Professional Documents
Culture Documents
Full Chapter Group-7
Full Chapter Group-7
Full Chapter Group-7
Presented to the
School Research Council of
SINALHAN INTEGRATED HIGH SCHOOL
In Fulfillment
of the Requirements for the Subject
PRACTICAL RESEARCH 1
By
LORENTE, NICA
MIRA, PAULEEN
MENDOZA, YBON
RECONA, MHEL VINCENT
VALENZUELA, LINDSAY
VALERIO, JANINE
June 2023
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 2
APPROVAL SHEET
Panel Examiners
CERTIFICATION OF ORIGINALITY
This is to certify that the research work presented in this study, SHARED
Integrated High School embodies the result of original and scholarly work carried out by
undersigned. This research study does not contain words or ideas taken from published
sources or written works that have been accepted where proper referencing and
LORENTE, NICA
MENDOZA, YBON
MIRA, PAULEEN
VALENZUELA, LINDSAY
VALERIO, JANINE
ACKNOWLEDGEMENT
The preparation and completion of this research study were made possible and
meaningful through the help and guidance of the following people, to whom the
To Mylyn F. Batitis, the researchers’ teacher, for the honest criticism, patience,
To Leonily B. Alegria, the researchers’ adviser, for giving support, Validation and
To all the professors of the Sinalhan Integrated High School who became a
guiding instrument.
To the panel of examiners for giving their time and effort into providing the best
insight and criticism which made this study accurate and proved to be of great quality.
To other research leaders that served as their support and source of ideas to
To the researchers' parents, who bestowed love, kindness, and unfailing support
in every step of their lives who patiently reminded and guided them to do the right things
And above all, to Almighty God, for granting the ability to successfully progress
the research paper and for his unwavering presence to become the source of strength a
midst difficult and challenging times. He taught them the valuable lessons of hard work.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 5
ABSTRACT
Business Owners
:
Scamming
Shared Perspective
ABSTRACT
business owners in Barangay Sinalhan main objective is to identify the prevalent cases of
the scamming that occurs in the said barangay. Identifying the strategies used by
fraudsters was also the purpose of the research, in that way the awareness of other
starting business owners would be raised significantly. Electronic wallets are apps that are
cases bloom starting on the pandemic when online businesses are out for the trend. The
study adopted the qualitative design and phenomenology approach to gather information
population, the study used purposive sampling and considered the amount scammed, the
experience that these victims were able to share, and the location.
The results of the study shows that some of the reasons behind scamming are
being too inexperience and having unwise decisions and attraction towards bigger
business. Despite experiencing the scams by owners, themselves, some strategies still
remain uncovered and unidentified. The emergence of electronic wallets comes along with
TABLE OF CONTENTS
Title……………………………………………………………………………..…...…..1
Approval Sheet ……………………………………………..…………..………….…..2
Certification….……………………………………………………………..……..……3
Acknowledgement……………………………………………………………..……….4
Abstract……………………………………………………………..…………………..5
Table of Contents……………………………………………………………..………..7
List of Figures………………………………………………………………………….10
List of Tables………………………………………………………………………...…10
Introduction……………………………………………………………….......11
Research Question………….…………………..………….………………….15
Definition of Terms………………………………………………….……….18
Research Design…………………………………………............……………23
Research Locale……………………………………………………………….23
Instrument……………………………………………………………………..25
Validation of Instrument………………………………………………………25
Ethical Considerations………………………………………….…………..…26
Psychological Effect.........................................................................................43
Undetermined...................................................................................................44
Trouble Factors................................................................................................44
Technological Terms……………………………………………………....…45
Beneficial Factors……………………………………………………………46
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 9
Conclusion……………………………………………………….…………...47
Recommendations………………………………………………………........51
References…………………………………………….....……………………….…….52
Appendices…………………………………………………………......……….……...55
Appendix D Transcription……..………………………………………….....57
A Theoretical Framework 17
B Emerging Themes 42
LIST OF TABLES
TABLE PAGE
1 The Type of Business the Participant Owns 27
2 The Duration of Participants ‘Years in Business 28
3 The Type of E-wallet Participants Use for Business Transaction 30
This chapter contains the overall background of the research to provide further
Scamming is an event where two sides gain and lose, be scammed or be the
scammer. This event is common in the business world since a lot of people chose to start
a business but what they don’t know is that they’re vulnerable due to their inexperience.
Scamming is well known all over the world and there’s a different type of scamming, it can
convenience. Although that is, many still disagree, especially now there’s increasing case
of scamming. Online scamming is a type of fraud that involves tricking individuals into
transferring money or making deposits into a fraudulent account. This type of scam can
occur through various means, including email, social media, phone calls, or text
messages. Scammers use fake websites or social media to lure victims into making a
payment for these goods, which are never delivered. Most digital wallets can be connected
protect yourself from falling victim to these fraudulent activities. This type of scam,
electronic wallet scamming, are common in our own community as well. As technology
upgrades business owners tends to rely on it but this choice may result to either
convenience or inconvenience.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 12
Digital wallets enable faster, more convenient, and more secure transactions. This
help reduce the risk of fraud and other security threats. Digital wallets also help users
manage their finances more effectively. It is becoming more and more popular among
consumers. A digital wallet eliminates the need to carry around a physical wallet for
transactions, users will be able to send money to friends and family around the world. A
digital wallet eliminates the need for a bank account for transactions. E-wallet help
The internet and digital infrastructure play an important role in our day-to-day live,
and it has also a huge impact on the organizations and how we do business transactions
is referred to as a "scam." However, until this day, no effective method has been offered
to identify scams. Many methods have been proposed to filter out unsolicited messages
known as "spam." When scam messages resemble the typical ham more than spam,
almost all machine learning-based spam filters will label them as hams. 'Ham'
communications, which are also known as legal messages (Haghshenas, Mokhtari &
Saraee, 2008).
In the Republic Act. Article 1338, if fraud is an influence factor, the error caused by
fraud will always vitiate consent. In the Article 1331, if the error or mistake refers to: (1)
the substance of the thing which is the object of the contract, it will not vitiate the
agreement; (2) to those who, to a significant extent, persuaded one or both parties to enter
into the contract; (3) this refers to the identity or qualifications of one of the parties which
In the Barangay of Sinalhan, store owners that uses e-wallet such as gcash,
paymaya and more apps continuous to multiply and most of the youths uses their
advantage in technology to deceive these owners who are just trying to keep up with the
to some of their classmates and citizens of the barangay to prove that scamming do really
The purpose of this study is to highlight the types of tactics that con artists employ
to fulfill their goals. The study can also be used as a reference for business owners,
entrepreneurs, and people who want to start a business because it increases the likelihood
that victims will be able to tell whether the person having transaction with is trustworthy.
so that by being prepared for the scenario, the existence of scamming can be reduced or
perhaps entirely eliminated the likelihood of being duped instead of continuing to grow and
scammers use in order to achieve their desires. The study can also serve as guide for
entrepreneurs, business owners and for those who plan to start a business, with this study
there’s a higher possibility of them being able to identify whether the person they’re talking
to is someone trustworthy. So, that targeted victims can lessen or even avoid completely
the odds of getting deceived by means of having knowledge on how to handle the
situation. Also, to understand the participants' perspective on electronic wallet scam, such
as the participants response after being scammed by through electronic wallet, and to
provide them with some guidance on what to do next time they are victimized by a similar
Theoretical Framework
Scamming has a worldwide effect on the business industry. This portion of the
research will show the connection between the past theories to the current issues. The
theories are Fraud Diamond Theory, Consumer Vulnerability to Scam, and Elder Scam.
The first theory is Fraud Diamond Theory, it is concluded that fraudulent acts can
be carried out in the presence and basis of pressure, opportunity, rationalization and
capability. These are four major influences to commit a fraud (Wolfe & Hermanson 2004).
based on consumer or owners’ response to fraud with the factors of self-control, influence
The last theory is The Elder Scams, the patterns of online victimizations from
younger to old generation. The use technological advantage to trick elder who has less
The figure above shows the study’s theoretical framework. The figure shows more
of cycle or process on how, what, and why scamming happens. All of these theories are
connected to our study showing that scamming has a flow and how can fraudsters skillfully
pick a vulnerable target, specially the elder one’s who are having a hard time keeping up
Research Question
The objective of the study is to present the lived experience of the selected
Barangay Sinalhan.
Central Question
Corollary Questions
scamming?
This study focuses on the population of business owners who have become victims
of e-wallet scams, by interviewing selected participants, the incident will be more apparent
and how the event may affect their business and trust issues. The researchers' study finds
out how the participants were scammed and what was the fraudsters' strategy to defraud
a store.
The participants of the study are 5 selected persons who has experience in e-wallet
scamming to represent as a sample for increasing number of business owners that are
becoming the victims of scams. The research take place in our own community, Barangay
Sinalhan, City of Santa Rosa Laguna. Sinalhan is a barangay near a lake, so fishing is
one of the means of living in this area. The researchers chose this locale, aside from being
convenient, starting a business in this area is common, having that said the cases of
scamming is rapidly increasing. Through this research the awareness of business and
To be precise, by conducting this research the researchers can identify the strategies
used by scammers. The study is specifically focused on e-wallet type of scams. The
participants of our study are those who use e-wallets as a medium for their cash flow. As
the title indicates our study will only cover the type of scamming that occur to electronic
Since the researchers are interviewed certain number of peoples, the information’s
gathered might be distinct from others. The participants could have different answers by
the reason of having various experiences dealing with scams. With that, the proponents
Through this research, the rising cases of scamming can decrease drastically by
means of sharing the perspective and experience of the selected participants of the study.
Business Owners. The study will develop entrepreneurs to adjust to the current
scamming issues. The outcome of the study can provide information’s from other
business industry.
Customers. The study does not only aim to help entrepreneurs and business
owners. Since, customers are also prone to scamming, our gathered information can
definitely be handy at times. Dealing with these frauds can be troublesome as they are
Students. The conducted research can serve as guide for students, aspiring
entrepreneurs or ABM students to be precise. With study’s findings, students can have a
better chance of improving and learning the cautions and danger of scamming before
Researchers. The study will also benefit the subsequent students or researchers
for the study to be use as a reference. Aside, it will also be able to contribute to the
society’s existing study’s by adding the data that the researchers are able to gather.
The output of the study is going to be a collaboration of ABM and ICT students to
discuss and develop a program that can verify the credibility of an owner and customer.
This may be possible with the knowledge of the researchers to the strategies used by
Definition of Terms
Electronic Wallet. A payment system that keeps the user’s money information. In
the study, it is defined as online app that can used to store money without the burden of
Fraudulent Intent. Using certain bogus accounts to hack another account and
take the money from them, a representation is made with reckless disregard for whether
it is true or not. The strong intent of someone into tricking or deceiving their targets as their
advantage.
money to them or making deposits into a fake account in exchange for their personal
information or something luxurious. It describes the scamming with the use of electronic
the familiarity of the participants in a particular event that already ones occurred to them
Chapter 2
This chapter considers the related literature like articles and books in which the
researchers considered helpful in development of the research. This chapter would also
Ecommerce or electronic commerce has been the norm for the better part of last
year and it still is a huge draw until now. In hindsight, with electronic commerce comes
electronic wallets. This eliminates the decreasing use of physical money by using digital
E-wallet help simplify the experience, reduce cost, and to clear fees that are
usually charged. It is also a great solution for those who need to send money from anyone
which is away (Skrill, 2022). A virtual or cashless service with the use of gadgets known
as an electronic wallet is used to replace actual currency or physical money (Abdullah &
Redzuan, 2020).
Digital wallets’ role will continue to grow in the coming years. The
smartphones, tablets, and wearables already play a significant part in the lives of billions
of people around the world. Digital wallet adoption will increase as end-user convenience
to traditional financial systems. These apps work like bank accounts for people without
access to bank accounts, allowing users to make payments, store funds, and transfer
money to other users' financial accounts. Digital wallets will continue to grow in the coming
on the Internet. The scams can be performed in many ways, phishing emails on the
Internet, text messages to cell phone, fake tech support calls, scareware and more. Theft
of credit cards, stealing user login and password credentials, and even identity theft are
having poor decisions (Foster, Hurriyati and Johansyah, 2022). People with higher
incomes likely to take more risks than people with lower incomes (Grable, 2000).
Internet fraud may be determined as any scheme using one or more of the
components of the internet such as online chat, email, web site to publish fake requests,
conduct fraudulent transactions and transmit proceeds obtained by fraud. (NC State
University, 2023)
“The current trend that we are seeing infers that the increase would likely continue
Internet scamming are transactions that occur online but ended as a one-sided
win. The variety performing of these scams are not limited to one strategy as fraudsters
gets creative to their schemes. Online scamming exploded in the 2-year duration of the
pandemic and the biggest factor are the convenience of internet itself to provide. Business
owners and entrepreneurs adopted the so called “new normal” but the population of
Scammers have adapted their tactics to exploit the rapid and often anonymous
availability of cash they provide, as consumers are becoming more comfortable using peer
to peer (P2P) applications on a daily basis. Their ease and convenience make them
appealing to consumers, but their general lack of user protections is precisely what makes
these services attractive to fraudsters. Using the app, the scam artists will offer to pay for
the product. Once the seller accepts the payment and sends the item, then soon discover
that the payment sent is not to a legitimate buyer, and the money collected is removed
from their account. The seller is then without either the item or the money (State of
Michigan, 2023).
To obtain trust from the group leader and its members, scam artists behave as if
they belong to a group. By investing in the group leader, others are also going to invest
(Skrmetti, 2022). hackers can steal money or make purchases using stored payment
information. The risk can be huge if users do not follow the best practices (Yadav, 2022).
Scams can be based on victim’s response to the fraud scheme (Wiley & Sons,
2021). E-wallet transactions are somewhat riskier than credit card transactions since they
may not be protected by the consumer protections offered by banks for credit card
Electronic wallet scamming is the proper term for scamming that occurs online.
Specifically, the scams that online applications like paymaya, gcash and more are
involved. This is due to the overuse, lack of protection to the app itself and lack of
experience and knowledge of the user as well. Online transactions have less clarity
General Synthesis
To conclude everything, the worldwide use of electronic wallet brings benefits and
risk to its users. According to Fuertes Jr., the appearance of electronic wallet eliminates
the use physical money and using certain apps to pay instead. Electronic wallet’s role will
continue to grow in the upcoming years and it is anticipated that the use of e-wallets will
soon replace banks. But along with it, is the risk of online scamming which is a cybercrime
owners who are always going along with the trend, this applies to fraudsters as well.
Internet scamming is a modern scheme which include the use of one’s technological
advantage and knowledge to deceive. The internet such as online chat, email, web site to
Electronic wallet scamming, as the main variable of the study, is the main focus. It
includes the use of apps that are usually used to store money instead of storing it in a
bank. E-wallet users are constantly rising until today as there is no denying to the
convenience and benefit that these applications bring. Business owners and store owner
are slowly shifting e-wallets as their major medium of cash flow such as business
transactions. The scams that occur in electronic wallet are usually connected to online
sellers who endorse and sell their products online. Using the social media to attract
.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 23
Chapter 3
METHODOLOGY
This chapter presents the research methodology. This chapter shows the
procedure and techniques that the researchers used to identify the information needed
Research Design
Qualitative Research is a method of gathering and analyzing non-numerical data for the
describing the common essence of phenomena (Biemel & Spiegelberg, 2023). This
approach allowed the researchers to gather data on the experiences of business people
phenomenology as it is the most common and will be used to describe the meaning of the
experience.
Research Locale
The study is conducted in Barangay Sinalhan. Barangay Sinalhan was the perfect
location for the study because it allows the researchers to gather a lot of useful information
on the scams experienced by the electronic wallet users needed for the study. This is
because most store owners in Barangay Sinalhan uses electronic wallet in their business
transactions. Barangay Sinalhan is located in Sta. Rosa, Laguna. This Barangay is known
the field. Knowing whether if the study will have a vast population or only one group is also
important. Overall, the use of purposive sampling allowed the researchers to gather rich
and informational data that can assist future students and decision-making. The use of
specific criteria, such as having been the victim of an electronic wallet scam, ensured that
The five (5) selected participants in the study are business owners in the area of
Barangay Sinalhan. Store Owners or Operators that have the option of making payment
by electronic means or digital wallet for transactions carried out in the store on a regular
Data-Gathering Procedure
The researchers presented a letter of request to conduct an interview for the study
that is approved by the teachers and professionals inside the Sinalhan Integrated
Highschool (SIHS). The researchers conducted an individual interview with the selected
retail store owners that have a mode of payment by electronic means. The researchers
also requested the participants to answer the prepared questions with all honesty. The
researchers clarified the importance of the participants answers to the prepared questions
for the study. In this study, the researchers' aim is to understand a victim of fraudulent
activity such as a scam point of view and how it affected the participants business. After
the participants answer the prepared questions, the researchers collected and organized
This study used semi-structured interview guide questions, which is commonly used
collecting data that relies on asking questions, semi-structured are often open-ended and
flexible allowing the participants to share opinions (George, 2022). Using the semi-
structure interview method, the participants’ response would not be only limited to the
question.
This type of interview will give the participant freedom to express their answers and
give opinions and insights about the topic and not only the question. This gives the
participants opportunity to share their experiences without having limits. The interview
consists of 10 questions.
teacher. This process assures that the grammar, use of words, relevance of the study and
its connection to the strand the researchers take are aligned with research that are about
its usefulness for researchers who are not familiar with qualitative approaches,
2013). The approach often entails a conversation between researchers and participants
that is steered by a customizable interview process that may include analysis, remarks, or
follow-up questions.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 26
Ethical Considerations
The researchers applied ethical principle in this study. By applying the principles of
ethics, the protection and privacy of the participants is secured. The researchers also
assures that the data collected are based on truth and the opinion of participants. Any
form of false information and biased statements were avoided. Consents are obtained
This study adopted the use of thematic analysis. Thematic analysis is the most
common type of analysis used in qualitative type of research. Thematic analysis is used
for analyzing the data carefully to identify and turn the data into a form of important
The data that the researchers gathered from the participants through conducting an
interview is recorded, diligently examined and incorporated before interpreting the all the
statements as a whole.
Step 1: Recording – The entire interview session is recorded through a gadget for
documentation purposes. This would allow not any single information to slip.
Step 2: Examination – The data gathered through the recorded interview are all
examined carefully and diligently to avoid any issues and misinterpretations. The
Step 3: Incorporating – After analyzing the data, the researchers combined all the
Step 4: Interpreting – When all of the interview’s information are combined, the
researchers’ transcript the raw data and that are used to reach the goal of the study.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 27
Chapter 4
This chapter presents the descriptive results of the conducted interview which is
gathered from the participants’ responses. It also provides the researcher with
Central Question:
Corollary Question 1:
Interview Question 1: What type of business do you own, online or physical store?
ANALYSIS
According to the data the researchers acquired, the participants have a variety of
that need real space to show and sell goods. Some are just sari-sari stores or convenient
store.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 28
The first and second participants' businesses are examples of stores and shops
where customers can get whatever is needed right away and there are no shipping fees.
It could be alluring to visit the store and depart with purchase if one’s wanted to cross
things off in shopping list quickly. The third participants operate a boutique, a small retail
store selling clothing, fabric, and accessories. The fourth is a building or business
operation. and the last is a physical business, much like the prior to other participants.
EVIDENCE
The existence of electronic wallet will arise even more in the upcoming years.
Adopting to this trend increases in both convenience and security, and as the gadgets
(Ghandour, 2022).
Interview Question 2: How long have you been running your business?
ANALYSIS
It has been years since the participants started running a business, according to
the data gathered regarding how long their business have been operating. More than half
has a less than 5 years of experience in running a store and may be the reason to their
so-called vulnerability and unwise decisions. But even with the fact that the other two has
more than ten years’ experience are still a victim means scam are broad. 35 years in
business is an extremely long time which shown that are still not enough experience to
easily identify fraud schemes, specifically means that having vast experience grants
One participant has been operating their construction company for a year; another
has been doing so for two and a half years; another has been operating their shop for
eleven years; and the longest respondent has been operating their boutique for 35 years.
Since the majority of the participants are not yet used to existence of electronic wallets, it
is probably that these owners have never encountered frauds while using that electronic
wallet in the past. Experience from business and experience from actual scamming itself
EVIDENCE
Scams can be based on customer or business owners’ response to the fraud act
with the factors of self-control, influence, gullibility and knowledge about scamming which
can be earned through experience and having various transaction this is all according the
study conducted and published by Wiley & Sons in the year of 2021.
Interview Question 3: What type of e-wallet do you use for business transactions?
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 30
Table 3: The Type of E-wallet Participants Use for Business Transaction
ANALYSIS
The researchers' data shows that majority of the owners uses gcash. Due to
convenience and potential profits, store owners gamble by joining the trend of digital
currency. Gcash, being the most known electronic wallet throughout the Philippines offer
According to the participants, their business uses gcash for the transaction. And,
through gcash, transaction is simple but with a risk of getting scammed. Using two type of
electronic wallet is one key as well, this makes larger audience or customers.
EVIDENCE
Ecommerce or electronic commerce has been norm for the better part of last year
and it still is a huge draw until now. In hindsight, with electronic commerce comes
electronic wallet. This eliminates the decreasing use of physical money by using digital
ANALYSIS
owners tend to discuss the topic in public to avoid widespread specially on the year or
when the scamming occurred. The provided years are crucial part of their bad histories.
First thing to breakdown is that majority of the year are alarming since most of it
happened recently, this year and months ago. One response declared that scamming
occurred before pandemic which is not the era of e-commerce. This means that as the
EVIDENCE
“The current trend that we are seeing infers that the increase of cases in scam
would most likely continue beyond pandemic” are the exact statement which is directly
stated by Melivo on the year of 2021, and will be the biggest evidence to support this
table.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 32
Interview Question 5: How do the emergence of e-wallet brought convenience or
ANALYSIS
The emergence of e-wallet throughout the world brings a lot of benefit such as the
convenience and most of the app being accessible. The response of the participants gives
this statement a support as business can be implemented by just having it. As an example,
customers often do transaction with it, in addition it is most likely profitable as there is
something called interest for every cash in or cash out. It is also stated that transaction is
easier with the use of e-wallet or, gcash specifically. But of course, there is also some
drawbacks, as stated in the table above it is difficult for the reason of having less customer
The popularity of electronic wallet is divided by its effect, the benefits and risks.
Depending on the user’s satisfaction, risk perception has a positive effect such as being
aware. Meanwhile, although it is called benefits this has a significant negative impact for
Interview Question 6: Were you able to identify the strategies used by the fraudster?
ANALYSIS
The strategies used by scammers are often hard to identify and that what makes
scamming trickier but with the data gathered from the participants, the study was able to
identify some the strategies. The most common among the responses is regarding the
OTP or also known as one-time password, once leaked getting scam is close to being
unavoidable.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 34
Unknown identity and identity theft is used to trick family members or friends of the
victim, which are also connected to mysterious number strategy this strategy attracts their
victims through giving assurance, easy money, and etc. but the main point is their text or
messages are distinct on actual legal company or corporation by means of using random
numbers. Even with all that information there were still some that can’t identify the strategy
used on them that just means that fraudster continue to develop their skill.
EVIDENCE
Online scams occur in various ways, phishing websites, mysterious calls and
messages, technology support which are all fakes and, last by threats. Stealing is one way
as well some examples are OTP or password credential thefts and even identity theft.
(NortonLifeLock, 2021).
Interview Question 7: What measurements did you do to avoid the fraud scheme?
ANALYSIS
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 35
the legitimacy of the transactions that will happen in the business and also by raising the
confidentiality by deleting one-time pins once it is confirmed. The participants also advised
that don't entertain customers as much as it could be a scheme. The participant suggested
to be more knowledgeable with legit numbers that sends OTP or confirmation messages.
EVIDENCE
Internet fraud is defined as any scheme using more than one element of the
internet, e.g. online chat, mail or web site to make fake requests, perform fraudulent
transactions and transfer funds obtained through fraud (NC State University, 2023).
Interview Question 8: How do you think can the scamming be avoided, especially for
that the scammers appear and seem normal and friendly customer. The participants also
advise to trust intuitions. In addition to that, the participants suggest to do research before
into business, do research about handling certain happenings and how to prevent the
scamming.
The participants also suggest to install a CCTV Camera as it will be helpful when
scammers seem and act as a normal customer at first and then lure the owner into the
schemes for the scammers to trick the victim and take advantage of the owner and
business.
EVIDENCE
regular basis, scampers are adapting their tactics for exploiting the quick and often
anonymous availability of cash they provide. Their ease and convenience appeal to
consumers, but their general lack of user protection is the reason why fraudsters have
Interview Question 9: How did the scamming affect your business, you as a business
owner?
ANALYSIS
experiences. Researchers found out that the participants had a heavy feeling, like having
generous feelings because of the money lost, a mindset that can be used in the next
transaction, trauma, a big loss, and confusion due to not knowing what to do. These
circumstances can lead to having anxiety or even having an option to giving up own
business
According to the participants, it is mentioned that all felt was difficulties as well as
heavy feelings because of the money had lost; secondly, it was a state of mind of being
more careful so that would not experience being scammed again; third, one experienced
trauma because of the huge amount of money that was taken from the person. The event
that takes place also take a big toll on victims’ psychological health.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 38
EVIDENCE
Scams are fraudulent practices intended to trick unwary victims into handing over
their hard-earned cash or personal information. Scams may have terrible emotional and
Interview Question 10: Why did these scammers choose you as their target, Is there a
specific reason?
ANALYSIS
Many of today's scammers are clever, scammers use techniques, strategies and
tactics to trick the brains of electronic wallet users just like cash, and target those with
large sums of money inside their electronic wallets. The speculated reasons behind the
committed crimes were identified by most of the participants and was able to state some
the victims were chosen to be cheated by these scammers. One said cheating occurred
because of being unwise. The other respond that their store size is their reason to be
cheated, the other was perceived or the leakage of important because the unknown
scammer saw the conversation. One is credibility, were able to be fooled because of the
good things and promises the scammer stated. The last one is clueless as the event was
extremely unexpected since the man behind the scheme is someone known.
EVIDENCE
The electronic wallet is revolutionary, but it also has drawbacks. Although the
security of digital wallets is quite strong, there is still a chance of fraud. From the
perspective of the consumer, digital wallet transactions are somewhat riskier than credit
card transactions since they may not be protected by the consumer protections offered by
participants?
As shown in the figure 2, There are total of eight (8) themes that emerge. The
themes are:
by categories, which are called themes. This portion of the study answers the corollary
question no. 2 which is; the themes that emerge from the testimonies of the participants.
The researchers used the title 'Year, Duration and Occurrence' to show the dates
given by the participants as their response answering the questions of “How long have
they been running a business” and the year scamming occurred to their enterprise. The
researchers used 'Visible and Observable' as the title of the theme 'appearance' to array
the stores and businesses the participants own this theme also covers the appearance of
customers as well as scammer are described as unpredictable. The researchers titled the
theme 'Psychological Effects' to show how the scamming affected the participants and to
express how the participants feel towards the crime. The researchers also used 'Beneficial
Factors' as the title of theme that shows the advantage and convenience the electronic
Thematic Chart A
Theme 1: Year, Duration and Occurrence
because of the number of years or months participants started using g-cash as a business
to supplement their income. And g-cash also helped the participants since they started
doing business with electronic wallets. It is easy to commit fraud as it has been a year
since they used g-cash, and the scammers also thought that the participants were making
a lot of money.
For the evidence Influence of income on security concerns and comfortability using
e-wallet It is well documented that level of income influences the risk propensity of people.
People with higher incomes likely to take more risks than people with lower incomes
(Grable, 2000).
Thematic Chart B
Theme 2: Visible and Observable
The themes used in Table 12 are visible and observable because that is the
scammer's way of victimizing the targets and how scammers are able to scam the
participants unconsciously or quickly, and how the scammers can quickly scam the
owners. Based on the status or appearance of the store because they are chosen by the
that observability played a key role in influencing usage intentions among people over 50
years of age but had no association among those under 50 years of age. We believed that
observability or visibility was a relevant measure in the present study for two reasons.
First, we targeted young adult smartphone users. Previous literature on new media has
shown that young adults are very much concerned with impression management (Dhir et
al., 2015).
Thematic Chart C
Theme 3: Psychological Effect
The codes that were used in the Table 13 were: confusion, mindset, trauma,
doubts, perceived, unwise and avoid inclined more psychological as the scamming caused
trauma to the participant that affected the participant greatly in business. But that did not
hold the participant back but used it as a motivation to look for more blessing and
helplessness and isolation. When being a victim of fraud leads to isolation, victims
internalize the traumatic experience and thus experience further feelings of loneliness,
The codes used in the Table 14 are: clueless, unidentified, unknown identity,
mysterious number and unpredictable as the scammer scheme was to gain the
participant's trust before doing the crime. And that led the participant to be more confirming
Affinity Fraud: Scammers try to trick members of a group that has formed based
on a common characteristic such as age, ethnicity, or religion. To obtain trust from the
group leader and its members, scam artists behave as if they belong to a group. By
investing in the group leader, others are also going to invest (Skrmetti, 2022).
Thematic Chart E
Theme 5: Trouble Factors
Table 15 consists of the troubles that the participants encountered while running
the business and after dealing with fraudsters. The effects of scams don’t automatically
to account, hackers can steal money or make purchases using stored payment
information. The risk can be huge if users do not follow the best practices associated
(Yadav, 2022).
Thematic Chart F
Theme 6: Technological Terms
used that are sometimes unidentified for the reason of only being used in certain fields
like Paymaya, Globe telecom, Gcash, Bank Transfer and OTP. Aside from CCTV all codes
A virtual or cashless service with the use of gadgets known as an electronic wallet
is used to replace actual currency or physical money (Abdullah & Redzuan, 2020).
Thematic Chart G
Theme 7: Process and Actions
the measurements used to avoid getting scammed. As an example, stated in the short
biggest support that a business can get to make sure that scams is publicized to be used
as warning.
Thematic Chart H
Theme 8: Beneficial Factors
Electronic wallets have a lot of benefits and the codes provided in table eighteen
(18) is categorized by the theme title of “Beneficial Factors”. It is described that the usage
of e-wallet brings benefits such as the app itself being profitable considering the interest
rate per transaction. It is also easier and much simpler to use pertaining to being
E-wallet help simplify the experience, reduce cost, and to clear fees that are
usually charged. It is also a great solution for those who need to send money from anyone
researchers based on the answers of the participants and based on the themes that
emerged.
The significant findings of the study were derived from the participants provides
through a semi-structured interviewing, this testimonies allows the themes to emerge and
provide structure to the conducted study. The selected participants provide their own
knowledge, experience and, perspective regarding the topic of electronic wallet scamming
There are exactly eight (8) accumulated emerging themes. The themes were Year
First theme, which is titled Year, Duration and Occurrence refers to the data
gathered that includes the usage of years. The codes that this theme contains are due to
the interview question of “How long have you been running your business?” for the
duration. Duration of how long the business have been running is necessary to understand
proper research and seminars. Second question is “What year did the scamming occur on
you/your business?” which is used to identify how the pandemic affects the incidents that
occurs and basing on the findings, the pandemic turns out to be one of the biggest factor
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 48
that affect the increase of scamming cases due to the emerging of trends that use gadgets
as medium of transaction as it is safe and it was implemented to avoid face to face meet
ups.
Visible and Observable as the second theme of the study where it shows the
variety of the businesses the participants own. This theme displayed the appearance of
both the store the participants own as it could be one of the factors that led the scammer
The theme titled undermined is used to show codes that has no strong foundations.
In short, this theme is representation of unknowingness. Let the codes give more
clarifications, first code is clueless, it is based on the response a victim has no idea why
their store is targeted. Unidentified, clear and transparent that the strategy used to defraud
the store remain unknown even to the owner himself but the Mysterious Identity and
Unknown number are strategy used by fraudsters. Mysterious Identity is a type of strategy
that use the advantage of not being known itself which allow the fraudster to explore the
information of targeted victim without being known. Determining the strategy used by scam
artist helps subsequent business owners to avoid being victim of same mistakes.
Technological terms are themes that categorize the unknown terms or terms that
are only used on certain field. The codes used are Gcash, Globe Tele., Bank Transfer
and, PayMaya which are all a type electronic wallet. Some like OTP is just a term used in
e-wallet also known as passwords. The theme highlighted the use of gadgets in business
which become a necessary part to run businesses like online shopping, this without a
doubt are truly convenient but disregarding the troubles and risks along with use of
In theme Trouble Factors, the participants conferred about the difficulties and
issues the crime had done in the business. The theme showed the effects in the business
after the crime. The participants also mentioned the burden of the losses the business
along with the owner experienced. To compensate to the last theme which is beneficial
factor, troubles are considered experience and lesson which leads these selected owners
In the theme Psychological Effects, it displayed the effects of the crime to the
participants psychologically. The participants disclosed the feelings and doubts the
unfortunate event had caused. The crime resulted the participants to experience emotional
distraught. This effect usually causes anxiety and depression, luckily the participants didn’t
The participants discussed the measurements and precautions that the business
and transactions do take to avoid and if possible, also to prevent the scamming to happen
in the theme Process and Actions. In this theme, the content also serves as suggestions
and advices on how to increase the privacy of each online transactions. Deleting OTP is
as one of the examples are simple step but by doing so, the risk of this password being
The last theme fall on the title Beneficial factors, as easy as it sounds this are the
benefits of using electronic wallet in business. The testimonies of participants share the
same idea of e-wallet being useful as a daily basis as it is pertained as convenient, simple
and, profitable. Despite being called beneficial, these benefits will soon turn into risk given
the fact the owners, customer and user continue to rely on the growing technology.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 50
The researchers conclude that the themes that emerged are just fractions of the
emotional, physical and mental effect to the participants. Years and duration are used as
event based on the findings it is something that may or may not be perceived by depending
on appearance. In addition, scamming artists continue to polish their skills it can be either
technology and through hacking or communication skill that can be used to persuade. So
as an owner, determining the strategies used are absolutely necessary and if its
unidentifiable that just means there something more that this research can’t uncover.
deleting OTP messages, confirming the validity of transaction, doing proper research and
background checking specially for those who are trying to start a business, and less
entertainment on those sketchy customers. Simple steps have significant impact whether
it is a step to improve or not. The themes claims that scamming has two factors, beneficial
and trouble since almost everything that has a big benefit has drawbacks. Troubles has
benefits as this allows the owners to be more aware and confidential. Lastly, even the
“benefits” has some drawback as well since relying on technology such as e-wallets to
Recommendations
partnership to full extent and do not trust completely after a few transactions.
2. Gain knowledge into basic electronics or other online terminologies as it you'll gain
advantages once you do and they won't succeed so easily when committing a
crime.
3. Always keep and be confirmative and secretive with every receipt of transactions
as it can serve as an evidence or proof to either for your advantage or against the
scammer.
4. Do not rely to the convenience, simplicity and benefit of the growing technology as
it is perceived to be risky
seems sketchy
Journals
A novel method in scam detection and prevention using data mining approaches.
https://lspuoblicon2015.wordpress.com/2016/03/25/article-1338/
2023.
Foster, B., Hurriyati, R., & Johansyah, M. D. (2022). The Effect of Product Knowledge,
https://doi.org/10.3390/su14116475
https://www.scribbr.com/methodology/semi-structured-interview/
Delve. https://delvetool.com/blog/thematicanalysi
Keep an eye out for Norton email scams. (2022, January 11). NortonLifeLock Blogs.
https://www.nortonlifelock.com/blogs/feature-stories/fraudulent-use-
nortonlifelock-brand
https://uk.norton.com/blog/online-scams
Rimghandour, & Rimghandour. (2023). Could Digital Wallets be the New ‘Normal’? -
new-normal/
K., Terzi, M. C., & Kanellos, N. (2022). The Effectiveness of Centralized Payment
https://acg.pnp.gov.ph/main/cyber-security-bulletin/2-uncategorised/172-
common-types-of-internet-fraud-scams.html
News Article
Agcaoili, L. (2021, September 1). Public warned of increasing online fraud. Philstar.com.
https://www.philstar.com/business/2021/09/02/2124166/public-warned-
increasing-online-fraud
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 54
Dantes, C. (2021, September 24). Emoney, digital wallet:
https://manilastandard.net/spotlight/navigating-through-a-digital-pandemic-
world/365756/emoney-digital-wallet-the-new-normal-for-commerce.html
Thesis
https://www.semanticscholar.org/paper/E-wallet%3A-factors-influencing-user-
acceptance-in-AbdullahRedzuan/b7d1263f73a32d188c15bc1589fcb843bb221ffe
Firend, A. (2017b). Social Media, Online Shopping Activities and Perceived Risks
Parti, K. (2022, November 1). “Elder Scam” Risk Profiles: Individual and Situational