Full Chapter Group-7

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

SINALHAN INTEGRATED HIGH SCHOOL

SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 1

SHARED PERSPECTIVE IN ELECTRONIC WALLET


SCAMMING OF SELECTED BUSINESS OWNERS
IN BARANGAY SINALHAN

Presented to the
School Research Council of
SINALHAN INTEGRATED HIGH SCHOOL

In Fulfillment
of the Requirements for the Subject
PRACTICAL RESEARCH 1

By

LORENTE, NICA
MIRA, PAULEEN
MENDOZA, YBON
RECONA, MHEL VINCENT
VALENZUELA, LINDSAY
VALERIO, JANINE

June 2023
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 2

APPROVAL SHEET

This research entitled “SHARED PERSPECTIVE IN ELECTRONIC WALLET


SCAMMING OF SELECTED BUSINESS OWNERS IN BARANGAY SINALHAN”
prepared by LORENTE NICA, MENDOZA YBON, MIRA PAULEEN, RECONA
MHEL VINCENT, VALENZUELA LINDSAY and VALERIO JANINE has been
examined and hereby recommended for approval and acceptance.

MYLYN F. BATITIS, MAEd


Research Teacher

Panel Examiners

Accepted and approved in fulfillment of the requirements for PRACTICAL


RESEARCH 1.

CRISTINA F. MANEJABLE, MAEd ENGR. DIEGO JAY G. VASQUEZ


Member Member

RAYMOND RICHARD A. MAGAN, EdD


Chairman

Accepted in fulfillment of the requirements for PRACTICAL RESEARCH 1.

FRENCIE B. CENON, MAEd MA. CRISTINA C. PEGOLLO


Research Coordinator Principal II
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 3

CERTIFICATION OF ORIGINALITY

This is to certify that the research work presented in this study, SHARED

PERSPECTIVE IN ELECTRONIC WALLET SCAMMING OF SELECTED BUSINESS

OWNERS IN BARANGAY SINALHAN for the course Practical Research 1 at Sinalhan

Integrated High School embodies the result of original and scholarly work carried out by

undersigned. This research study does not contain words or ideas taken from published

sources or written works that have been accepted where proper referencing and

acknowledgement were made.

LORENTE, NICA

MENDOZA, YBON

MIRA, PAULEEN

RECONA, MHEL VINCENT

VALENZUELA, LINDSAY

VALERIO, JANINE

June 28, 2023


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 4

ACKNOWLEDGEMENT
The preparation and completion of this research study were made possible and

meaningful through the help and guidance of the following people, to whom the

proponents give great appreciation and gratitude:

To Mylyn F. Batitis, the researchers’ teacher, for the honest criticism, patience,

guidance, and understanding for the accomplishment of the study.

To Leonily B. Alegria, the researchers’ adviser, for giving support, Validation and

judgements toward the betterment of the study.

To all the professors of the Sinalhan Integrated High School who became a

guiding instrument.

To the panel of examiners for giving their time and effort into providing the best

insight and criticism which made this study accurate and proved to be of great quality.

To the participants who provided an amount of their time to cooperate and

answer the interview questions.

To other research leaders that served as their support and source of ideas to

complete this study.

To the researchers' parents, who bestowed love, kindness, and unfailing support

in every step of their lives who patiently reminded and guided them to do the right things

for their benefit.

And above all, to Almighty God, for granting the ability to successfully progress

the research paper and for his unwavering presence to become the source of strength a

midst difficult and challenging times. He taught them the valuable lessons of hard work.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 5
ABSTRACT

Title SHARED PERSPECTIVE IN ELECTRONIC WALLET SCAMMING


:
OF SELECTED STORE OWNERS IN BARANGAY SINALHAN

Authors LORENTE, NICA


MENDOZA, YBON
MIRA, PAULEEN
:
RECONA, MHEL VINCENT
VALENZUELA, LINDSAY
VALERIO, JANINE

Strand : Accountancy, Buisness and Management

School : Sinalhan Integrated High School

Adviser : Mylyn F. Batitis, MAEd

Keywords Electronic Wallet

Business Owners
:
Scamming

Shared Perspective

ABSTRACT

The research titled shared perspective in electronic wallet scamming of selected

business owners in Barangay Sinalhan main objective is to identify the prevalent cases of

the scamming that occurs in the said barangay. Identifying the strategies used by

fraudsters was also the purpose of the research, in that way the awareness of other

starting business owners would be raised significantly. Electronic wallets are apps that are

used to store money and pay online.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 6
This topic is already a problem before, during and after the pandemic, but the

cases bloom starting on the pandemic when online businesses are out for the trend. The

study adopted the qualitative design and phenomenology approach to gather information

using interview guide questions. To choose the subject as representation of the

population, the study used purposive sampling and considered the amount scammed, the

experience that these victims were able to share, and the location.

The results of the study shows that some of the reasons behind scamming are

being too inexperience and having unwise decisions and attraction towards bigger

business. Despite experiencing the scams by owners, themselves, some strategies still

remain uncovered and unidentified. The emergence of electronic wallets comes along with

both benefits and drawbacks.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 7

TABLE OF CONTENTS

Title……………………………………………………………………………..…...…..1
Approval Sheet ……………………………………………..…………..………….…..2
Certification….……………………………………………………………..……..……3
Acknowledgement……………………………………………………………..……….4
Abstract……………………………………………………………..…………………..5
Table of Contents……………………………………………………………..………..7
List of Figures………………………………………………………………………….10
List of Tables………………………………………………………………………...…10

Chapter 1: THE PROBLEM AND ITS BACKGROUND...………………...………11

Introduction……………………………………………………………….......11

Theoretical Framework …………………………………………......………..14

Research Question………….…………………..………….………………….15

Scope and Delimitation………………………………….……………………16

Significance of the Study……………………………………………………..17

Definition of Terms………………………………………………….……….18

Chapter 2: REVIEW OF RELATED LITERATURE……………………………....19

Title of the Theme…………………………………………….……………….19

Title of the Theme...………………………..………………………………….20

Title of the Theme …………………………..………………………………...21

General Synthesis of the Reviewed Literature………………………….…..…22


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 8

Chapter 3: RESEARCH METHODOLOGY……………………………………..….23

Research Design…………………………………………............……………23

Research Locale……………………………………………………………….23

Population and Sampling….……..……………………...…………………….24

Participants of the Study…………….…………….…………………………..24

Data Gathering Procedure……………………………………………………..24

Instrument……………………………………………………………………..25

Validation of Instrument………………………………………………………25

Ethical Considerations………………………………………….…………..…26

Treatment of Qualitative Data………………………………..……………….26

Chapter 4: ANALYSIS AND RESULTS……………………………….…….…..….27

Years, Duration and Occurrence………………………………...……………41

Visible and Observable.....…………………………………………………....42

Psychological Effect.........................................................................................43

Undetermined...................................................................................................44

Trouble Factors................................................................................................44

Technological Terms……………………………………………………....…45

Process and Actions………………………………………………………….45

Beneficial Factors……………………………………………………………46
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 9

Chapter 5: CONSOLIDATED CONCLUSION AND


RECOMMENDATIONS…………………………………………....………….…….47

Conclusion……………………………………………………….…………...47

Recommendations………………………………………………………........51

References…………………………………………….....……………………….…….52

Appendices…………………………………………………………......……….……...55

Appendix A Letter of Validation……………………………………………….

Appendix B Letter to Participants………………………………………………

Appendix C Research Instrument………………………………...……....….55

Appendix D Transcription……..………………………………………….....57

Appendix E Curriculum Vitae…………………………………….….......….65


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 10
LIST OF FIGURES
FIGURE PAGE

A Theoretical Framework 17

B Emerging Themes 42

LIST OF TABLES

TABLE PAGE
1 The Type of Business the Participant Owns 27
2 The Duration of Participants ‘Years in Business 28
3 The Type of E-wallet Participants Use for Business Transaction 30

4 The Year Scamming Occurred to the Business 31


5 The Consequence that the Emergence of E-wallet Brought 32
6 The Strategies Used by the Fraudsters 33
7 The Measurements Participants do to Avoid the Fraud Schemes 34
8 The Opinions on how can Scamming be Avoided 35
9 The Effect of Scamming in the Business and to the Owner 37
10 Speculated Reason Why These Participants is Chosen as a 38
Target
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 11
Chapter 1

THE PROBLEM AND ITS BACKGROUND

This chapter contains the overall background of the research to provide further

more clarifications to the benefits and problems of the study.

Background of the Study

Scamming is an event where two sides gain and lose, be scammed or be the

scammer. This event is common in the business world since a lot of people chose to start

a business but what they don’t know is that they’re vulnerable due to their inexperience.

Scamming is well known all over the world and there’s a different type of scamming, it can

be either online or physical.

Many people in this generation prefers using e-wallet, because it gives

convenience. Although that is, many still disagree, especially now there’s increasing case

of scamming. Online scamming is a type of fraud that involves tricking individuals into

transferring money or making deposits into a fraudulent account. This type of scam can

occur through various means, including email, social media, phone calls, or text

messages. Scammers use fake websites or social media to lure victims into making a

payment for these goods, which are never delivered. Most digital wallets can be connected

to traditional bank accounts.

It is important to be aware of the signs of e-wallet scams and to take steps to

protect yourself from falling victim to these fraudulent activities. This type of scam,

electronic wallet scamming, are common in our own community as well. As technology

upgrades business owners tends to rely on it but this choice may result to either

convenience or inconvenience.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 12

Digital wallets enable faster, more convenient, and more secure transactions. This

help reduce the risk of fraud and other security threats. Digital wallets also help users

manage their finances more effectively. It is becoming more and more popular among

consumers. A digital wallet eliminates the need to carry around a physical wallet for

transactions, users will be able to send money to friends and family around the world. A

digital wallet eliminates the need for a bank account for transactions. E-wallet help

developing countries participate in global financial markets.

The internet and digital infrastructure play an important role in our day-to-day live,

and it has also a huge impact on the organizations and how we do business transactions

every day (Mohamed, 2020).

A scam is a fraudulent message sent to the mailboxes or e-mails of internet users

is referred to as a "scam." However, until this day, no effective method has been offered

to identify scams. Many methods have been proposed to filter out unsolicited messages

known as "spam." When scam messages resemble the typical ham more than spam,

almost all machine learning-based spam filters will label them as hams. 'Ham'

communications, which are also known as legal messages (Haghshenas, Mokhtari &

Saraee, 2008).

In the Republic Act. Article 1338, if fraud is an influence factor, the error caused by

fraud will always vitiate consent. In the Article 1331, if the error or mistake refers to: (1)

the substance of the thing which is the object of the contract, it will not vitiate the

agreement; (2) to those who, to a significant extent, persuaded one or both parties to enter

into the contract; (3) this refers to the identity or qualifications of one of the parties which

was the main cause of the contracts.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 13

In the Barangay of Sinalhan, store owners that uses e-wallet such as gcash,

paymaya and more apps continuous to multiply and most of the youths uses their

advantage in technology to deceive these owners who are just trying to keep up with the

advancing form of technology. As a preliminary interview, the researchers ask information

to some of their classmates and citizens of the barangay to prove that scamming do really

exist in the barangay of Sinalhan.

The purpose of this study is to highlight the types of tactics that con artists employ

to fulfill their goals. The study can also be used as a reference for business owners,

entrepreneurs, and people who want to start a business because it increases the likelihood

that victims will be able to tell whether the person having transaction with is trustworthy.

so that by being prepared for the scenario, the existence of scamming can be reduced or

perhaps entirely eliminated the likelihood of being duped instead of continuing to grow and

threat the balance of economy.

The importance of conducting this research is to share what kind of strategies do

scammers use in order to achieve their desires. The study can also serve as guide for

entrepreneurs, business owners and for those who plan to start a business, with this study

there’s a higher possibility of them being able to identify whether the person they’re talking

to is someone trustworthy. So, that targeted victims can lessen or even avoid completely

the odds of getting deceived by means of having knowledge on how to handle the

situation. Also, to understand the participants' perspective on electronic wallet scam, such

as the participants response after being scammed by through electronic wallet, and to

provide them with some guidance on what to do next time they are victimized by a similar

scam using an electronic wallet.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 14

Theoretical Framework

Scamming has a worldwide effect on the business industry. This portion of the

research will show the connection between the past theories to the current issues. The

theories are Fraud Diamond Theory, Consumer Vulnerability to Scam, and Elder Scam.

The first theory is Fraud Diamond Theory, it is concluded that fraudulent acts can

be carried out in the presence and basis of pressure, opportunity, rationalization and

capability. These are four major influences to commit a fraud (Wolfe & Hermanson 2004).

The second theory which is Consumers Vulnerability to Scams is a theory that is

based on consumer or owners’ response to fraud with the factors of self-control, influence

gullibility and knowledge about scamming (Langenderfer, & Shimp, 2001).

The last theory is The Elder Scams, the patterns of online victimizations from

younger to old generation. The use technological advantage to trick elder who has less

consciousness on technology than them (Parti, 2022).

Figure 1. Graphical Representation of the Theoretical Framework.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 15

The figure above shows the study’s theoretical framework. The figure shows more

of cycle or process on how, what, and why scamming happens. All of these theories are

connected to our study showing that scamming has a flow and how can fraudsters skillfully

pick a vulnerable target, specially the elder one’s who are having a hard time keeping up

in the 21st century.

Research Question

The objective of the study is to present the lived experience of the selected

participants on electronic scamming and raise awareness for other businesses in

Barangay Sinalhan.

Central Question

What are the shared perspectives in electronic wallet scamming of selected

business owners of Barangay Sinalhan?

Corollary Questions

Particularly, the study aims to give acknowledgement to the following questions:

1. How do the participants describe their experience in electronic wallet

scamming?

2. What themes emerged from the testimonies of the participants?


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 16

Scope and Delimitations of the Study

The study’s objective is to spread the shared perspective in electronic wallet

scamming of selected store owners here in the Barangay of Sinalhan.

This study focuses on the population of business owners who have become victims

of e-wallet scams, by interviewing selected participants, the incident will be more apparent

and how the event may affect their business and trust issues. The researchers' study finds

out how the participants were scammed and what was the fraudsters' strategy to defraud

a store.

The participants of the study are 5 selected persons who has experience in e-wallet

scamming to represent as a sample for increasing number of business owners that are

becoming the victims of scams. The research take place in our own community, Barangay

Sinalhan, City of Santa Rosa Laguna. Sinalhan is a barangay near a lake, so fishing is

one of the means of living in this area. The researchers chose this locale, aside from being

convenient, starting a business in this area is common, having that said the cases of

scamming is rapidly increasing. Through this research the awareness of business and

store owners in our own community should be more improved.

To be precise, by conducting this research the researchers can identify the strategies

used by scammers. The study is specifically focused on e-wallet type of scams. The

participants of our study are those who use e-wallets as a medium for their cash flow. As

the title indicates our study will only cover the type of scamming that occur to electronic

wallets, furthermore scamming type would not be a part of our study.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 17

Since the researchers are interviewed certain number of peoples, the information’s

gathered might be distinct from others. The participants could have different answers by

the reason of having various experiences dealing with scams. With that, the proponents

do not consider this research as a perfectly accurate basis.

Significance of the Study

Through this research, the rising cases of scamming can decrease drastically by

means of sharing the perspective and experience of the selected participants of the study.

The study aims to be beneficial to the following:

Business Owners. The study will develop entrepreneurs to adjust to the current

scamming issues. The outcome of the study can provide information’s from other

entrepreneurs’ perspective and experience of how manipulative scammers can be in the

business industry.

Customers. The study does not only aim to help entrepreneurs and business

owners. Since, customers are also prone to scamming, our gathered information can

definitely be handy at times. Dealing with these frauds can be troublesome as they are

great with their skill into deceiving their targets.

Students. The conducted research can serve as guide for students, aspiring

entrepreneurs or ABM students to be precise. With study’s findings, students can have a

better chance of improving and learning the cautions and danger of scamming before

entering the business world.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 18

Researchers. The study will also benefit the subsequent students or researchers

for the study to be use as a reference. Aside, it will also be able to contribute to the

society’s existing study’s by adding the data that the researchers are able to gather.

The output of the study is going to be a collaboration of ABM and ICT students to

discuss and develop a program that can verify the credibility of an owner and customer.

This may be possible with the knowledge of the researchers to the strategies used by

fraudsters collaborating with knowledge of ICT students in programing.

Definition of Terms

Electronic Wallet. A payment system that keeps the user’s money information. In

the study, it is defined as online app that can used to store money without the burden of

carrying actual wallet.

Fraudulent Intent. Using certain bogus accounts to hack another account and

take the money from them, a representation is made with reckless disregard for whether

it is true or not. The strong intent of someone into tricking or deceiving their targets as their

advantage.

Internet Scamming. This involves a cybercriminal luring victims into sending

money to them or making deposits into a fake account in exchange for their personal

information or something luxurious. It describes the scamming with the use of electronic

wallets and communicating online with their targets.

Shared Perspective. understanding others person’s point of view. Identifies as

the familiarity of the participants in a particular event that already ones occurred to them

and to share knowledge and also their takeaways.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 19

Chapter 2

REVIEW OF RELATED LITERATURE

This chapter considers the related literature like articles and books in which the

researchers considered helpful in development of the research. This chapter would also

serve as a supporting structure to the research.

Electronic Wallet: New Normal

Ecommerce or electronic commerce has been the norm for the better part of last

year and it still is a huge draw until now. In hindsight, with electronic commerce comes

electronic wallets. This eliminates the decreasing use of physical money by using digital

wallets to pay for their services (Fuertes Jr. 2021).

E-wallet help simplify the experience, reduce cost, and to clear fees that are

usually charged. It is also a great solution for those who need to send money from anyone

which is away (Skrill, 2022). A virtual or cashless service with the use of gadgets known

as an electronic wallet is used to replace actual currency or physical money (Abdullah &

Redzuan, 2020).

Digital wallets’ role will continue to grow in the coming years. The

smartphones, tablets, and wearables already play a significant part in the lives of billions

of people around the world. Digital wallet adoption will increase as end-user convenience

and security improve (Ghandour 2022).

Digital wallets are a key to electronic commerce, providing an accessible alternative

to traditional financial systems. These apps work like bank accounts for people without

access to bank accounts, allowing users to make payments, store funds, and transfer

money to other users' financial accounts. Digital wallets will continue to grow in the coming

years, increasing end-user convenience and security.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 20

Internet Frauds or Online Scamming

Internet scams are different methodologies of Fraud, facilitated by cybercriminals

on the Internet. The scams can be performed in many ways, phishing emails on the

Internet, text messages to cell phone, fake tech support calls, scareware and more. Theft

of credit cards, stealing user login and password credentials, and even identity theft are

all common goals of these scams. (NortonLifeLock, 2021).

Although it is called benefit this has a significant negative impact to a reason of

having poor decisions (Foster, Hurriyati and Johansyah, 2022). People with higher

incomes likely to take more risks than people with lower incomes (Grable, 2000).

“The Emotional Impact of Scams: What Victims Experience” (Freedman. 2019).

Internet fraud may be determined as any scheme using one or more of the

components of the internet such as online chat, email, web site to publish fake requests,

conduct fraudulent transactions and transmit proceeds obtained by fraud. (NC State

University, 2023)

“The current trend that we are seeing infers that the increase would likely continue

beyond the pandemic” (Melivo, 2021).

Internet scamming are transactions that occur online but ended as a one-sided

win. The variety performing of these scams are not limited to one strategy as fraudsters

gets creative to their schemes. Online scamming exploded in the 2-year duration of the

pandemic and the biggest factor are the convenience of internet itself to provide. Business

owners and entrepreneurs adopted the so called “new normal” but the population of

scammer emerges at the same time as well.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 21

Electronic Wallet Scamming

Scammers have adapted their tactics to exploit the rapid and often anonymous

availability of cash they provide, as consumers are becoming more comfortable using peer

to peer (P2P) applications on a daily basis. Their ease and convenience make them

appealing to consumers, but their general lack of user protections is precisely what makes

these services attractive to fraudsters. Using the app, the scam artists will offer to pay for

the product. Once the seller accepts the payment and sends the item, then soon discover

that the payment sent is not to a legitimate buyer, and the money collected is removed

from their account. The seller is then without either the item or the money (State of

Michigan, 2023).

To obtain trust from the group leader and its members, scam artists behave as if

they belong to a group. By investing in the group leader, others are also going to invest

(Skrmetti, 2022). hackers can steal money or make purchases using stored payment

information. The risk can be huge if users do not follow the best practices (Yadav, 2022).

Scams can be based on victim’s response to the fraud scheme (Wiley & Sons,

2021). E-wallet transactions are somewhat riskier than credit card transactions since they

may not be protected by the consumer protections offered by banks for credit card

transactions (Conn, 2022).

Electronic wallet scamming is the proper term for scamming that occurs online.

Specifically, the scams that online applications like paymaya, gcash and more are

involved. This is due to the overuse, lack of protection to the app itself and lack of

experience and knowledge of the user as well. Online transactions have less clarity

compared to the tradition meeting making it more misleading.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 22

General Synthesis

To conclude everything, the worldwide use of electronic wallet brings benefits and

risk to its users. According to Fuertes Jr., the appearance of electronic wallet eliminates

the use physical money and using certain apps to pay instead. Electronic wallet’s role will

continue to grow in the upcoming years and it is anticipated that the use of e-wallets will

soon replace banks. But along with it, is the risk of online scamming which is a cybercrime

activity which occur all over the internet.

The 2-year pandemic due to Covid-19 opens up a lot of opportunities to business

owners who are always going along with the trend, this applies to fraudsters as well.

Internet scamming is a modern scheme which include the use of one’s technological

advantage and knowledge to deceive. The internet such as online chat, email, web site to

publish fake requests are used as the medium of transaction.

Electronic wallet scamming, as the main variable of the study, is the main focus. It

includes the use of apps that are usually used to store money instead of storing it in a

bank. E-wallet users are constantly rising until today as there is no denying to the

convenience and benefit that these applications bring. Business owners and store owner

are slowly shifting e-wallets as their major medium of cash flow such as business

transactions. The scams that occur in electronic wallet are usually connected to online

sellers who endorse and sell their products online. Using the social media to attract

potential customers also attracts scammers.

.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 23
Chapter 3

METHODOLOGY

This chapter presents the research methodology. This chapter shows the

procedure and techniques that the researchers used to identify the information needed

about the topic.

Research Design

This study adopted qualitative design and phenomenology as its approach.

Qualitative Research is a method of gathering and analyzing non-numerical data for the

purpose of understanding concepts, opinions and experiences.

Phenomenology approach is a qualitative process aimed at understanding and

describing the common essence of phenomena (Biemel & Spiegelberg, 2023). This

approach allowed the researchers to gather data on the experiences of business people

and entrepreneurs in terms of scamming. Essentially, phenomenology studies lived

experiences and the participants perspective in order to gain a better understanding of

how people understand these experiences. The researchers used descriptive

phenomenology as it is the most common and will be used to describe the meaning of the

experience.

Research Locale

The study is conducted in Barangay Sinalhan. Barangay Sinalhan was the perfect

location for the study because it allows the researchers to gather a lot of useful information

on the scams experienced by the electronic wallet users needed for the study. This is

because most store owners in Barangay Sinalhan uses electronic wallet in their business

transactions. Barangay Sinalhan is located in Sta. Rosa, Laguna. This Barangay is known

for being near Laguna de bay or Laguna Lake.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 24
Population and Sampling

Purposive sampling is utilized by the researchers to choose their subjects. To be

considered, a population member must have relevant experience and be well-versed in

the field. Knowing whether if the study will have a vast population or only one group is also

important. Overall, the use of purposive sampling allowed the researchers to gather rich

and informational data that can assist future students and decision-making. The use of

specific criteria, such as having been the victim of an electronic wallet scam, ensured that

the participants had relevant experiences and perspectives to share.

Participants of the Study

The five (5) selected participants in the study are business owners in the area of

Barangay Sinalhan. Store Owners or Operators that have the option of making payment

by electronic means or digital wallet for transactions carried out in the store on a regular

basis. The experience of scamming in electronic-wallet matter is also a requirement for a

specific participant to be selected.

Data-Gathering Procedure

The researchers presented a letter of request to conduct an interview for the study

that is approved by the teachers and professionals inside the Sinalhan Integrated

Highschool (SIHS). The researchers conducted an individual interview with the selected

retail store owners that have a mode of payment by electronic means. The researchers

also requested the participants to answer the prepared questions with all honesty. The

researchers clarified the importance of the participants answers to the prepared questions

for the study. In this study, the researchers' aim is to understand a victim of fraudulent

activity such as a scam point of view and how it affected the participants business. After

the participants answer the prepared questions, the researchers collected and organized

the data for interpretation.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 25
Instrument

This study used semi-structured interview guide questions, which is commonly used

type of interview in qualitative type of research. Semi-structured interview is method of

collecting data that relies on asking questions, semi-structured are often open-ended and

flexible allowing the participants to share opinions (George, 2022). Using the semi-

structure interview method, the participants’ response would not be only limited to the

question.

This type of interview will give the participant freedom to express their answers and

give opinions and insights about the topic and not only the question. This gives the

participants opportunity to share their experiences without having limits. The interview

consists of 10 questions.

Validation of the Instrument

The instrument is given to selected professionals for a validation, the chosen

validators consist of an English teacher, a Certified Public Accountant, and a Research

teacher. This process assures that the grammar, use of words, relevance of the study and

its connection to the strand the researchers take are aligned with research that are about

to be conducted is checked and approved by professionals. The method is usually

composed of a dialogue between researchers and participants guided by the flexible

interview protocol which includes follow up questions, investigations or comments. Despite

its usefulness for researchers who are not familiar with qualitative approaches,

asynchronous interviews can be intimidating and challenging (DeJonckheere & Vaughn

2013). The approach often entails a conversation between researchers and participants

that is steered by a customizable interview process that may include analysis, remarks, or

follow-up questions.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 26
Ethical Considerations

The researchers applied ethical principle in this study. By applying the principles of

ethics, the protection and privacy of the participants is secured. The researchers also

assures that the data collected are based on truth and the opinion of participants. Any

form of false information and biased statements were avoided. Consents are obtained

from the participants before conducting the interview to avoid misunderstandings.

Voluntary participation of the participants would lead to having less issues.

Treatment of Qualitative Data

This study adopted the use of thematic analysis. Thematic analysis is the most

common type of analysis used in qualitative type of research. Thematic analysis is used

for analyzing the data carefully to identify and turn the data into a form of important

information (Smith, 2020).

The data that the researchers gathered from the participants through conducting an

interview is recorded, diligently examined and incorporated before interpreting the all the

statements as a whole.

The following are the steps in the study’s data gathering:

Step 1: Recording – The entire interview session is recorded through a gadget for

documentation purposes. This would allow not any single information to slip.

Step 2: Examination – The data gathered through the recorded interview are all

examined carefully and diligently to avoid any issues and misinterpretations. The

researchers put close attention to every detail.

Step 3: Incorporating – After analyzing the data, the researchers combined all the

collected information into a statement to be used in the study’s findings.

Step 4: Interpreting – When all of the interview’s information are combined, the

researchers’ transcript the raw data and that are used to reach the goal of the study.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 27
Chapter 4

PRESENTATION, ANALYSIS, AND INTERPRETATION OF DATA

This chapter presents the descriptive results of the conducted interview which is

gathered from the participants’ responses. It also provides the researcher with

examinations and interpretation.

Central Question:

What is the shared perspective in electronic wallet scamming of selected business

owners in Barangay Sinalhan?

Corollary Question 1:

How do the participants describe their experiences in e-wallet scamming?

Interview Question 1: What type of business do you own, online or physical store?

Table 1: The Type of Business the Participant Owns

Participants Response Codes

Participant 1 “Tindahan” Store


Participant 2 “Pisikal na tindahan” Shop

Participant 3 “Pisikal na tindahan, ano eh Boutique


parang damitan parang ganun”
Participant 4 ‘Construction business” Construction
Participant 5 “Pisikal” Physical Shop

ANALYSIS

According to the data the researchers acquired, the participants have a variety of

physical businesses, including brick-and-mortar stores, which are retail establishments

that need real space to show and sell goods. Some are just sari-sari stores or convenient

store.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 28
The first and second participants' businesses are examples of stores and shops

where customers can get whatever is needed right away and there are no shipping fees.

It could be alluring to visit the store and depart with purchase if one’s wanted to cross

things off in shopping list quickly. The third participants operate a boutique, a small retail

store selling clothing, fabric, and accessories. The fourth is a building or business

operation. and the last is a physical business, much like the prior to other participants.

EVIDENCE

The existence of electronic wallet will arise even more in the upcoming years.

Adopting to this trend increases in both convenience and security, and as the gadgets

already a significant part of lifestyle, using it to run a business is clearly beneficial

(Ghandour, 2022).

Interview Question 2: How long have you been running your business?

Table 2: The Duration of Participants’Years in Business

Participants Response Codes

Participant 1 “10 years na…… 11 years” 11 years


Participant 2 “Mag two and a half years” 2.5 years

Participant 3 “Di ko mabilang kung ano, parang 35 years


35 years? Ganun kasi parang
dyan ako nag boom”

Participant 4 “Isang taon pa lang” 1 year

Participant 5 “Ano, mga mag dadalawang 2 years


taon”
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 29

ANALYSIS

It has been years since the participants started running a business, according to

the data gathered regarding how long their business have been operating. More than half

has a less than 5 years of experience in running a store and may be the reason to their

so-called vulnerability and unwise decisions. But even with the fact that the other two has

more than ten years’ experience are still a victim means scam are broad. 35 years in

business is an extremely long time which shown that are still not enough experience to

easily identify fraud schemes, specifically means that having vast experience grants

protection against scamming.

One participant has been operating their construction company for a year; another

has been doing so for two and a half years; another has been operating their shop for

eleven years; and the longest respondent has been operating their boutique for 35 years.

Since the majority of the participants are not yet used to existence of electronic wallets, it

is probably that these owners have never encountered frauds while using that electronic

wallet in the past. Experience from business and experience from actual scamming itself

are two different things to get lesson from.

EVIDENCE

Scams can be based on customer or business owners’ response to the fraud act

with the factors of self-control, influence, gullibility and knowledge about scamming which

can be earned through experience and having various transaction this is all according the

study conducted and published by Wiley & Sons in the year of 2021.

Interview Question 3: What type of e-wallet do you use for business transactions?
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 30
Table 3: The Type of E-wallet Participants Use for Business Transaction

Participants Response Codes

Participant 1 “Both, parehas, parehong gcash Paymaya


tsaka paymaya. Kahit bawal sa
paymaya ang laman ng gcash,
wala talo na siya sa gcash”
Participant 2 “Eto, Cellphone ba or yung ano? Globe Telecom
App? Oo gcash lang”
Participant 3 “Oo, gcash. Three hundred fifty G-cash only
thousand yung winidraw ko yun
sa bangko na ano ko eh, na
blackout”
Participant 4 ‘Gcash tapos ano Bank Transfer” Bank Transfer
Participant 5 “gcash” G-cash

ANALYSIS

The researchers' data shows that majority of the owners uses gcash. Due to

convenience and potential profits, store owners gamble by joining the trend of digital

currency. Gcash, being the most known electronic wallet throughout the Philippines offer

great amount of success to other shops.

According to the participants, their business uses gcash for the transaction. And,

through gcash, transaction is simple but with a risk of getting scammed. Using two type of

electronic wallet is one key as well, this makes larger audience or customers.

EVIDENCE

Ecommerce or electronic commerce has been norm for the better part of last year

and it still is a huge draw until now. In hindsight, with electronic commerce comes

electronic wallet. This eliminates the decreasing use of physical money by using digital

wallets to pay their services (Fuertes Jr., 2021).


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 31
Interview Question 4: What year did the scamming occur on you/your business?

Table 4: The Year Scamming Occurred to the Business

Participants Response Codes


Participant 1 “Scam… bago mag pandemic” Before Pandemic
Participant 2 “Sikreto kasi pero nito lang, this This Year
year lang”
Participant 3 “Ilang taon? Ahh kailan ba parang Recently
mga 3 weeks? Three months
palang? Oo three months, month
of ano month of march ganun”
Participant 4 ‘Nito lang 2023, last month lang” 2023
Participant 5 “Parang ngayong taon lang ata Last year
mga december”

ANALYSIS

The most noticeable attitude of the participants is being controversial. These

owners tend to discuss the topic in public to avoid widespread specially on the year or

when the scamming occurred. The provided years are crucial part of their bad histories.

First thing to breakdown is that majority of the year are alarming since most of it

happened recently, this year and months ago. One response declared that scamming

occurred before pandemic which is not the era of e-commerce. This means that as the

technology grows, fraudsters continue to take advantage of it which also cause an

unexpected turn of events.

EVIDENCE

“The current trend that we are seeing infers that the increase of cases in scam

would most likely continue beyond pandemic” are the exact statement which is directly

stated by Melivo on the year of 2021, and will be the biggest evidence to support this

table.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 32
Interview Question 5: How do the emergence of e-wallet brought convenience or

inconvenience to your enterprise?

Table 5: The Consequence that the Emergence of E-wallet Brought

Participants Response Codes


Participant 1 “Para sa mga paymaya user Difficult
nahirapan kami syempre kasi
yung paymaya namin bumagsak”
Participant 2 “Malaking tulong kasi maraming Convenient
nagpapa gcash may kita naman
diyan kahit paano”
Participant 3 “Every day kumikita ako nun Profitable
parang five hundred a day, one
thousand a day, malaki”
Participant 4 ‘Madali ang transaksyon” Simple
Participant 5 “Nakatulong siya kasi ano kapag Interest
may nagpapa gcash may charge
din yon kaya kumikita rin”

ANALYSIS

The emergence of e-wallet throughout the world brings a lot of benefit such as the

convenience and most of the app being accessible. The response of the participants gives

this statement a support as business can be implemented by just having it. As an example,

G-cash, which are already prevalent are almost at every store

A participant elaborated the e-commerce brings convenience as it popular and

customers often do transaction with it, in addition it is most likely profitable as there is

something called interest for every cash in or cash out. It is also stated that transaction is

easier with the use of e-wallet or, gcash specifically. But of course, there is also some

drawbacks, as stated in the table above it is difficult for the reason of having less customer

for paymaya users.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 33
EVIDENCE

The popularity of electronic wallet is divided by its effect, the benefits and risks.

Depending on the user’s satisfaction, risk perception has a positive effect such as being

aware. Meanwhile, although it is called benefits this has a significant negative impact for

a reason of poor decisions (Foster, Hurriyati and Johansyah, 2022).

Interview Question 6: Were you able to identify the strategies used by the fraudster?

Table 6: The Strategies Used by the Fraudsters

Participants Response Codes


Participant 1 “Hindi, hindi rin naming alam” Unidentified
Participant 2 “Yung isang lalaki nag cash in ng OTP
three hundred nga tapos maya-
maya kunyari pinicturan niya,
siguro nung pinipicturan niya
nakita niya yung OTP”
Participant 3 “Cellphone ng kaibigan ko Unknown Identity
ginamit niya, ayun tinry niya kunin
yung loob ko na magpadala ka
sakin mag send ka”
Participant 4 “Halimbawa paymaya, yung ang Mysterious Number
nakalagay sa message, pero ang
kanila number lang”
Participant 5 “Dalawang beses siya nagpacash Multiple Transaction
out, dumoble yung bigay sakanya
ng ilang beses”

ANALYSIS

The strategies used by scammers are often hard to identify and that what makes

scamming trickier but with the data gathered from the participants, the study was able to

identify some the strategies. The most common among the responses is regarding the

OTP or also known as one-time password, once leaked getting scam is close to being

unavoidable.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 34
Unknown identity and identity theft is used to trick family members or friends of the

victim, which are also connected to mysterious number strategy this strategy attracts their

victims through giving assurance, easy money, and etc. but the main point is their text or

messages are distinct on actual legal company or corporation by means of using random

numbers. Even with all that information there were still some that can’t identify the strategy

used on them that just means that fraudster continue to develop their skill.

EVIDENCE

Online scams occur in various ways, phishing websites, mysterious calls and

messages, technology support which are all fakes and, last by threats. Stealing is one way

as well some examples are OTP or password credential thefts and even identity theft.

(NortonLifeLock, 2021).

Interview Question 7: What measurements did you do to avoid the fraud scheme?

Table 7: The Measurements Participants do to Avoid the Fraud Schemes

Participants Response Codes


Participant 1 “Huwag ibigay ang OTP yan ang Avoid
kauna-unahan”
Participant 2 “Tsaka yung pag minsan may nag Deletion
tetext pa rin ng OTP, binubura
naming agad”
Participant 3 “Ahh, hindi na ako nakikipag Less Entertainment
entertain sa mga tao kapag hindi
ko kilala”
Participant 4 ‘Sisiguraduhin niyo kung legit Legitimacy
yung number nila”

Participant 5 “Sinesend ko kay mama, Confirmation


tinatawagan ko muna siya kung
may nag send sakanya”

ANALYSIS
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 35

To prevent the scamming to happen, the participants take measures by confirming

the legitimacy of the transactions that will happen in the business and also by raising the

confidentiality by deleting one-time pins once it is confirmed. The participants also advised

to lessen the entertainment especially to those people who seem 'sketchy'.

Participants double check before confirming the transaction, it is also answered

that don't entertain customers as much as it could be a scheme. The participant suggested

to be more knowledgeable with legit numbers that sends OTP or confirmation messages.

EVIDENCE

Internet fraud is defined as any scheme using more than one element of the

internet, e.g. online chat, mail or web site to make fake requests, perform fraudulent

transactions and transfer funds obtained through fraud (NC State University, 2023).

Interview Question 8: How do you think can the scamming be avoided, especially for

those who wanted to start a business?

Table 8: The Opinions on how can Scamming be Avoided

Participants Response Codes


Participant 1 “Mahirap maiwasan kasi ang Unpredictable
scammer ano nandyan lang di
mo alam kung sino”
Participant 2 “Mag ingat nalang sila, hindi mo Appearance
naman makukutuban na hindi sila
ganon gagawa ng masama kasi
sa itsura nila hindi naman ganun”
Participant 3 “Wag silang mag entertain ng Doubts
hindi nila kakilala, pag meron
kang doubts sa tao sundin mo”
Participant 4 ‘Kapag magsisimula, mag Research
research sila”
Participant 5 “Mas maayos din na maglagay CCTV
sila ng katulad ng CCTV”
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 36
ANALYSIS

Base on Table 8, the participants advised that scamming is really unpredictable as

that the scammers appear and seem normal and friendly customer. The participants also

advise to trust intuitions. In addition to that, the participants suggest to do research before

starting a business and to increase privacy measures by installing CCTV Cameras.

According to the participants responses, to avoid being a victim of scamming, as a new

into business, do research about handling certain happenings and how to prevent the

scamming.

The participants also suggest to install a CCTV Camera as it will be helpful when

determining customers that comes in and out. Scamming is unpredictable as the

scammers seem and act as a normal customer at first and then lure the owner into the

schemes for the scammers to trick the victim and take advantage of the owner and

business.

EVIDENCE

As consumers have become more willing to use peer to peer applications on a

regular basis, scampers are adapting their tactics for exploiting the quick and often

anonymous availability of cash they provide. Their ease and convenience appeal to

consumers, but their general lack of user protection is the reason why fraudsters have

been attracted to them (State of Michigan, 2023).

Interview Question 9: How did the scamming affect your business, you as a business

owner?

Table 9: The Effect of Scamming in the Business and to the Owner


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 37

Participants Response Codes


Participant 1 “Syempre mahirap, ang hirap Burdening
kaya kitain ng pera”
Participant 2 “Malaking epekto sami yon. Pero Mindset
ang ano nalang namin kikitain din
naming yon ganon nalang
mindset namin”
Participant 3 “Trauma, na trauma ako kasi Trauma
siguro Malaki yung ano sakin”
Participant 4 ‘Malaki, syempre nawala yung Big Loss
budget niya”
Participant 5 “Yung parang kada ano mo Confusion
tatawag na ako kay mama,
nakakalito rin syempre”

ANALYSIS

Based on the research conducted, most of the participants had different

experiences. Researchers found out that the participants had a heavy feeling, like having

generous feelings because of the money lost, a mindset that can be used in the next

transaction, trauma, a big loss, and confusion due to not knowing what to do. These

circumstances can lead to having anxiety or even having an option to giving up own

business

According to the participants, it is mentioned that all felt was difficulties as well as

heavy feelings because of the money had lost; secondly, it was a state of mind of being

more careful so that would not experience being scammed again; third, one experienced

trauma because of the huge amount of money that was taken from the person. The event

that takes place also take a big toll on victims’ psychological health.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 38
EVIDENCE

Scams are fraudulent practices intended to trick unwary victims into handing over

their hard-earned cash or personal information. Scams may have terrible emotional and

financial consequences. "The Emotional Impact of Scams: What Victims Experience"

(Freedman, 2019) explores the effects of scams on people and society.

Interview Question 10: Why did these scammers choose you as their target, Is there a

specific reason?

Table 10: Speculated Reason Why These Participants is Chosen as a Target

Participants Response Codes


Participant 1 “Shunga kami nung una pero Unwise
ngayon tandan na, lesson
learned”
Participant 2 “Siguro akala nila malaki yung Store Size
tindahan namin”
Participant 3 “Ahh kasi nga nakita niya siguro Perceived
sa aming text, yung aming
conversation ng kaibigan ko”
Participant 4 ‘May ano ahh, tawag dito… sa Credibility
una mayroon silang totoong
sinasabi”
Participant 5 “Hindi ko rin alam kasi nga ano Clueless
tropa siya ng kuya ko”

ANALYSIS

Many of today's scammers are clever, scammers use techniques, strategies and

tactics to trick the brains of electronic wallet users just like cash, and target those with

large sums of money inside their electronic wallets. The speculated reasons behind the

committed crimes were identified by most of the participants and was able to state some

of the strategies as well.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 39
The participants share how the cheating happened and what was the reason why

the victims were chosen to be cheated by these scammers. One said cheating occurred

because of being unwise. The other respond that their store size is their reason to be

cheated, the other was perceived or the leakage of important because the unknown

scammer saw the conversation. One is credibility, were able to be fooled because of the

good things and promises the scammer stated. The last one is clueless as the event was

extremely unexpected since the man behind the scheme is someone known.

EVIDENCE

The electronic wallet is revolutionary, but it also has drawbacks. Although the

security of digital wallets is quite strong, there is still a chance of fraud. From the

perspective of the consumer, digital wallet transactions are somewhat riskier than credit

card transactions since they may not be protected by the consumer protections offered by

banks for credit card transactions (Conn, 2022).


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 40

Corollary Question 2: What themes emerged from the testimonies of the

participants?

As shown in the figure 2, There are total of eight (8) themes that emerge. The

themes are:

Figure 2. Graphical Representation of Themes that emerged


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 41
According to the results collected from the data, the researchers divided the data

by categories, which are called themes. This portion of the study answers the corollary

question no. 2 which is; the themes that emerge from the testimonies of the participants.

The categories will be discussed further below.

The researchers used the title 'Year, Duration and Occurrence' to show the dates

given by the participants as their response answering the questions of “How long have

they been running a business” and the year scamming occurred to their enterprise. The

researchers used 'Visible and Observable' as the title of the theme 'appearance' to array

the stores and businesses the participants own this theme also covers the appearance of

customers as well as scammer are described as unpredictable. The researchers titled the

theme 'Psychological Effects' to show how the scamming affected the participants and to

express how the participants feel towards the crime. The researchers also used 'Beneficial

Factors' as the title of theme that shows the advantage and convenience the electronic

wallet gave the participants.

Thematic Chart A
Theme 1: Year, Duration and Occurrence

Codes Short Transcription


Before pandemic “Ilang taon? Ahh kailan ba parang
This Year mga 3 weeks? Three months palang?
Recently Oo three months, month of ano month
2023 of march ganun”
Last Year
11 Years
2.5 Years
35 Years
1 Year
2 Years
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 42
The themes used in Table 11 are about the year, duration, and occurrences

because of the number of years or months participants started using g-cash as a business

to supplement their income. And g-cash also helped the participants since they started

doing business with electronic wallets. It is easy to commit fraud as it has been a year

since they used g-cash, and the scammers also thought that the participants were making

a lot of money.

For the evidence Influence of income on security concerns and comfortability using

e-wallet It is well documented that level of income influences the risk propensity of people.

People with higher incomes likely to take more risks than people with lower incomes

(Grable, 2000).

Thematic Chart B
Theme 2: Visible and Observable

Codes Short Transcription


Store “Siguro akala nila Malaki yung
Shop tindahan naming, marami kasing
Boutique bumibili nung time na yon, madami
Construction kasing bumibili dito pag hapon eh”
Physical Store
Appearance
Store Size

The themes used in Table 12 are visible and observable because that is the

scammer's way of victimizing the targets and how scammers are able to scam the

participants unconsciously or quickly, and how the scammers can quickly scam the

owners. Based on the status or appearance of the store because they are chosen by the

scammers to be foolish when it comes to the electronic wallet.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 43
To support the statement, Observability, IU, and ITR Choudrie et al. (2014) found

that observability played a key role in influencing usage intentions among people over 50

years of age but had no association among those under 50 years of age. We believed that

observability or visibility was a relevant measure in the present study for two reasons.

First, we targeted young adult smartphone users. Previous literature on new media has

shown that young adults are very much concerned with impression management (Dhir et

al., 2015).

Thematic Chart C
Theme 3: Psychological Effect

Codes Short Transcription


Confusion “Trauma, na trauma ako dahil siguro
Mindset Malaki yung ano sakin, sabi ko lord,
Trauma pwedeng ibalik niyo sakin sa ibang
Doubts paraan”
Perceived
Unwise
Avoid

The codes that were used in the Table 13 were: confusion, mindset, trauma,

doubts, perceived, unwise and avoid inclined more psychological as the scamming caused

trauma to the participant that affected the participant greatly in business. But that did not

hold the participant back but used it as a motivation to look for more blessing and

opportunities for the business to come.

As an Evidence, the psychological effects are damaging, leading to a sense of

helplessness and isolation. When being a victim of fraud leads to isolation, victims

internalize the traumatic experience and thus experience further feelings of loneliness,

which can even lead to future victimization (Castel, 2021).


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 44
Thematic Chart D
Theme 4: Undetermined

Codes Short Transcription


Clueless “Halimbawa sa paymaya, yun ang
Unidentified nakalagay sa message, pero ang
Unknown Identity kanila number lang”
Mysterious Number
Unpredictable

The codes used in the Table 14 are: clueless, unidentified, unknown identity,

mysterious number and unpredictable as the scammer scheme was to gain the

participant's trust before doing the crime. And that led the participant to be more confirming

with legitimate numbers and do greatly considers partnerships before agreeing.

Affinity Fraud: Scammers try to trick members of a group that has formed based

on a common characteristic such as age, ethnicity, or religion. To obtain trust from the

group leader and its members, scam artists behave as if they belong to a group. By

investing in the group leader, others are also going to invest (Skrmetti, 2022).

Thematic Chart E
Theme 5: Trouble Factors

Codes Short Transcription


Diffiult “Cellphone ng kaibigan ko ginamit
Big loss niya ayun tinry niya kunin loob ko na
Burdening magpadala ka sakin, mag send ka”

Table 15 consists of the troubles that the participants encountered while running

the business and after dealing with fraudsters. The effects of scams don’t automatically

vanish after the incident, this may cause lifetime burdens.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 45
There are some downsides to using digital wallets. By gaining unauthorized access

to account, hackers can steal money or make purchases using stored payment

information. The risk can be huge if users do not follow the best practices associated

(Yadav, 2022).

Thematic Chart F
Theme 6: Technological Terms

Codes Short Transcription


Paymaya “Yung isang lalaki ng cash in ng 300
Globe Tele. nga tapos maya-maya kunyari
Gcash pinicturan niya, siguro nung
Gcash Only pinipicturan niya nakita niya yung
Bank Transfer OTP”
OTP
CCTV

Theme 6 is labeled as technological terms which is categorized to clarify the words

used that are sometimes unidentified for the reason of only being used in certain fields

like Paymaya, Globe telecom, Gcash, Bank Transfer and OTP. Aside from CCTV all codes

from theme 6 are characterized or connected to electronic wallet.

A virtual or cashless service with the use of gadgets known as an electronic wallet

is used to replace actual currency or physical money (Abdullah & Redzuan, 2020).

Thematic Chart G
Theme 7: Process and Actions

Codes Short Transcription


Deletion “Tsaka yung pag minsan may nag
Confirmation tetext pa rin ng OTP, binubura naming
Research agad”
Less Entertainment
Multiple Transactions
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 46
The table named process and action, it can be either the action of scamming or

the measurements used to avoid getting scammed. As an example, stated in the short

transcription, text messages that contains important information should be hidden or

deleted immediately. To support this statement, According to T Kitching in 2001, The

biggest support that a business can get to make sure that scams is publicized to be used

as warning.

Thematic Chart H
Theme 8: Beneficial Factors

Codes Short Transcription


Simple “Malaking tulong kasi maraming
Profitable nagpapa gcash may kita naman diyan
Convenient kahit paano”
Legitimate
Interest
Credibility

Electronic wallets have a lot of benefits and the codes provided in table eighteen

(18) is categorized by the theme title of “Beneficial Factors”. It is described that the usage

of e-wallet brings benefits such as the app itself being profitable considering the interest

rate per transaction. It is also easier and much simpler to use pertaining to being

convenient as it does not require personal meet ups.

E-wallet help simplify the experience, reduce cost, and to clear fees that are

usually charged. It is also a great solution for those who need to send money from anyone

which is away (Skrill, 2022).


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 47
Chapter 5

CONSOLIDATED REFLECTION AND RECOMMENDATIONS

This chapter contain the reflection, conclusion and, recommendation of the

researchers based on the answers of the participants and based on the themes that

emerged.

Consolidated Conclusion and Reflections

The significant findings of the study were derived from the participants provides

through a semi-structured interviewing, this testimonies allows the themes to emerge and

provide structure to the conducted study. The selected participants provide their own

knowledge, experience and, perspective regarding the topic of electronic wallet scamming

that occur to their business.

There are exactly eight (8) accumulated emerging themes. The themes were Year

Duration and Occurrence, Visible and Observable, Psychological Effect,

Undetermined, Trouble Factors, Technological Terms, Process and Actions and

lastly Beneficial Factor.

First theme, which is titled Year, Duration and Occurrence refers to the data

gathered that includes the usage of years. The codes that this theme contains are due to

the interview question of “How long have you been running your business?” for the

duration. Duration of how long the business have been running is necessary to understand

whether the experience in business increases awareness to scamming even without

proper research and seminars. Second question is “What year did the scamming occur on

you/your business?” which is used to identify how the pandemic affects the incidents that

occurs and basing on the findings, the pandemic turns out to be one of the biggest factor
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 48

that affect the increase of scamming cases due to the emerging of trends that use gadgets

as medium of transaction as it is safe and it was implemented to avoid face to face meet

ups.

Visible and Observable as the second theme of the study where it shows the

variety of the businesses the participants own. This theme displayed the appearance of

both the store the participants own as it could be one of the factors that led the scammer

to execute the crime.

The theme titled undermined is used to show codes that has no strong foundations.

In short, this theme is representation of unknowingness. Let the codes give more

clarifications, first code is clueless, it is based on the response a victim has no idea why

their store is targeted. Unidentified, clear and transparent that the strategy used to defraud

the store remain unknown even to the owner himself but the Mysterious Identity and

Unknown number are strategy used by fraudsters. Mysterious Identity is a type of strategy

that use the advantage of not being known itself which allow the fraudster to explore the

information of targeted victim without being known. Determining the strategy used by scam

artist helps subsequent business owners to avoid being victim of same mistakes.

Technological terms are themes that categorize the unknown terms or terms that

are only used on certain field. The codes used are Gcash, Globe Tele., Bank Transfer

and, PayMaya which are all a type electronic wallet. Some like OTP is just a term used in

e-wallet also known as passwords. The theme highlighted the use of gadgets in business

which become a necessary part to run businesses like online shopping, this without a

doubt are truly convenient but disregarding the troubles and risks along with use of

technology causes the increase in cases of scam.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 49

In theme Trouble Factors, the participants conferred about the difficulties and

issues the crime had done in the business. The theme showed the effects in the business

after the crime. The participants also mentioned the burden of the losses the business

along with the owner experienced. To compensate to the last theme which is beneficial

factor, troubles are considered experience and lesson which leads these selected owners

to improve awareness and avoid more schemes.

In the theme Psychological Effects, it displayed the effects of the crime to the

participants psychologically. The participants disclosed the feelings and doubts the

unfortunate event had caused. The crime resulted the participants to experience emotional

distraught. This effect usually causes anxiety and depression, luckily the participants didn’t

give up on business after encountering terrible scenarios like scamming

The participants discussed the measurements and precautions that the business

and transactions do take to avoid and if possible, also to prevent the scamming to happen

in the theme Process and Actions. In this theme, the content also serves as suggestions

and advices on how to increase the privacy of each online transactions. Deleting OTP is

as one of the examples are simple step but by doing so, the risk of this password being

exposed is indeed impossible.

The last theme fall on the title Beneficial factors, as easy as it sounds this are the

benefits of using electronic wallet in business. The testimonies of participants share the

same idea of e-wallet being useful as a daily basis as it is pertained as convenient, simple

and, profitable. Despite being called beneficial, these benefits will soon turn into risk given

the fact the owners, customer and user continue to rely on the growing technology.
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 50

The researchers conclude that the themes that emerged are just fractions of the

emotional, physical and mental effect to the participants. Years and duration are used as

documentation that can be used in business forecasting. Scamming is an unpredictable

event based on the findings it is something that may or may not be perceived by depending

on appearance. In addition, scamming artists continue to polish their skills it can be either

technology and through hacking or communication skill that can be used to persuade. So

as an owner, determining the strategies used are absolutely necessary and if its

unidentifiable that just means there something more that this research can’t uncover.

Through measurement and preparations or themed by process and actions, such as

deleting OTP messages, confirming the validity of transaction, doing proper research and

background checking specially for those who are trying to start a business, and less

entertainment on those sketchy customers. Simple steps have significant impact whether

it is a step to improve or not. The themes claims that scamming has two factors, beneficial

and trouble since almost everything that has a big benefit has drawbacks. Troubles has

benefits as this allows the owners to be more aware and confidential. Lastly, even the

“benefits” has some drawback as well since relying on technology such as e-wallets to

much causes user to be independent.


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 51

Recommendations

1. To avoid Investment or Partnership Scams, do investigate thoroughly, this type of

scam tends to persuade victims by being credible at first so determine the

partnership to full extent and do not trust completely after a few transactions.

2. Gain knowledge into basic electronics or other online terminologies as it you'll gain

advantages once you do and they won't succeed so easily when committing a

crime.

3. Always keep and be confirmative and secretive with every receipt of transactions

as it can serve as an evidence or proof to either for your advantage or against the

scammer.

4. Do not rely to the convenience, simplicity and benefit of the growing technology as

it is perceived to be risky

5. Less entertainment on customer specifically on those unknown and someone

seems sketchy

6. Report the committed crime immediately


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 52
REFERENCES

Journals

Analytics, S. G. (2022, September 6). Why do people commit fraud –

fraud diamond. Salviol. https://www.salviol.com/post/fraud-diamond-theory

A novel method in scam detection and prevention using data mining approaches.

(n.d.). CORE Reader. https://core.ac.uk/reader/1667450

Article 1338. (2016, March 26). Obligations and Contracts.

https://lspuoblicon2015.wordpress.com/2016/03/25/article-1338/

Biemel, Walter and Spiegelberg, Herbert. "phenomenology". Encyclopedia Britannica, 14

Apr. 2023, https://www.britannica.com/topic/phenomenology. Accessed 11 May

2023.

Bournemouth University Research Online [BURO] -

Social Media, Online Shopping Activities and Perceived Risks in

Malaysia. (n.d.). https://eprints.bournemouth.ac.uk/29404/

Foster, B., Hurriyati, R., & Johansyah, M. D. (2022). The Effect of Product Knowledge,

Perceived Benefits, and Perceptions of Risk on Indonesian Student Decisions to

Use E-Wallets for Warunk Upnormal. Sustainability, 14(11), 6475.

https://doi.org/10.3390/su14116475

George, T. (2022). Semi-Structured Interview | Definition, Guide & Examples. Scribbr.

https://www.scribbr.com/methodology/semi-structured-interview/

Hirei, H. M. (2020). Investigating and Validating Scam Triggers: A Case Study of a

Craigslist Website. CORE. https://core.ac.uk/works/116972631?


SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 53
H, L. (2023). How to do thematic analysis — Delve.

Delve. https://delvetool.com/blog/thematicanalysi

Langenderfer, J., & Shimp, T. A. (2001). Consumer vulnerability to scams, swindles,

and fraud: A new theory of visceral influences on persuasion.

Psychology & Marketing, 18(7), 763–783. https://doi.org/10.1002/mar.1029

Keep an eye out for Norton email scams. (2022, January 11). NortonLifeLock Blogs.

https://www.nortonlifelock.com/blogs/feature-stories/fraudulent-use-

nortonlifelock-brand

Online Scams | Avoiding Internet Scams | Norton. (n.d.).

https://uk.norton.com/blog/online-scams

Rimghandour, & Rimghandour. (2023). Could Digital Wallets be the New ‘Normal’? -

Purpl. Purpl. https://purplme.com/blog/payments/could-digital-wallets-be-the-

new-normal/

Sakas, D. P., Kamperos, I. D. G., Reklitis, D. P., Giannakopoulos, N. N., Nasiopoulos, D.

K., Terzi, M. C., & Kanellos, N. (2022). The Effectiveness of Centralized Payment

Network Advertisements on Digital Branding during the COVID-19

Crisis. Sustainability, 14(6), 3616. https://doi.org/10.3390/su14063616

Unit, C. S. (n.d.). Common Types of Internet Fraud Scams.

https://acg.pnp.gov.ph/main/cyber-security-bulletin/2-uncategorised/172-

common-types-of-internet-fraud-scams.html

News Article

Agcaoili, L. (2021, September 1). Public warned of increasing online fraud. Philstar.com.

https://www.philstar.com/business/2021/09/02/2124166/public-warned-

increasing-online-fraud
SINALHAN INTEGRATED HIGH SCHOOL
SINALHAN SOCIETY OF EFFECTIVE AND EFFICIENT RESEARCHERS 54
Dantes, C. (2021, September 24). Emoney, digital wallet:

The new normal for commerce - Manila Standard. Manila Standard.

https://manilastandard.net/spotlight/navigating-through-a-digital-pandemic-

world/365756/emoney-digital-wallet-the-new-normal-for-commerce.html

Thesis

Abdullah, N. (2020). E-wallet: factors influencing user acceptance towards cashless

society in Malaysia among public universities.

https://www.semanticscholar.org/paper/E-wallet%3A-factors-influencing-user-

acceptance-in-AbdullahRedzuan/b7d1263f73a32d188c15bc1589fcb843bb221ffe

Firend, A. (2017b). Social Media, Online Shopping Activities and Perceived Risks

in Malaysia. CORE. https:// core.ac.uk/works/8127884

Parti, K. (2022, November 1). “Elder Scam” Risk Profiles: Individual and Situational

Factors of Younger and Older Age Groups’ Fraud Victimization.

You might also like