Effects of Criminology Student's Social Media Exposure On Crime
Effects of Criminology Student's Social Media Exposure On Crime
Effects of Criminology Student's Social Media Exposure On Crime
Gh
In Partial Fulfillment
by
Month Year
ii
TABLE OF CONTENTS
Page
TITLE PAGE ………………….………………..……………… i
INTRODUCTION ………….………………………………………………… 1
Design ……………………….…………………… 16
Environment ……………………….…………………… 16
Participants ………………………….………………… 17
Instrument(s)/Sources of Data………………………..………………. 18
Procedures …………………………….……………… 20
REFERENCES ……………………………….…………… 56
APPENDICES
iii
Table Page
Figure
INTRODUCTION
The digital age has significantly changed people's way of living. Everybody is
connected with each other through the vast network of the Internet. People can now
easily access a vast amounts of information through various media at the touch of a
finger. Social media, the game changer of the twenty-first century, is currently the
most popular and influential force in the technology era because it makes it simple to
connect with individuals and share information with them. Through the use of
status, race, or age, but it also offers pleasure and excitement through a variety of
activities that provide audio, text, and video sharing. While having access to so much
awareness of its effects, influences how we as a society see ourselves and one
another.
In the Philippines, social media is already a part of Filipino cyber culture. Power to the
people wave-3 (2008) declared that 83% of the Filipinos are members of a social
network. In 2021, the Philippines ranked first with the highest social media usage
rate. The country’s average daily use was over four hours, which is 60% higher than
normal (Caparas, 2023). It is for this reason that Philippines has been tagged as the
Social Networking Capital of the world due to popularity of social media sites as it is
mostly used in education, election campaign material, media to propaganda and one
In the academic world, the students and teachers used social media to exchange
The Mater Dei College students pursuing criminology find the usage of the internet to
be very important. With the advent of technology, the future Criminology students
enabled to investigate and analyze crime better. It is through the tool of social media
gathering. Social media can be used for a variety of purposes in criminology. It can
be a powerful tool for identifying and tracking individuals who are involved in criminal
activity. Additionally, social media can be utilised by law enforcement to track for
information about potential suspects and to keep track of criminal activities and local
trends. Social media can also be used to enhance community involvement in efforts
to reduce crime and to increase the public's awareness of crime prevention. Even
today, a large number of law enforcement agencies analyse crime trends, locate
suspects, and keep track on criminal activity using sophisticated tools. The tool can
assist in the speedy identification of trends and patterns in criminal activity and
has also aided law enforcement in better understanding the motives of criminals and
3
determining the most effective deterrent methods. Researchers may now more easily
Social media also has its downside. In some cases, it can also be addictive and lead
news, which can lead to division and violence. In addition, terrorists and criminals
have used it to organise and carry out crimes. Social media has thus turned into a
haven for criminals, which has led to an increase in the number of crimes committed
online. As social media sites have even become hotbeds for crime and are increasing
day by day in all societies in the world, this can be used to both make crime and
major challenges law enforcement faces with social media. Just as law enforcement
can use social media as a tool to track down criminals, criminals can use it as a tool
to track potential targets. Social media is largely about sharing the details of one’s life
with a group of friends and relatives. The problem is that people often share far
too much detail about their lives, unaware of who might be reading outside of
their intended audience. Criminals can use this to gain a wealth of information about
a potential target, from addresses and work habits to the daily schedule
crimes. One general challenge facing law enforcement and to the future
Criminologists with this issue is the constant evolution of social media. In this
such as facial recognition and biometric analysis, which can identify and track
criminals. On the other hand, just as law enforcement officials have to constantly
adapt to dangerous, new synthetic drugs, they will also have to adapt to changes in
social media. Criminals will always try to be a step ahead, and law enforcement will
Furthermore, the researcher's main purpose of the study is to determine the effects of
and, age; the types of media the participants use; the role of social media in
students in terms of - Feeling safe and Fears about crime; and to propose
Theoretical Background
Theories/Theory
media exposure and crime from three main perspectives, notably: (i) a Wound
Culture Theory (WCT) if social media penetration positively affects crime; (ii) social
penetration reduces crime and (iii) irrespective of the direction of effect (i.e. whether
Wound Culture Theory can be used to elicit some negative socio-economic signals
such as crimes, political instability and violence. The WCT was developed by Mark
" Serial killing has its place in a public culture in which addictive violence has become not
merely a collective spectacle but one of the crucial sites where private desire and
public fantasy cross. The convening of the public around scenes of violence–the rushing to
the scene of the accident, the milling around the point of impact–has come to make up a
wound culture; the public fascination with torn and open bodies and torn and open
persons, a collective gathering around shock, trauma, and the wound” (p.19).
According to the WCT, the desire to inflict harm on humans in society is both
literal (via mutilation) and figuration (via criticism). The relevance of crime is
appreciation: “One discovers again and again the excitations in the opening of
private and bodily and psychic interiors; the exhibition and witnessing, the
wound culture, the very notion of sociality is bound to the excitations of the torn
and open body, the torn and exposed individual, as public spectacle” (Seltzer,
p. 137). The author has further observed that the wound theory has
imagining and situating our notions of public, social, and collective identity
(Seltzer, p.21)”. Social media can be used to fuel the wound culture because it
them. In the latter scenario, conflict management and social control models are
more relevant.
(CMM) of Thomas-Kilman (1992) and the Social Control Theory (SCT) of Black
(1990). The SCT maintains that relationships between organisations, groups and
individuals typically affect the exercise of one among five fundamental channels of
negotiation. Conversely, the CMM argues that strategic ambitions that are very
theoretical insights are broadly in line with the conflict management literature
( Asongu and Kodila-Tedika, 2017). Social media provides the platforms which
underpin the conflict management and social control theories herein discussed.
7
models are dominated by three principal theories which justify the adoption and
use of specific types of communication tools. They are: (i) the: theory of reasoned
action (TRA), (ii) theory of planned behavior (TPB) and (iii) technology acceptance
model (TAM). Consistent with the TRA, the underpinning hypothesis is that,
when the acknowledgement of actions come into play, customers display rational
features (Bagozzi, 1982). Given the context of the study, these rational traits could
motivate new ideas, notably: either to the resolution of conflicts or in the perception
of the ramifications of their actions and those that are lacking in this
Concerning the TAM, the principal driver behind a customer’s motivation to adopt
a specific technology is traceable to preferences and the will of a client to adopt and
paragraphs, are also relevant to the positioning of this study because: (i)
social media exposure entails the adoption and usage of a specific type of social
media (which is consistent with technology acceptance models) and (ii) social
media can either be used to fuel or deter crime. On the one hand, the use of
social media to fuel crime is consistent with Wound Culture Theory while the use
of the social media to mitigate crime is in line with the Social Control Theory
and the Conflict Management Model. On the other, the common features
TRA, TPB and TAM articulate the perspective that the use and adoption of
namely: (i) the formation of customer belief and (ii) the composite elements
what follows, these common features are contextualised. Within the specific
context of this study; (i) the utilitarian view is apparent when a social media
crime; (ii) with regard to the behavioural view, even in a scenario where
personal motivation is not apparent, an individual can still take the decision to
use social media if he/she already has some degree of awareness that
instigation by means of social media and (iv) the importance of belief formation in a
social media can either be used to prevent crime or instrumented to fuel crime.
In the light of the above concepts, the decision by an individual to adopt social
individual) and systemic (or social) factors as well as the potential advantages of
using the social media platform to realise his/her crime-related objective. The
Legal Bases
The following articles were carefully reviewed and considered by the researchers to
increase the reliability of this study. This study was conducted on the following
grounds.
Science and Technology are the essential for national development and progress.
The state shall give priority to research and development, invention, innovation, and
their utilization, and to science technology education, training and services. It shall
capabilities, and their application to the countries productive system and national
life.
In connection with this, the state shall give support all those people or organization
who were utilizing sources of information and with the use of social media platforms
to gather information in the legal processes used for studying the effects of social
information in a legal way would contribute to the country's criminal justice system.
Further, the article`s statement above served as the basis of the researchers in
opportunity for them to enhance their skills and abilities in their course.
The prime duty of the Government is to serve and protect the people. The
Government may call upon the people to defend the State and, in the fulfillment
thereof, all citizens may be required, under conditions provided by law, to render
Thus, the government should strengthen the safety regulatory system in the country
to protect the people from crimes. This also led for the researchers to conduct a
study since Criminology students will soon become a law enforcement agents. By
helping society understand crimes and what leads to them, criminologists enable the
design of safer societies. Criminologists also help identify when crimes are because
These related literature are based on different studies that tackle the effects on
the use of social media on crime towards Criminology students. A thematic analysis
of the related literature yielded two (2) topics: Prevention of crime or feeling safe and
Social media platforms allow people to transform the communication and interaction
media has spread its wings to various other fields and education is one of the new
sectors where the concept of social media is making a great role (Anonymous,
2014). They are communication channels or tools used to store, aggregate, share,
discuss or deliver information with friends and colleagues using the internet
(Reynolds, 2015). They involve the use of web-based technologies to transform one-
and exchange of user-made content. At school or in any office, social media used by
students and teachers to share original content the articles or the publications.
questions they may have related to their course. Thus, the use of social media has
increase in the number of the users of these social media platforms worldwide,
12
criminal opportunities also arises (Reyns et al., 2011). Not only does the Internet
allow individuals to connect with others, it also gives people the opportunity for non-
collocated and non-face-to-face interaction (Bossler & Holt, 2009). Arguably, the
social media has altered how people communicate and connect so much so that it
has modified routines and lifestyles (Bossler & Holt, 2009; Bossler et al., 2012).
With the increasing sophistication and improved integration of social media have
with their communities in innovative new ways. Social media could bring awareness
and prevention of crime as a helpful tool especially for law enforcement and to the
Criminology students in their course. According to the IACP media survey, social
networking is the most popular social media platform used within the law
they currently have a social media page and websites. This platforms (especially
Facebook) is popular with crime prevention units, which can easily—and for no
setup cost—create a page where “fans” can read the latest news, post comments,
agencies interviewed now use social media. However, while 62 percent report using
acknowledge using social media for crime prevention. Many experts believe the
social media sphere holds enormous potential for law enforcement crime prevention
units and groups such as Neighborhood Watch. According to the National Crime
cuts and the struggling economy keeping us at home more often, embracing online
networks as prevention tools may help us form a deeper connection with our
However, social media has also paved the way and provided a space for new forms
to mention a few. These activities occur in the various functionalities of the Internet,
and social media sites such are not exempt (Reyns et al., 2012). One the one hand,
dimension to crime or symbols associated with it (e.g., Ferraro & LaGrange, 1987).
Other authors (e.g., Gabriel & Greve, 2003; Madriz, 1997) interpret fear of crime as
emotional one (fear of crime in the strict sense), the cognitive (perceived risk of
behaviors).
crime or to symbols that a person associates with crime” (Ferraro 1995, p. 4). This
includes a set of various emotions towards the possibility of victimization (fear, worry
about crime (Ferraro & LaGrange, 1987). Furthermore, even as a result of cognitive
there are at least two likely reactions when people believe that crime is a problem.
Naturally, one reaction is fear, and another is restrictive behavior - which implies
adjustments to routine activities, apparently to reduce this same risk (Ferraro, 1996;
Miethe, 1995). The behavioral dimension of fear manifests in the frequency with
which individuals fortify their homes against possible invasion, avoid contact with
certain people or use self-defense arms (Guedes et al., 2018). These behaviors
have been aggregated in different categories, namely the avoidance, protective and
defensive.
understood as an expressive fear. Here, fear is built through the knowledge and
characteristics appear in the literature, which basically include gender and age (e.g.,
Pain, 2001; Rader et al., 2007). People may feel especially vulnerable to the risk of
15
crime because they are likely to be targets of victimization, because they feel that
the impact of crime would be particularly serious and also, they are unable to control
whether or not crime occurs (Farrall et al., 2007). Some individuals may associate a
type of crime with particularly serious consequences, since they feel particularly
vulnerable to the criminal event (Warr, 1987). We can distinguish, on one hand, the
personal competence in the case of aggression, which is often used to explain the
increased fear of crime levels especially among women. On the other hand, social
vulnerability is influenced by the social media and access to material and social
Overall, the rise of social media and technology has had a major impact on
criminology students of Mater Dei College as the place and respondents of the
study.
Synthesis
The specified articles upheld by a number of related studies and authors which
served as the grapples in tending to the problem of the study. Social media has
revolutionized the way that Criminology is studied and addressed. These provided
16
discussions and edification in determining and analyzing the effects of social media
THE PROBLEM
1.1. Gender
1.2. Age
3. What are the role of social media in criminology students in terms of?
4. What are the effects of social media on crime towards criminology students
in terms of?
behaviors).
crime?
Research Hypotheses
In the conduct of this study, the following research hypotheses are proposed:
Criminology students.
🩷🩷🩷🩷🩷🩷🩷🩷🩷🩷🩷🩷
The Government. This study could become a base to enact a new law that will
regulate or minimize the media contents that contributes to the fear of crime and
anxiety of the respondents . Law Enforcement Agency. The results of this study could
inform the law enforcers to be more attentive towards the students and provide
crime. Criminology Students. This study can provide remedy towards their problem
which is the goal of this research. The parents/guardians of the Criminology students.
18
Through this study, the parents will be more attentive towards the safety of their
children and in that way constant check ups from parents will be made that can make
the students feel at ease and lessen their fear and anxiety on crime. This study will
also be significant to the future researchers, this will serve as a basis for further
RESEARCH METHODOLOGY
Design
Fear of Crime, and Social Interaction Anxiety (Genea Shoulders). The researchers
relationship of media exposure and crime. The data gathered are used to determine
the level of media usage and the level of crime and fear of crime of the MDC
Criminology students and will be analyze and explain the relationship between the
Environment
This study will be conducted in the private institution of Mater Dei College
the study of the said institution since it is accessible for the researchers to
communicate with the Criminology students of the institution about the effects of their
Participants
The participants of the study were the parents and teachers of primary grades
chose these participants since students are more exposed to media and it will be
relevant to our study. They can also provide the necessary information that the
Instrument(s)/Sources of Data (This is a sample only but you may use this pattern.)
The instrument that will be utilized to collect the data in this study is a
standardized questionnaire that is composed of three parts. The first part is using the
media and technology usage scale. The second part is using the crime and fear of
crime scale. The last part is the respondents screening questions. The 1 st and 2nd part
of the questionnaires will be answered using a 4-point rating scale and the last part
with yes or no. The parameters used in this standardized questionnaire are as
follows:
all
A letter will be sent to the World Health Organization on the use of this
questionnaire once it will be approved for data gathering during the research proposal
hearing. Lastly, the third part is from the standardized questionnaire called the short
Minnesota that is composed of 20 questions. The original version of the MSQ was
100-item long designed by Dr. Weiss in 1967. The 20-item MSQ contains two factors
10, 11, 15, 16, and 20 ask for intrinsic job satisfaction while questions 5, 6, 12, 13,
14, 17, 18, and 19 for extrinsic job satisfaction. This short-form uses the same
response categories in the 1977 long form that contains the following parameters:
The Chinese translation of this questionnaire was used lately in the study on
al. (2020). The short form of MSQ had been used in several researches already since
22
it has been found to be stable over time with excellent coefficient alpha values from
satisfaction (Martins & Proenca, 2012). MSQ is now declared to be free of charge
and can be used without written consent provided due acknowledgment will be given
(University of Minnesota, 2021). However, a letter asking permission for its use in this
Procedures
Gathering of Data
data for the study. This questionnaire will be presented, analyzed, and checked to
assure the validity of responses it would elicit. However, before distributing the
questionnaire, the researchers will send first a letter for approval to the College of
Criminal Justice Dean Mr. Avelino Lofranco, MSCJ for the approval of questionnaire
administration. After the approval, the researchers will ask permission from the
participants and have the informed consent secured. With this, we will also inform the
participants that the information they provide will be secured and will not be divulged
publicly. We will also ask the participants to actively, honestly, and religiously answer
the questionnaire. Then, the researchers will proceed to the distribution of the printed
23
the questionnaire to gather the data and use it in tabulation, interpretation, and
analysis.
from the writing of the letters to the Dean and the Heads of Office(s) concerned
where the research participants are located to ask for their permission towards how
the study. This section also describes how the research participants will participate
in the research study. This will conclude with how the Data Privacy Act of 2012 or
Republic Act 10173 will be ensured for the research participants. This section may
…………………………………………………………………………………………………]
Treatment of Data (This is a sample from a study not using mixed methods)
The statistical tools that will be utilized are the frequencies, percentages,
Pearson Product Moment Correlation. The frequencies and percentages will be used
to analyse the demographic profile of the participants. The weighted mean will be
used to compute for the categories of and the overall health-related quality of life and
the job satisfaction of the participants. The analysis on the significance of the
according to profile will utilize the independent t-test for sex and one-way ANOVA for
age, educational attainment, frontliner type, and the number of months working as
24
the health-related quality of life and the job satisfaction of the participants will be
DEFINITION OF TERMS
Social Media – Are the respondents used for their academic performance, an
Crime – Is any action or omission that constitutes an offense that may be prosecuted
Chapter 1 will present the first chapter with the title The Problem and Its
Scope. The Introduction section of the study contains the Rationale of the Study, the
the study, the legal bases, the review of related literature, and the review of related
studies. The Problem section contains the Statement of the Problem, Research
Hypothesis(es) when necessary, and the Significance of the Study. The Research
and Other Sources of Data and the Procedures which presents Gathering of Data
This chapter will contain the results and discussion. The first part will present the
profile of the research participants. The second part will discuss their health-related
quality of life based on their profile. The third part will deal with their job satisfaction
based on their profile. The last part will be the analysis and interpretation the
significant differences of these two variables according to their profile and how these
Recommendations of the Study. The Summary section will highlight the ….. The
Findings will emphasize the …… The Conclusion will present the answer of the main
problem of the study. Recommendations to be given will be based upon the findings
of the study.
Appendices include the letters to the Dean, the [Head of Office of the company
or agency of the respondents, if any], and the research participants with the Informed
Consent Form of the participants in Appendix A. The vernacular of each of the letters
to the participants and of the Informed Consent Form also belongs to Appendix A.
discussion/ observation guide] as research tool(s) together with its vernacular, [when
such as the communication(s) from the researcher(s) asking permission for the use of
the standardized [Write the name of the research instrument.], and from its author
granting its use. Appendix D contains the computational or statistical runs or outputs,
REFERENCES
https://www.bartleby.com/topics/Media-Influence-Essay
Ray, S. (2016). How social media is changing the way people commit crimes
https://eprints.lse.ac.uk/65465/
28
Guerrini, C. J., Wickenheiser, R. A., Bettinger, B., McGuire, A. L., & Fullerton, S. M.
https://academic.oup.com/jlb/article-pdf/doi/10.1093/jlb/lsab001/37352563/
lsab001.pdf
Srivastava, A., Harshey, A., Das, T., Kumar, A., Yadav, M. M., & Shrivastava, P.
https://link.springer.com/article/10.1186/s41935-022-00309-y
Butler, J. M. (2023). Recent advances in forensic biology and forensic DNA typing:
https://www.sciencedirect.com/science/article/pii/S2589871X22000961
INSIDE: OBA Diversity Award Winners Announced• Annual Meeting New Lawyers
https://www.okbar.org/wp-content/uploads/2022/10/Nov-OBJ-22.pdf#page=42
Appendix A1
[Date]
Sir/Madam:
Greetings!
We are presently working on our research study with the title [ENCODE THE TITLE
OF YOUR RESEARCH PAPER IN FULL CAPS AND BOLD]. The purpose of this research
30
is to [encode the purpose or main objective of your research here]. In this connection, we
would like to ask permission from your office that to conduct this study.
Your favorable consideration and approval to this request are very much appreciated.
Thank you very much and God bless us all!
Sincerely yours,
[RESEARCHER 1 COMPLETE NAME & Sig.] [RESEARCHER 2 COMPLETE NAME & Sig.]
[Course & Year] Student [Course & Year] Student
[RESEARCHER 3 COMPLETE NAME & Sig.] [RESEARCHER 4 COMPLETE NAME & Sig.]
[Course & Year] Student [Course & Year] Student
[RESEARCHER 5 COMPLETE NAME & Sig.] [RESEARCHER 6 COMPLETE NAME & Sig.]
[Course & Year] Student [Course & Year] Student
Noted:
Approved:
Appendix A2
[Date]
Dear ___________:
Greetings!
We are presently working on our research study with the title [ENCODE THE TITLE OF
YOUR RESEARCH PAPER IN FULL CAPS AND BOLD]. The purpose of this research is to
[encode the purpose or main objective of your research here]. In this connection, we would like to
31
ask permission from your office that to conduct this study in your [State here if municipality or
barangay, or office, etc.].
Your favorable consideration and approval to this request are very much appreciated.
Thank you very much and God bless us all!
Sincerely yours,
[RESEARCHER 1 COMPLETE NAME & Sig.] [RESEARCHER 2 COMPLETE NAME & Sig.]
[Course & Year] Student [Course & Year] Student
[RESEARCHER 3 COMPLETE NAME & Sig.] [RESEARCHER 4 COMPLETE NAME & Sig.]
[Course & Year] Student [Course & Year] Student
[RESEARCHER 5 COMPLETE NAME & Sig.] [RESEARCHER 6 COMPLETE NAME & Sig.]
[Course & Year] Student [Course & Year] Student
Attested:
Approved:
[Date]
Dear Sir/Madam,
Good Day!
We are presently working on our research study with the title [ENCODE THE TITLE
OF YOUR RESEARCH PAPER IN FULL CAPS AND BOLD]. In this connection, we would
like to invite you as one of our research participants to take part in the study. The purpose of
this study is to [encode the purpose or main objective of your research here].
32
This study involves absolutely NO risks in terms of physical, non-physical risks such
as social, psychological, or economic harm; criminal or civil liability; or damage to financial
standing, employability, or reputation. Your participation in this study is voluntary. It will only
take you [Encode how many minutes] minutes to respond. You have the right not to
participate at all, or to withdraw from this study at any time.
Rest assured that we will protect your responses from unauthorized disclosure and
treat your responses with utmost confidentiality and anonymity. If you decide to participate,
you will be asked to sign the Informed Consent Form.
Thank you very much.
Sincerely yours,
[RESEARCHER 1 COMPLETE NAME & Sig.] [RESEARCHER 2 COMPLETE NAME & Sig.]
[Course & Year] Student [Course & Year] Student
[RESEARCHER 3 COMPLETE NAME & Sig.] [RESEARCHER 4 COMPLETE NAME & Sig.]
[Course & Year] Student [Course & Year] Student
[RESEARCHER 5 COMPLETE NAME & Sig.] [RESEARCHER 6 COMPLETE NAME & Sig.]
[Course & Year] Student [Course & Year] Student t
Attested:
participants which may NOT be the pure Visayan or Cebuano) of your Letter to the
participants. Be sure to submit the vernacular form for content validation to the
people who know English and their vernacular equivalents. This equivalent must be
group discussion or any data gathering technique] and it will only take me [Specify
number of minutes or hours.] to participate in this study with provision for a follow up
when needed so I understand that the researchers may contact me for more
information in the future.
I have been informed that participation in this research undertaking is entirely
voluntary and, after I sign this consent form, I am still free to withdraw at any time
and without giving a reason. I can refuse to answer any specific question. I have
been told that my answers to the questions will form part of the summarized
information in the undergraduate research paper. Withdrawing from this study will not
affect my relationship that I have, if any, with the researcher(s). If I withdraw from this
study before the data collection will be completed, my data will be destroyed.
[Explain the kind of benefit the participant will receive, whether it is a token, gift
certificate, expense reimbursement, education, new knowledge, etc. If there is no
direct benefit to the participant, state this. For example: I am informed that there will
be no direct benefit to my participation in the study.] I understand that the results of
this research will be given to me if I ask for them and that the [Specify if lead
researcher for group or researcher for individual.], is the person to contact if I have
any questions about the study or about my rights as a study participant.
I understand that my responses in this research will be confidential. Every
effort will be made by the researcher(s) to preserve my privacy by [Explain how the
researche r ( s ) will maintain the confidentiality of data with respect to both
information about the participant and information that the participant shares. Some
measures taken to ensure confidentiality are: (1) assigning codes/pseudonyms for
participants that will be used on all research notes and documents, and, (2)
keeping notes, interview transcriptions, and any other personal identifiers in a locked
cabinet that only the researchers will have access to. If the research is sensitive
and/or involves participants who are highly vulnerable, explain any extra precautions
you will take to ensure safety and anonymity. For focus groups, provide a particular
challenge to confidentiality because once something is said in the group it becomes
common knowledge. Explain to the participant that you will encourage group
participants to respect confidentiality, but that you cannot guarantee it.]
Lastly, I am informed that this study was approved by the Research Ethics
Committee of Mater Dei College. If I have any questions at any time about this
study, or if I experience any risk as a result of my participation, I may contact
the researcher(s). If I have any questions regarding my rights as a research
participant, or if problems arise which I do not feel I can discuss with the researcher, I
can contact the Director of the Research Ethics Office through his cell phone number
09303383611 (TnT).
[Researcher1’s Signature over Printed Name] [Researcher2’s Signature over Printed Name]
Researcher Researcher
[Researcher3’s Signature over Printed Name] [Researcher4’s Signature over Printed Name]
Researcher Researcher
[Researcher5’s Signature over Printed Name] [Researcher6’s Signature over Printed Name]
Researcher Researcher
Noted:
participants which may NOT be the pure Visayan or Cebuano) of your Informed
Consent Form here, whenever needed, depending on the nature of your research
participants. Be sure to submit the vernacular form for content validation to the
36
people who know English and their vernacular equivalents. This equivalent must be
Appendix B1
QUESTIONNAIRE
[ENCODE THE TITLE/SPECIFICATION OF THE INSTRUMENT ABOVE.]
[Encode your Research Instrument here but you must specify in the title of this
researcher-made, indicate its title, not just a specification as a questionnaire, etc. and
37
it must replace the word INSTRUMENT as the title of this Appendix. When the
instrument is available in Google form or in any online form, please indicate it in the
Appendix B2
INSTRUMENT
[ENCODE THE TITLE/SPECIFICATION OF THE INSTRUMENT ABOVE IN THE
VERNACULAR OF YOUR RESEARCH PARTICIPANTS.]
participants which may NOT be the pure Visayan or Cebuano) of your Instrument
sure to submit the vernacular form for content validation to the people who know
38
English and their vernacular equivalents. This equivalent must be written in the same
Appendix B3
INSTRUMENT
[ENCODE THE TITLE/SPECIFICATION OF YOUR NEXT INSTRUMENT ABOVE.]
[Encode your next Research Instrument here but you must specify in the title of this
researcher-made, indicate its title, not just a specification as a questionnaire, etc. and
39
it must replace the word INSTRUMENT as the title of this Appendix. When the
instrument is available in Google form or in any online form, please indicate it in the
Appendix B4
INSTRUMENT
[ENCODE THE TITLE/SPECIFICATION OF YOUR LAST INSTRUMENT ABOVE IN
THE VERNACULAR OF YOUR RESEARCH PARTICIPANTS.]
participants which may NOT be the pure Visayan or Cebuano) of your Instrument
sure to submit the vernacular form for content validation to the people who know
40
English and their vernacular equivalents. This equivalent must be written in the same
[All the remaining instruments of the research study must be written and
CURRICULUM VITAE
[Encode the Curriculum Vitae of the Researchers with ID picture and contact details
such as Gmail/Email address, FB/Messenger account, Cell Phone Number,
Telephone Number (when possible), and residence address with their Baccalaureate
programs taken and their year level. They must follow the same format. They will be
guided by their Research Deans and Advisers.
41
Dear students,
You are REQUIRED to construct dummy tables based on your sub-problems
in your SOP to guide you on how to present the discussion of your Chapter 2.
Submit these tables to your research advisers and teachers as part of the
requirements before your proposal hearing. These tables may be replaced with
graphs in the final draft of your research outputs.
The following samples of dummy tables are arranged according to the order of
the sub-problems of THIS SAMPLE research paper for your guidance. You will
submit the tables without the grid lines since those with grid lines are just used as
samples to guide you on where the entries are encoded. Please follow the FORMAT
in presenting your tables as what you see in these tables.
Profile of Participants
Table 1
Profile of Participants
35 – 39
40 & above
Highest Educational Attainment
Doctoral Graduate
Doctoral Level
Master’s Graduate
Master’s Level
College Graduate
Teaching Level
Elementary
High School
College (incl. Master & Doctor)
Years in Teaching
Less than 1 year
1–3
4–6
7 or more
4.
10.
15.
16.
17.
18.
Psychological Health
5.
6.
7.
11.
19.
26.
Social Relationships
20.
21.
22.
Environment
8.
9.
12.
13.
14.
23.
24.
25.
Note: Very Low (1.00-1.80); Low (1.81-2.60); Moderate (2.61-3.40); High (3.41-4.20); Very High (4.21-5.00)
Table 2
Q2
Physical Health
Q3
Q4
Q10
Q15
Q16
Q17
Q18
Psychological Health
Q5
Q6
Q7
Q11
Q19
Q26
Social Relationships
Q20
Q21
Q22
Environment
Q8
Q9
Q12
Q13
Q14
Q23
Q24
Q25
Note: Very Low (1.00-1.80); Low (1.81-2.60); Moderate (2.61-3.40); High (3.41-4.20); Very High (4.21-5.00)
Intrinsic Factor
Q1 4.22 Very Satisfied
Q2
Q3
Q4
Q7
Q8
Q9
Q10
Q11
Q15
Q16
Q20
Extrinsic Factor
Q5
Q6
Q12
Q13
Q14
Q17
Q18
Q19
Overall Satisfaction
Note: Very Dissatisfied (1.00-1.79); Dissatisfied (1.80-2.59); Neutral (2.60-3.39); Satisfied (3.40-4.19); Very Satisfied (4.20-
5.00)
Table 3
Table 4
Decision on Difference
Profile Critical Value Test Value
Null Hypothesis Significance
Sex
Age
Education
Teach. Level
Teach. Years
Note: Significance Level = 0.05
Decision on Difference
Profile Critical Value Test Value
Null Hypothesis Significance
Sex
Age
Education
Teach. Level
Teach. Years
Table 5
Decision on Difference
Profile Critical Value Test Value
Null Hypothesis Significance
Sex
Age
Education
Teach. Level
Teach. Years
Table 6