal cases reported in 2006, a three-fold increase in a year. As per the
police, a total of 2,624 cases were reported between 2005 and 2010. In 2004, only 37 cases
were reported, And they kept surging every year with fifty-six cases in 2004 and 161 cases in
2005. In the span of two years, from 2004 to 2006, the PNP investigated 195 computer
crimes, in which cases on various subjects like credit and debit card fraud, Internet
pornography, violation of copyright laws, and other computer related crimes were noticed. In
the Philippines, 87% of Filipino Internet users have been victims of cybercrimes–DOJ, the
primer quoted a 2010 report of the security software firm Symantec that as many as 87
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
percent of
Filipino internet users (nearly nine out of 10) were identified as victims of crimes and
malicious activities committed online. These included being victimized in activities such as
malware (virus and Trojan) invasion; online or phishing scams; sexual predation; and services
The computer as the target- attacking the computers (viruses). 2. The computer as a weapon
information.
warned the public against online identity theft as the agency recorded a spike in cases.
In an interview Thursday, NBI-DADO special investigator Roberto Gonzales said their office
has been recording 12 to 30 online identity theft cases per month since the coronavirus
The agency advised the public not to post sensitive information online to keep predators at
bay. Gonzales said they should inform social media friends and contacts of which accounts
someone has legitimate control of. Victims of online identity theft and similar crimes can file
complaints, the NBI added. Gonzales said criminals, scammers, and swindlers have spread
throughout the social media as the pandemic forced many Filipinos to be active in the use of
the internet.
Scammers using identity theft and estafa were arrested in a police operation conducted by
Cabuyao City Police Station operatives. The operation was launched in Brgy. Banlic,
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
Cabuyao
City, Laguna early on September 1 after the victim and witnesses with barangay officials
sought assistance from the police. Jazer Del Mundo y Maitim, 21, single, a resident of No.
178 Purok 2, Brgy. Banlic, Cabuyao City, Laguna, was arrested while his cohort was able to
evade arrest. He was later identified as one Neil Patrick Magas alias ‘Potpot’, also of Brgy.
Banlic. The suspects connived in hacking the Facebook account of the victim, a freelancer
Laguna. After successfully assuming the identity of the victim, the suspects contacted the FB
friends of the victim through Messenger and asked them for money, and several responded
and sent different amounts through GCash.Capacete and his friend, Estephanie Jonem, who
also served as a witness, contacted the GCash account owner and the barangay officials of
Brgy. Banlic. They were able to accost Millen Milares, whom the suspect Del Mundo asked
to collect the money from the GCash Encashment Store. Later on, Milares, who turned
witness, revealed the identity of Del Mundo to the victim and to the police, which led to Del
Mundo’s arrest. A case for Violation of Section 4a and 4b of Republic Act No. 10175 or
Illegal Access and Computer-Related Identity Theft is being prepared before the City
Prosecutors Office of Cabuyao City against Del Mundo. PRO CALABARZON Acting
Regional Director, Police Brigadier General Jose Melencio C. Nartatez Jr. warned the public
The PNP-Anti Cybercrime Group (PNP-ACG) has arrested a 44-year-old man for
credit card fraud and identity theft. Gabriel Mackay was caught red-handed accepting the
delivery of a credit card replacement in his residence in Recto, Manila earlier Thursday.The
suspect's modus is to call the credit card company, pretend to be a legitimate card holder and
On
July 20, 2022 at around 12:10 PM, operatives of the Eastern District Anti-Cybercrime Team
(EDACT) arrested a male suspect from Mandaluyong City for using stolen credentials of
innocent victims to commit an online scam. The suspect, identified as Christian O. Sanchez,
Jr., posted on Facebook Marketplace the sale of an IPhone 7 mobile phone for Three
Thousand Nine Hundred Pesos (Php3,900.00). The victim sent a message to the suspect about
his interest to buy the said phone They closed a deal wherein the phone will be shipped via
Lalamove courier. The suspect demanded to pay half of the amount of the phone to push
through with their transaction. Further, as proof that the transaction was legit, the suspect
asked the victim to send two valid identification cards with a “selfie” while holding the said
IDs. When the payment has been made and the IDs were sent, the suspect blocked the victim.
Prior to the arrest, the victim was surprised to learn that his identity and pictures were
already circulating online, and had been tagged as a “scammer” on Facebook Marketplace.
This prompted him to report the matter to EDACT who immediately launched an entrapment
operation after engaging the suspect who was still offering the sale of various gadgets online
using the victim’s stolen identity. The suspect was arrested at the instance of withdrawing the
payment from the victim through a remittance center. Seized from the possessions of the
suspect are: a) three pieces of Php1,000.00 and Php200.00 bills as boodle money; b) one unit
of Oppo A5s mobile phone; and c) one identification card. The suspect will be facing charges
National Police (PNP) Quezon City Anti-Cybercrime Team (QCDACT) for identity
John Carlo Jimenez Mamuyac, who was complained by a popular tiktoker.Mamuyac was
caught in the act while withdrawing money at a remittance center in Pandi, Bulacan on
Saturday afternoon Based on the complaint of the victim who has not been named for the time
being, the suspect created a fake Facebook account using the victim's photos taken on social
media, and used it to offer sexual services to its clients.To confirm the suspect's activity, the
victim created a dummy account and pretended to be a client, and sent money to pay for the
service offered by the suspect through a money remittance center.The suspect is currently in
the Quezon City Custodial Facility facing a charge of violation of Sec. 4b and 3 of R.A.
10175 or Computer Related Identity Theft. The ACG urged others who were cheated by the
Investigation (NBI) arrested Mark Jasper C. Reyes a.k.a. Mark Gil Cloma De Guzman, a
native of Cauayan City, Isabela, who has been misrepresenting himself as Atty. Jed Sherwin
G. Uy, Deputy Clerk of Court and Chief Technology Officer of the Supreme Court, and using
his alleged connections in the government in exchange for money. The NBI SAU set the
entrapment operation which led to the arrest of the suspect. The NBI has already charged
Forgery, violation of Anti-Alias Law, and Usurpation of Authority before the Office of the
City Prosecutor in Parañaque. The arrest spawned from the complaints of the real Atty. Uy
and Christine Chung dela Rosa. In her complaint, Dela Rosa claimed that on August 8, 2022,
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
Reyes contacted her through Facebook and posed as Atty. Uy. She said that Reyes discussed
issues concerning a decision of the Court of Appeals in a case involving her late father and
bragged about his government connections. Upon learning that Dela Rosa is the
President/CEO of the Dela Rosa Construction and Development Corporation, Reyes allegedly
offered to help facilitate accreditation for her firm in exchange for P450,000.00. She
eventually confirmed that the real Atty. Uy is a different person and, on August 18, went to
the NBI Special Action Unit (SAU) to file a formal criminal complaint. Atty. Uy, who heads
the Management Information Systems Office of the SC, personally appeared before the NBI
SAU to execute an affidavit to deny any involvement and to clear his name. He also informed
SAU that the suspect is similarly engaged in other fraudulent activities victimizing a lawyer-
doctor and a Mayor in Palawan and in Lamitan, Basilan.In a statement by Supreme Court
Spokesperson Atty. Brian Hosaka, he said: “We are grateful to the NBI for their swift action
which led to the arrest of the alleged impostor. The Supreme Court treats all allegations of
malfeasance seriously, and will cause an immediate investigation of any purported illegal
activities in the Judiciary. We also encourage the public to report to us any purported
identity theft cases from 23 incidents in 2013 increased to 258 incidents in January to June
2019, bringing 1,263 cases over six years, making computer-related identity theft one of
the favorites of Cybercriminals. This, combined with the mainstreaming of social media,
makes R.A. 10175 much more critical. They did, however, question the law’s
constitutionality in Jose Disini, Jr., et al. vs. the Secretary of Justice, et al., G.R. No. 203335.
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
In itsruling, the Supreme Court claimed that R.A. 10175 is legal and lawful, adding that the
statute clearly defines the actions that would constitute identity fraud as a felony Social media
has, in reality, become commonplace over time. According to a study conducted by Sanchez
(2020), the Philippines alone had 74 million users in 2019, and it retained 93 percent of the
country’s social media market share in 2020. The top social media networking sites or
In light of this, it is easy to see why identity theft is becoming more of a problem, mainly
as social media’s popularity and user base grows. According to the PNP-ACG, computer-
related identity theft is a serious crime punishable by up to 12 years in prison. Identity theft
has long been a problem, with many reports focusing on the conventional nature of the
problem. However, only a few studies have focused on social media (Poster, 2013).
As previously stated, the government and social networking companies are aggressively
battling cybercrime, especially identity theft, as Argote (2020) claims that COVID-19 has
increased the number of users of social networking sites, implying that a flood of
information has occurred, and individuals are exposed to online dangers. Between January 1,
2020, and April 26, 2021, there were 64,128 cases of identity fraud in the United States. This
is mainly due to online purchases, travel reservations, and other credit card transactions.
the Federal Trade Commission (FTC), online identity fraud cases increased to 651,000
in 2019 and 1.4 million in the wake of COVID-19. This demonstrates how critical the
problem of online identity theft victimization is and how everyone should be aware of the
threats and dangers it poses, and how it can affect their personal lives.
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
According to previous studies, age and gender are multivariate variables in identity
theft victimization on social media. Other variables, such as the number of different social
media accounts owned, the frequency of online purchases, the degree of privacy of the social
media user, the practices of social media users in securing their account, and the practices of
social media providers in securing their account, all lead to identity theft victimization on
social media. On the other hand, previous research has not focused on the social media
provider’s side of account security. As a result, this research aims to determine and address
what social media providers can do to safeguard and secure their users from identity theft.
Furthermore, previous studies were restricted by the number of respondents; thus, this
research aims to achieve a larger respondent scale to compensate for earlier studies’
limitations.
a study by (Holtfreter et al., 2015), the elderly, especially those between the ages of 60
and 70, are more likely to be victims of identity theft than those younger, accounting for 47
percent of victims of cybercrime. In addition, from 2005 to 2016, the percentage of adults in
the United States who use social media rose from 5% to 69 percent (Poster, 2013). However,
the same study found that most of the respondents were young adults. Children were just as
vulnerable to identity fraud as adults due to a lack of experience with social media and a lack
A suspect for access device fraud and identity theft was arrested by operatives of the
Phase 1d Subd., Pacita Complex, San Pedro, Laguna on December 13, 2019.
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
The team led by PLTCOL MARY IVY SALAZAR, Officer-in-Charge, Cyber Financial
Crime Unit, ACG apprehended Joel Drilon Mahing a.k.a. “KC/Mommy KC”, Filipino, male,
41 years old, sales agent, a native of Mintal, Davao City and presently residing at Block 22,
Lot 5, Waling-Waling St., San Pedro, Laguna 4023 after receiving a credit card in another
person’s name with delivery address at Blk.5, Lot 17, Square St. Pacita 1, Phase 1d Subd.,
Pacita Complex, San Pedro, Laguna at around 11:00 AM of the same day.
Seized from the suspect’s possession was an unopened envelope from the issuing bank
banking company about a suspicious phone call received by one of their customer service
representatives (CSR) last December 6, 2019. Based on the report, a certain caller assumed to
be a card holder (later identified as Mahing) requested updating of their credit card contact
Accordingly, cases for violation of Sections 3 (d) and 9 (e) and (k) of Republic Act No. 8484
(Access Devices Regulation Act of 1998); Commonwealth Act No. 142 (An Act to Regulate
the Use of Aliases); Article 178 (Using Fictitious Name and Concealing True Name) in
relation to Section 6 of Republic Act No. 10175 (Cybercrime Prevention Act of 2012) and
Section 4(b)(3) “Computer-Related Identity Theft” are being prepared for filing against the
Chapter III
RESEARCH METHODOLOGY
Research Design
is based on the principles identified by Husserl (1931) and was translated into a qualitative
employs this design to learn more about the issue as well as the experiences of the people who
Likewise, in the qualitative approach, one of the key elements of collecting data in
In this study, the researcher will use this design which was truly appropriate since she
would like to explore the topic as well as the experiences of the participants that will be
For this research study, a set of ten (10) Police officers who are from PNP
Calamba City will serve as the participants of the study. The participants for the study
will be chosen using criterion-based sampling (Anjum et al. 2018). The number of
participants was carefully considered for data saturation, wherein the interview will
limited to PNP police officers in Calamba City who handles cases related to identity
theft.
Research Instruments
The researcher designs an in-depth interview schedule for the data collection
qualitative research expert, and school’s research expert. The interview questions are
The content of the questionnaires will grasp and guide the participants to
emerge relevant and effective themes from their experiences. The questionnaire will
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
have six
(6) prepared items using structured questions varying from their personal experiences,
The guide questions for the in-depth interview will be divided into three main
Research Procedure
The research procedure for this study follows that of Moustakas’ (1994) which
starts with identifying a phenomenon to study, bracketing out one’s experiences, and
collecting data from several persons who have experienced the phenomenon. The
researcher then analyzes the data to identify significant statements or quote and
combines the statements into themes. Then, the researcher provides a list of various
context), and a description that explains the overall essence of the experience.
Data are to be collected from the participants who have experienced the
(1989) recommends that researchers interview from 5 to 25 individuals who have all
experienced the phenomenon. In this study, there will be ten (10) individuals who will
phenomenon will also be collected. The interviews can be in the form of taped
interviews will be done via personal interview and we will recording their Statement .
Data collection centers around two broad, general questions: What have you
questions may also be asked based on the situation. But, the question on what and
how to focus attention on gathering data that will lead to a list of experiences
expected to last for about 30–40 minutes. The audio recordings will later be
collection process (Forero, et al. 2018). For data gathering and analysis, a stage-by-
stage approach will be used. The participants are recruited in the first stage, and the
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
style and time of the interview will be determined. The researcher will discuss
the goal of the interview in the second phase in order to create rapport with the
qualitative research, triangulation refers to the use of various methods or data sources
participants, focus-group discussions (to corroborate the comments made during the
The participants will be presented with or asked structured questions that will
elicit their own experiences during the in-depth interview. The variation of probing
questions will be determined by the replies or information that participants are willing
to share. These details will be supplied to them later and verified using an FGD
process. They will be questioned again if they confirm or deny their reaction or
assessment of the stated interview outcomes or results. Finally, relevant literature and
research will be used to verify the accuracy of earlier data or findings, which will be
supplemented by observation.
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
The first step in data analysis is to go over the interview transcripts and
identify the key comments, words, or quotes that provide insight into how the
participants felt about the phenomenon. Horizontalization is the term for this process.
The next step is to turn these key statements into themes by forming clusters of
meaning. After then, the themes are used to produce a description of what the
structural description, which is derived from the cluster of data developed for the
theme and describes the context or setting that influenced how the participants viewed
the phenomena.
structural descriptions. The essence is drawn mostly from the individuals' shared
After following the phases of analyzing data, the outcome of the study will be
presented to the key informants/participants for the validation of their responses. The
researcher will seek assistance from the experts (internal and external validators) for
the legitimacy of the themes used by the researcher anchored to the responses of the
key informant.
online teaching process, Braun, and Clarke's (2006) six-step theme analysis technique
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
will be
used. The thematic analysis began soon after the previous interviews are completed.
The data will be transcribed line by line and read at least twice in the first stage to
kept. MS Word was used to code the data in the second stage. To strengthen
the legitimacy of the coding procedure, each transcribed interview is coded by two
the coded transcripts (10 percent of the data) to eliminate researcher biases and
reflexivity.
Similar codes will be collected in the third stage, and initial themes and mind
maps were constructed using inductive thematic analysis (Thomas 2006). The themes
were validated against the coded extracts in the fourth stage to establish a consistent
Peer debriefing meetings will be held in the fifth stage. To assure the
reliability of the findings, the final write-up will be created while considering logical
rationalities and direct statements from the participants. All of these stages ensure the
2017).
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
invariant elements, which will be clustered into core themes using thematic clustering.
Following the creation of key themes, the invariant elements will be validated by
comparing multiple data sources. Individual structural descriptions are then created,
Finally, the texture and structure will be combined to create an expression that
Methods of Validation
Guba (1991) suggested that there are correlates to the positivist paradigms of
sources) that qualitative researchers use to demonstrate the accuracy of the findings
and convince readers of this accuracy. Guba’s four major categories, credibility,
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
engagement, the research spent hours going over the transcripts that gives broad
depth and quantity of observations. Enough sample size is also part of this argument.
Persistent observation gives more interactions and richer understanding of the data
the three sources of data. This is established through multiple sites, multiple
researchers or multiple forms of data like data from the literature. In this undertaking,
triangulation is done through checking data with other sources of information like
debriefing. This is done by allowing colleagues look into the data, verify
interpretations and offer other interpretations. In this current study, peer debriefing
meetings will be held in the fifth stage where the final write-up will be created while
considering logical rationalities and direct statements from the participants. Members
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY
checking gives importance to the voice. It is the process of understanding the subjects
In this current endeavor, the researcher will try to give thicker and richer
descriptions of not only the phenomenon but also the context of the phenomenon.
the study: the number of organizations taking part in the study and where they are
based; any restrictions in the type of people who contributed data; the number of the
participants involved in the fieldwork; the data collection methods that were
employed; the number and length of the data collection sessions; and the time period
this case, a colleague researcher who is blind to literature will produce a thematic
map.
Ethical Considerations
necessary for ensuring the privacy as well as the security of the co-researchers. These
issues will be identified in advance to prevent future problems that could have arisen
during the research process. Among the significant issues that are considered included
The integrity of the research will be ensured. After describing the goal of the
study to the participants by text and e-mail, the participants are expected to give their
written informed permission. The identities of the participants were kept private, and
Another ethical consideration in this study is giving due credits to the sources
of data by citing them properly and ensuring that correct and proper citations are
done.
University of Perpetual Help System-DALTA
Calamba Campus
COLLEGE OF CRIMINOLOGY