BUTING SENIOR HIGH SCHOOL A. Santos St., Buting, Pasig City Students' Perceptions About the Importance of Data Security in Businesses: A Descriptive Study A Thesis Proposal Presented to The Faculty of the Buting Senior High School by Benitez, Jane Marinel Divina, Brycenkirt Quitoles Francisco, Paul Justin Ison, Harold Llanes, Kurt Luis Malanay, Jason Del Pilar Soria, Marc Angelo Yutuc, Kishiel Faith Grade 12 Information and Communication Technology (ICT) - A S.Y. 2021-2022 TABLE OF CONTENTS Dedication Abstract ix Chapter 1 – The Problem and Its Setting Introduction 1 Background of the Study 1 Framework of the Study 3 Statement of the Problem 5 Assumptions 5 Definition of Terms 5 Significance of the Study 6 Scope and Limitation of the Study 7 Chapter 2 – Review of Related Literature and Studies Data Security Technologies Applied in Business 8 Perception on Data Security in Different Industries 10 Synthesis 12 Chapter 3 – Research Methodology Research Design 13 Research Locale 13 Participants of the Study 13 Research Instrument/s 14 Data Gathering Procedure 14 Treatment of Data 14 Data Analysis and Interpretation 15 Chapter 4 – Presentation, Analysis, and Interpretation of Data 16 Chapter 5 – Summary, Conclusion and Recommendation 30 References 34 Appendices 39 Dedication We dedicate this research to the students who participated in this study, for their valuable insights and perspectives on the importance of data security in businesses. Their participation has greatly contributed to our understanding of this important issue and their willingness to share their thoughts and experiences is greatly appreciated. We also dedicate this research to the future business leaders and entrepreneurs, as the findings of this study will help them to be more aware of the importance of data security, in order to protect the sensitive information of their customers and employees. And, to all the victims of data breaches, that this research may bring awareness and help to prevent future data breaches. In addition to the students and future business leaders, we also dedicate this research to the body of knowledge on data security in businesses. The findings of this study will contribute to the ongoing conversation and understanding of the importance of data security in today's digital age. We hope that our research will serve as a valuable resource for professionals and organizations in their efforts to protect sensitive information and prevent data breaches. We also dedicate this research to the future researchers who will continue to explore this topic, and build upon the foundation laid by our study. Abstract This study focuses on determining the perceptions of grade 12 ABM students about the importance of Data Security in Businesses. Specifically, on how students who aspire to own a business will benefit from having Data Security in their businesses, how Data Security protects the information of customers and businesses, and lastly, why is it essential that data must be protected from intruders. This study uses a descriptive research design with a qualitative method and was conducted at Buting Senior High School located in Pasig City. There are 10 participants in this study and were gathered through the Purposive Sampling technique. This study also uses the interview as our research instrument to gather the information that will be needed in this study. And were analyzed through thematic analysis. Based on our findings researchers conclude that the grade 12 ABM students benefit from Data Security incorporated into their business operations in various ways such as; reducing problems that companies deal with, avoiding important data from being leaked, being safe from intruders and hackers, providing confidence when doing businesses, makes business less risky to operate, and lastly but not least is it attracts potential investors. Researchers also concluded that the opinions of students on how data security protects the private information of customers and businesses are based on their knowledge of how data security works. The respondents gave different opinions, the highest, which is nine, answered through encrypting data. Six of the respondents answered by keeping your network safe. Three of the respondents answered by making data and information confidential. The lowest opinion given by the respondent, which is two, is through the use of the software. And lastly, the researchers also concluded that the perspective of grade 12 ABM students on why it is essential to protect data from intruders is to avoid data loss from intruders which they use for their benefit. Aside from that, protecting data provides an advantage for businesses since they can use their data to improve their businesses while being confident that it is protected through Data Security. ix CHAPTER I THE PROBLEM AND ITS SETTING Introduction Big data is a significant asset for your company when developing more efficient methods for attracting and keeping clients. However, if this data falls into the wrong hands, it may spell disaster (The Upwork Team, 2021). This is why securing data is important for an entrepreneur, because data must be kept within an organization or company and not shared with anyone because it is confidential data, and also to avoid data breaches. The vast majority of people nowadays are connected to a worldwide system of computer networks. This opens an opportunity for entrepreneurs to make innovative ideas and convert these ideas into profit making business ventures. But, in order to make successful products and services as well as meaningful decisions on where to start, they need to gather a fair amount of user data to analyze. Business intelligence and analytics, which are commonly referred to as the techniques, practices, and applications that evaluate critical business data to help an enterprise quickly identify its market and make timely investment choices, have become extremely popular as a result of the opportunities associated with data and analysis in many organizations (Chen et al., 2012). Data's role is to enable business leaders to make decisions based on facts, trends, and statistical figures (Leonard, 2018) and as more firms go online, data has become an essential resource (Indeed Editorial Team, 2022) that can assist a company in learning more about clients' preferences, grievances, and daily operations. As many know, data is vital for businesses and is the foundation of an entrepreneur or businessman's decision, that's why such a valuable asset should be properly secured to avoid any compromises. An example of such is when Facebook got compromised and released unrestricted access of private data of over 87 million unaware Facebook users, which gained growing interest in the discussion of how technology affects society and poses hazards to people's privacy and well-being (Isaak and Hanna, 2018). This study aims to determine the perception of grade 12 ABM students about the importance of Data Security in Business. Background of the Study Data security is one component of a company's overall data strategy. Data security is frequently defined as delivering the right information to the right people at the right time (Fleckenstein & Fellows, 2018). In addition, data breach is the illegal access to data, usually for the purpose of reading or copying the information (Foote, 2020). As CFI Team (2021) stated that the foremost purpose of data security is to safeguard organizational data, which includes trade 1 information and customer information. Cybercriminals may gain access to the data for malicious purposes, jeopardizing customer privacy. Data breaches can occur because of inadequate data security practices, exposing organizations to financial loss, a decrease in consumer confidence, and brand erosion. When customers lose trust in a company, they are more inclined to move their business elsewhere, devaluing the brand. Breaches that result in the loss of trade secrets and intellectual property can have a long-term impact on an organization's ability to innovate and remain profitable (Guest Blogger, 2019). However, when correctly implemented, strong data security plans safeguard an organization's information assets not just from cybercriminal activity, but also from insider threats and human mistake, which are still among the primary causes of data breaches today. Data security entails deploying tools and technologies that improve the organization's visibility; These tools should be able to apply safeguards such as encryption, data masking, and sensitive file redaction, as well as automate reporting to streamline audits and ensure compliance with regulatory requirements (IBM, n.d.). It is important for entrepreneurs to secure data to prevent their clients' personal information from being exposed and to be protected from cyber-attacks. Entrepreneurs need to keep the important information they have safe and protected for their company, income, an old the trust of their clients or customers. In a business, there are different types of data that are important and need to be protected by cyber-attacks. Transactional data is data that describes the core business; this is production data for the manufacturing company. The master data is primary transactional data, which includes places (addresses, cities, countries), parties (customers, suppliers, employees), and things (products, assets, items, etc.) Reference data is master data subset references, it's codified, standardized data. Reporting data is a compilation of analytic and reporting data that is strategic and used in decision-making. Metadata shows when and where the data was collected, and it answers questions that data alone cannot answer (Dalimunthe, 2019). Confidential data, including client information, credit card details, and trade secrets, may be present in stolen data. A cyberattack is far more violent, hackers attempt to disable or demolish a computer system or network (Foote, 2020). Formal research is being done to determine whether markets’ lack of responsiveness might be attributed to companies purposefully timing announcements to fall on media-busy days, which would deflect attention and in turn, dampen market responses. Data breaches are reported 4.44% more frequently on days with one standard deviation more predictable news pressure (or approximately 19.024 data records). Significant breaches that expose healthcare data or passwords, entail firm-internal elements, and are timed strategically are more common. (Foerderer & Schuetz, 2022). According to the Statista Research Department (2022), in 2021, around 4.59 million data breaches would have been recorded in the Philippines, a decline of approximately 89% compared to the 43.19 million reported in the previous year. It indicates the number of data breaches that occurred in the Philippines in 2021 compared to the previous year. For any business, data is a priceless resource that is generated, acquired, saved, and exchanged. A corporation may avoid financial loss, reputational damage, a decline in consumer trust, and brand erosion by safeguarding it from internal and external malfeasance and unauthorized access (IntelliPaat, 2022). 2 Framework of the Study Input Process Part 1: Demographics ● Age ● Gender ● Grade-Level ● Strand Part 2. ● Benefits of Data Security ● Importance of Protecting Data ● Students Perception of Data Security Output ● Collecting data through ● Perception of the Students interviewing students for about the importance of Data information Security in Business. ● Findings of the data ● Organization of Data gathered and analyzed by the authors ● Analyzation of Data ● Conclusions and recommendations of the ● Interpretation of Data authors based on the results and findings that have been found. Figure 1. Conceptual Framework of the Study The first frame, which serves as the study's input, includes the information about the students who will be this study's respondents, such as age, gender, grade level, and strand. The Benefits of Data Security, Importance of Protecting Data, Students Perception of Data Security are also the variables that will be used to arrive at the results. The researchers will gather this information and utilize it to perform the next step. The second frame is the process of this study, which consists of the collection of data, organizing data, analysis of data, and interpretation of data. Here, the data collected will be organized, analyzed, and interpreted so that this information can be used effectively to make the study plausible. And finally, the third and last frame is the output of the study, which is the deciding relevance of data security for entrepreneurs, as well as the conclusions and recommendations that are provided by the authors based on the results and outcome of the process section of the study. Theoretical Framework This study is anchored by the Theory of Security by Kurtus (n.d.), which emphasizes the need to understand potential attack types, attack reasons, and your connection to those motivations. This theory first discusses the different types of potential assaults that require security, such as attacks on people (which may be intended to harm them physically, psychologically, or even kill them), attacks on property (which may cause property damage to a person), and attacks on organizations (which may involve attempts to subvert the structure of the organization or to take control of it by force or deception). Secondly, it also discusses what you should do to counter such dangers, such as protecting yourself and knowing the possible vulnerabilities that can be attacked. And lastly, it discusses the many different countermeasures you can employ, such as; having a pre-emptive attack, making it difficult to 3 attack, and Threatening a counter-attack to people who want to attack you, your property, or your organization. Additionally, according to this theory, the reason why a criminal may aim to hurt another person, property, or organization for a multitude of motives, including personal gain, personal vengeance, supporting a cause, or merely for kicks or pleasures. You may often detect a genuine threat to your security by linking the motives of criminal-mined persons to your position. Now, since data is so vital for a business and entrepreneurs, keeping them secure through data security is an excellent choice. And based on the theory of Security by Kurtus (n.d.), some criminally minded persons may attempt to steal this data for various reasons since they might know how vital it is for a Business. They could get money from it, destroy an organization or business reputation, take personal revenge on someone, etc., and these reasons are the motivations of criminals by which security is needed to be used according to this theory. This theory also emphasized the countermeasures that can be applied to defend such valuable things, such as making it difficult to attack, having a pre-emptive attack, or threatening a counterattack; having Data Security falls into one of these countermeasures that this theory highlighted, which is making it difficult to attack. A study that was carried out by Chavez and Poblador (2021) and was given the title "Contributors of Security Management Practices Among Jail Officers in Kidapawan City" aims to determine the leadership behavior and organizational commitment and its effect on security management practices of Jail Officers in Kidapawan City. This research makes use of the same theory of security that was developed by Kurtus (n.d). And they found in their findings that there is a significant relationship between leadership behavior and security management practices. This denotes that the increase in leadership behavior would also likely increase security management practices. Similarly, there is a significant relationship between organizational commitment and security management practices. This further suggests that when organizational commitment goes up, security management practices also go up. These findings make the authors conclude that leadership behavior and organizational commitment have a positive contribution to the security management practices of jail officers. Another study by Promsri (2015). Entitled "Passengers' Perception Towards Physical Security Measures of Suvarnabhumi Airport Rail Link Service," uses the same theory by Kurtus (n.d.) to examine the differences between passengers according to their gender, marital status, age, educational level, and frequency of use in assessing security risk measures of Suvarnabhumi Airport Rail Link. This study highlights physical security measures that affect travelers' perceived safety. The Suvarnabhumi Airport Rail Link has numerous security officers at stops and on trains to oversee passenger safety and security. In analyzing Suvarnabhumi Airport Rail Link security, independent t-tests indicated no significant mean differences between male and female passengers or marital status. Gender and marital status didn't affect Airport Rail Link safety. Analysis of variance (ANOVA) showed statistically significant differences at the 0.05 level among passengers of different ages, educational levels, and service usage frequencies for perceived Suvarnabhumi Airport Rail Link security. Older clients are more inclined to worry about Airport Rail Link's security than younger ones. Higher-educated travelers are more aware of Airport Rail Link, therefore they pay greater attention to security. 4 More frequent Airport Rail Link travelers checked security than infrequent riders. They scanned the environment and noticed security measures at stations and on trains. Statement of the Problem This study aims to determine the perception of grade 12 ABM students about the importance of Data Security in Business. Specifically, this study aims to discover the following: 1. How do students, who aspire to own a business, benefit from having data security incorporated in their business? 2. How does data security, in the opinion of students, protect the private information of customers and business? 3. Why is it essential that data must be protected from malicious intruders? Assumption The researchers assume that the students will implement Data Security when they have their own type of businesses. 1. The students are aware of the uses of Data Security and know that owners will reap its benefits when they implement it in their businesses. 2. The students believe that securing data is the most important priority in running a business. 3. The researchers assume that the students will implement Data Security when they have their own type of businesses. Definition of Terms 1. Analytics - Focused on extracting insights from data. It comprises the processes, tools and techniques of data analysis and management, including the collection, organization, and storage of data (Frankenfield, 2022). 2. Business Intelligence - Business intelligence comprises gathering, processing, and presenting actionable data based on the workings and performance of the company (Fruhlinger & Pratt, 2019). 5 3. Data Breach - A data breach (also known as data spill or data leak) is unauthorized access and retrieval of sensitive information by an individual, group, or software system. It is a cybersecurity mishap that happens when data, intentionally or unintentionally, falls into the wrong hands without the knowledge of the user or owner (Frankenfield, 2022). 4. Cybercrime - An attempt to damage business processes, exploiting flaws, monitoring targets, interrupting business tasks, extracting value, causing damage to logical or physical assets and destroying the integrity of the data and stealing controlled information (Global Knowledge, 2022). 5. Data Security - It is focused on protecting data from unauthorized access or malicious attacks. It enables businesses to set preventive measures using different technologies and practices to ensure data privacy (Joshi, 2022). 6. Entrepreneurship - It is the process of developing, acquiring, and commercializing a concept, technology, good, or service while also taking on the accompanying risks and benefits (McCullough & Medina, 2019). 7. Entrepreneurial Market - Innovative approaches to risk management, resource leveraging, and value generation are the foundation of entrepreneurial marketing, which is the proactive identification and exploitation of chances for attracting and retaining lucrative clients (Hisrich & Ramadani, 2018). 8. Security Agency - They carry out intelligence operations for a country's internal security, as a response for imposed malicious threats commonly linked from cyberattacks (Chen, 2021). 9. Transactional Data - It is the information that has been gathered from transactions. It captures crucial information to create a succinct background explanation (Tibco, 2022). Significance of the Study The continuous growth of businesses comes with a risk of data hacking and cyber-attacks. Data holds a huge value for consumers and entrepreneurs as information about them is included in their data. To protect the data and information of entrepreneurs, businesses, and consumers, data security is heavily needed. This study is made to determine the importance of data security to entrepreneurs and businesses. This research study would be beneficial for the following groups and sectors. Students - With this study, students would be able to gain prior knowledge that is relevant to their choices when they create their own businesses. This study would help them determine the importance of data security in businesses, thus, making them knowledgeable of the things that they should do once they decide to start their own business. This study would 6 serve as a guide for them to build a foundation for their chosen business and help them learn the importance of one big part of a business which is data security. Entrepreneurs - Entrepreneurs would benefit heavily from having data security. Having data security for their businesses would be a great start for them. With them having data security, they would be able to protect and secure their data and information making it safe from hackers which could bring them down. Furthermore, consumers would be interested in businesses that have data security set up and prioritized by the entrepreneurs as this would make them feel comfortable about having a transaction with entrepreneurs or the business, making the entrepreneur or business earn sales. General Public - With this study, the general public would learn and be informed of how valuable their data is. They will also learn that there is a thing such as data security, how it works, and that it holds a high value to them. They will be knowledgeable of various forms of cyber-attacks. Furthermore, the general public would pay more attention to their data protection whenever they involve themselves in businesses, access their services, and buy their goods. Data Security Analysts - With data security being important to entrepreneurs and businesses, data security analysts would be more in-demand, therefore making them have a huge array of job opportunities. Furthermore, they would be able to innovate and improve their work as tech continuously grows and the demand for the best data security increases within businesses. Future Researchers - This study will be able to help future researchers to further improve their study and this study will also be able for them to use as a reference of ideas that might be able to help them construct their studies. Scope and Limitation of the Study This study focused on the perception of grade 12 ABM students about the importance of data security when it comes to protecting confidential data from outsiders who want to obtain it. The target respondents of this are Grade 12 ABM students at Buting Senior High School that engage or relate themselves to entrepreneurship, there is no specific age required as long as they are Grade 12 ABM students. This study was conducted at Buting Senior High School where the researchers conducted a Descriptive Study concerning the importance of data security to entrepreneurs in securing their private data and information involving Grade 12 ABM students from September 2022 to June 2022. 7 CHAPTER II REVIEW OF RELATED LITERATURE AND STUDIES This chapter presents the relevant literature and studies that the researcher considered in strengthening the claim and importance of the present study. Data security technologies applied in business Businesses targeted by data security breaches may deal damage to their reputation and remediation costs. It's vital to understand several data security strategies for businesses to protect and secure company's data and consumers' personal information. It is also said that technology leaders have reported an increase in data security threats in organizations with the use of information-based technology. Hackers have used data from information-based technology to access financial and private data. Small business owners experience 71% of all data security breaches. Small businesses are targeted by hackers due to their size (Knight, 2020) According to a study made by Knight (2020), the four (4) participants of the study have varied data security strategies consisting of password protection, encryption, and data recovery. P1, P2, and P3 all made their own websites where users have to create a user ID and a password to obtain access to their systems. P4's pc is also protected by a password which can only be accessed by P4 and P4's espouses. P3 also mentioned the use of two-factor authentication. Data security is increased in using two-factor authentication by having a secondary method when identifying a user. Furthermore, encryption services were also used as a data security strategy by some of the participants. User information, such as credit card and login information, are all protected and secured from hackers when transmitted with the use of SSL encryption. In addition to passwords and encryption, all the participants of the study made by Knight (2020), references the theme of third-party dependency as a valuable factor to enhance the ability to reduce data security breaches. Third-party data security services can be used to secure data, access content, and store data. P1 and P3 relied on corporate offices for some of their data security services. On the other hand, P2 and P4 used third-party companies to get their data backed up while having no affiliation with a corporate office. At the end of the study, P1 and P3's corporate offices have experienced data breaches, while P2 and P4 have indicated that they have not experienced a data breach, this indicates that business owners should not use thirdparty companies to store their data and use it for data security backups. Furthermore, it's also indicated that incorporating data security into their businesses have reduced the risk of data breach with the help of different strategies such as using passwords, having data backups, and using encryptions. According to Zeng (2019), Microsoft Information Rights Management centrally manages documents and messages and uses encryption to keep their information secure. Authorized 8 users use decryption keys to open the document and access the information. When a user tries to open a protected document, the centralized server will check the authentication of the user. The deployment of the MS IRM system was used as a case study. In order to exemplify the suggested process, Microsoft Information Rights Management (MS IRM) is examined in this section. Microsoft Corporation created MS IRM, a DRM (Digital Rights Management) product. The simulation results provided important information that the business needed to make decisions on whether or not to implement this type of information security system. This procedure was developed for the project in this particular case study under a set of assumptions but could be used by security investors to evaluate the benefits and costs of implementing information security technologies. Cloud computing is another method utilized by businesses to store data. Due to technological improvements, data storage can be time-consuming and expensive (Levitin et al., 2021). Many businesses employ cloud computing as a means of data storage because it substantially eliminates the requirement for hardware and software purchases. According to Levitin et al. (2021), N-Version programming, a cloud-based task solver, was developed from a single specification and used many task solver versions of the same program to prevent data theft on cloud computing. They subsequently applied it to cloud computing by building a number of Virtual Machines (one for every Task Solver Version) and assigning them to cloud servers for utilization. They gave examples of N-version programming being applied to a diagnostic medical system. The attacker can purchase malware-based virtual machines from the cloud. In order to protect patient data to the appropriate degree while increasing the possibility of a correct diagnosis, the system user must choose the number of versions (task reliability). Both the confidentiality of patient information and the possibility of an accurate diagnosis are impacted by the number of Task Solver Versions. By choosing the proper number of Task Solver Versions, a user can enhance task reliability while preserving the required level of patient data safety. According to their findings, the ideal number of Task Solver Versions should be increased as the number of cloud servers increases, as individual Task Solver Version dependability increases, or as the voting threshold falls. The ideal number of Task Solver Versions should be reduced as the number of assaulting Virtual Machines or the required level of data security rises (Levitin et al., 2021). The most valuable resource in every company, according to Mukherjee (2019), is its data. Due to the complexity of managing client data, each company has established a special strategy for managing sensitive customer data, phishing attacks, strong password management, boosting staff knowledge, and preventing malicious intent when it manifests. Every company takes data privacy into account from the beginning in order to safeguard its sensitive data because data leaks can lead the company to suffer serious losses. Malware is also the name for malicious software designed to access a system without authorization. One way of malware defense is to prevent the malicious program from accessing the target computer. By blocking users from accessing data or the computer network until the ransom has been paid, ransomware is a type of malicious software that is used to transfer money. The recovery of the records after the money has been spent is not guaranteed. In order 9 to get rid of ransomware, a good antivirus program must run frequently and keep the browserrelated components updated. When engaging in e-commerce, data exchanged during transactions can easily be intercepted or fabricated by a third party, but neither side can successfully assume the identity of the other party while the information is being transferred or received. In a study conducted by Linzhu Hu (2019), the Double Encryption Algorithm was used to prevent consumer information from being easily accessed by hackers through public domains, with the usage of the model SSL (Secure Socket Layer), which assesses if a website is trustworthy through certificates. As a result, the double encryption technique was found to be more appropriate for exchanging confidential information due to its lower runtime complexity and shorter total encryption and decryption times. In a short experiment Hu tested data packets containing order information and payment information that were divided into data packets of varying sizes, and using the SSL security protocol based on the double encryption technique, the data packets were encrypted and decoded 100 times. After decrypting the data packet encrypted by the two encryption techniques for 60 minutes, it was discovered that the larger data packet had a substantially lower decryption difficulty. Data encrypted with the double encryption algorithm had reduced decryption integrity and greater security, and it helped to prevent decryption to some extent. Finally, the enhanced Business to Consumer e-commerce mode with the addition of a third-party privacy server based on a double encryption technology may provide payment security and privacy. (Hu, 2019) Perception on data security in different industries A study that was carried out by Massarczyk, E., and Winzer, P. (2017) and given the title "Influence of the Perception of Data Security and Security Importance on Customer Usage" of Internet Service aims to determine whether or not the perception of data security and security importance has a negative impact on the usage of Internet services. The following is a hypothesis put forward by the authors: The customer's perception of data security (perceived security) has a direct positive effect on the usage of (mobile) Internet services, the customer's perception of the importance of data security (perceived importance of data security) also has a direct positive effect on the usage of (mobile) Internet services, and higher customer perception of the importance of data security leads to a higher perceived level of data security. After obtaining the results, the author decided to disregard these hypotheses and conclude that there is no general correlation between the perception of data security, the relevance of data security, and the usage of Internet services. The key finding of this study is that, from the point of view of consumers, the general level of perceived data security is significantly most influenced by the level of perceived security associated with email accounts. Another study that was conducted by Pleger et al. (2021) and which investigates the German and UK citizens’ perceptions of data protection and data security found that citizens do not fully understand the terminology used in newspaper articles concerning data protection and data security. This research also examined how well individuals grasp Data Protection and Data security media terms. Findings reveal that people value data privacy and security. Online banking has the greatest perception of data privacy and security. Compared to Germans, UK 10 residents were more concerned about internet privacy. Citizens regularly create personal and sensitive data, and the state must protect it. Despite variations, both samples show a lack of awareness of data protection and security. The research provides a three-dimensional framework that separates people's perceptions of Data Protection and Data Security from legal and technological aspects. The researchers advise concentrating on the subjective viewpoint rather than the legal and technical aspects to address the people's perspective. The study's findings show the presence of a subjective viewpoint that goes beyond individuals' concerns and includes their priorities and conceptions of Data Protection and Data Security. When educating individuals on DP and DS, the subjective viewpoint should be considered. The results demonstrate that people's comprehension of DP and DS may be enhanced. Citizens' better awareness of DP and DS may improve state-citizen understanding. This is a necessity for egovernment activities that include people's subjective perspectives. The resultant citizen idea of data protection and security might mediate between politics, technology, and the public in egovernment projects and data protection and security standards. Citizens must comprehend DP and DS for governments to solve e-government problems effectively. Balzer et al. (2017) conduct a study titled "Perception of Data Security in e-Commerce," in which they examine the perception of data security in e-Commerce services and the knowledge of computer security among e-Commerce users. It also looks at how shoppers' perceived data security (PDS) is affected by a variety of circumstances. According to their findings, the frequency with which a customer consumes information regarding data security issues, on the one hand, and the experience of a hacker assault, on the other, have significant impacts on the customer's view of data security. Data security expertise, on the other hand, was shown to have no significant impact on the PDS of the sample. This suggests that people's PDS are influenced in various ways by the two distinct elements of information collection and expert knowledge of data security issues. Having been hacked is the second factor that affects online buyers' perceptions of the security of their personal information, and the results demonstrate a clear negative effect on PDS. For a business to successfully enhance its customers' PDS, it must take all necessary precautions to ensure the safety of its customers' personal information. Researchers propose that teaching people about data security issues and, more significantly, how to protect themselves against digital threats, could prevent a potential hacker assault and, by extension, the bad effect of that incident on a customer's PDS. A study that was carried out by Mohr and Walter (2018) and was given the title "Consumer Perception of Data Security: A Trust Transfer Perspective" investigates the apparent contradiction that exists between the elevated consumer data security concerns that are reported in surveys and the lax consumer security behavior that is displayed online. The study's authors found that shoppers put their trust in a company's ability to keep their personal information safe rather than the retailer itself. Consumers' confidence in an online store hinges on their perception that it treats them fairly and treats them honestly whenever they engage with the store. However, trust in data security is a distinct form of trust: The consumer has a sense of security that software flaws won't cost them anything. According to their findings, confidence in data security is not a necessary condition for making a purchase, but rather the end result of transferring trust from the retailer to the data provider. This is an unjustified leap of trust on the part of customers, though, because retailers aren't always responsible for fixing software security vulnerabilities. 11 Synthesis The overview of related literature that has been presented covers a number of topics linked to data security, including how it is used in businesses and how various sectors evaluate its value. According to certain studies, implementing data security into business operations has reduced the risk of data breaches by employing various strategies like using passwords, keeping data backups, and encrypting data (Zeng, 2019; Knight, 2020). The findings also showed that customers' perceptions of data security is influenced by their experiences with hackers trying to attack their system to obtain personal information about their private data; affects how they view data security and also positively impacts their view when implementing a better system to protect their data (Tham et al., 2017; Balzar and Bollig, 2017). The authors stressed the importance of adopting data security into businesses in order to safeguard customer data as well as to provide customers with a positive perception of the product and increase their faith in the brand (Tham et al., 2017; Knight, 2020). Furthermore, the authors also stressed how important it is for business owners to provide security for their customers, but they did not go into detail about how data security can benefit owners. Instead, most of the authors concentrated on how data security can be implemented in a business and the consequences that can result from doing so as well as how they perceive such security. This study will be answering the question of how important data security is for business owners in a more in-depth manner. 12 CHAPTER III RESEARCH METHODOLOGY In this chapter, the researcher discusses the research design, where the study will take place, qualifications of the participants, the instrument, how the data will be collected, what statistical treatment will be applied, how the data will be analyzed to come up with the interpretation, and what ethical considerations the researcher will follow. Research Design This study uses a qualitative research method and uses a Descriptive research design. According to Streefkerk (2019), qualitative is used when you want to understand something, either concept, thoughts, experience, etc. The researchers use a qualitative method for this topic since we want to find out the perception of students, which is a suitable method for this topic. Additionally, Descriptive research seeks to comprehensively and accurately describe a population, situation, or phenomenon. It is employed in studies where identifying patterns, classifications, and types of data is of interest (McCombes, 2015). Voxco (2021) states that you can use descriptive research design to determine the characteristics of the subjects, which includes opinions, traits, behaviors, etc., which is why researchers chose this research design because the study will be describing the population's views about the importance of Data Security in Businesses. Research Locale The Buting Senior High School (BSHS), located in Pasig City, served as the location for the carrying out of this research project. Given that this is the only location for which they have been granted permission to undertake an investigation, the researchers have decided to focus their efforts here. Participants of the Study The individuals who took part in this research were students from Buting Senior High School who were enrolled in ABM in the 12th grade. The selection of each of these participants was accomplished through the use of a purposive sampling method. The qualifications that the respondents need to have is: First, they need to be Grade 12 ABM students enrolled in Buting Senior High School. Second, they must have their own business or engage themselves in 13 businesses or have the plan to have a business in the future. The number of respondents that this study will accommodate is 10 respondents from ABM. Research Instrument/s The researchers chose an interview as their research instrument in order to obtain information for this study, and it consists of two parts. In Part 1, the profile of the respondents will be asked. The profile will determine the age, gender, grade level, and strand. Now in Part 2, it consists of questions that will be asked of the respondents, which are: First, from your perspective, why do we need to protect our data from intruders? Second, what do you believe are the motives for data theft by intruders? Third, how do you think data security can carry out its responsibility to safeguard private consumer data? Fourth, why do you believe that implementing data security into business operations is useful for a company? Fifth, aside from keeping your data safe, how would implementing data security in your company benefit you? Last but not least, why do you think companies should incorporate data security into their operations? How valuable do you think it would be? The creation of interview questions for this study is self-made and consistent with the study of the researchers to gather information. The answers of the respondents are based on what they perceive about data security. There will be no definite or fixed answer offered by respondents, who can freely answer the set of questions; the study material is open-ended. Each of the researchers will use an audio recording to encode the conversation for decoding purposes that will be used on the later pages of this study. Data Gathering Procedure The first step of gathering data is to create a consent form that will be validated by the researchers' thesis adviser. After securing a consent form, the second step is that the researchers may now go to the respective sections of grade 12 ABM and present the consent form to the advisers of each grade 12 ABM section and ask for their permission. In the third step, researchers may now use the purposive sampling method to find suitable respondents for the study. The fourth step is to present the consent form to the respondents, the consent form will explain the researchers' agenda, and once the request is accepted by the student, the researchers will conduct an interview. After that, in the fifth step, the researchers will now process the gathered data through a process called Thematic Data Analysis. And lastly, once the data has been thoroughly processed and analyzed, the researchers can now come up with a conclusion and resolution to their topic. Treatment of the Data Once the researchers gather enough data from the respondents, they will use thematic analysis to analyze the data given by each respondent. According to Caulfield (2019), when 14 dealing with qualitative information, thematic analysis is a useful tool. It is typically used with a collection of texts, such as interviews or transcripts. Caulfield (2019) further states that thematic analysis is a useful research method when attempting to glean information about people's perspectives, opinions, knowledge, experiences, or values from qualitative data. And since this study aims to conduct the student's views or perspectives about the importance of Data Security in businesses, thematic analysis is really appropriate to use as a treatment for the data that will be provided. Data Analysis and Interpretation Caulfield (2019) stated that there are various types of approaches to conducting thematic analysis. However, the most common form of conducting a thematic analysis follows a six steps process which is: familiarization, coding, generating themes, reviewing themes, defining and naming themes, and writing up. These six steps were originally developed by the study of Virginia Braun and Victoria Clarke, which will also be used by the present researchers in this study. Now in this study, after the researchers interviewed the qualified participants, the researchers may now use thematic analysis based on the six steps stated above in analyzing the data. The first step is Familiarization. Researchers in this study will familiarize themselves with the data the researchers acquired by transcribing some audio, reading the text, and making some preliminary notes. Step 2 is coding the data. Coding means the researchers highlight the text and phrases on the data and come up with labels or codes on those data. Researchers will code the data after familiarizing themselves with it. Step 3 is generating themes. After familiarizing themselves with the data, coming up with the codes, and identifying the patterns, researchers will now create themes based on the codes. At this stage, according to Caulfield (2019), researchers can decide if the themes and codes are too vague or relevant enough so that they can discard those data. Step 4 is reviewing the themes. Here researchers will make sure that the themes are useful and accurate. Step 5 is defining and naming the themes. Here researchers will now interpret what the formulated themes exactly mean and if it really helps us understand the data. Lastly is step 6, which is writing up. Here researchers will now write the findings that they accumulated based on the themes that they have created; they will also explain at this stage the meanings behind those themes. The conclusions will also be in this part, and it contains the main takeaways of this analysis and how this analysis answered the research questions. 15 CHAPTER IV PRESENTATION, ANALYSIS, AND INTERPRETATION OF DATA This chapter presents the elements and concepts of presenting, analyzing and interpreting data to answer the specific problems posited in chapter one of the study. Table 1 1. How do students, who aspire to own a business, benefit from having data security incorporated in their business? The following shows the codes for the first research question, which explored the perception of students about the benefits of data security. The questions that were constructed were anchored to the participants' insights on the benefits businesses gain when data security is implemented. Respondents Respondent 1. Response of the Respondents “It can help my company stay ahead of *It attracts potential investors my competitors because keeping our data secured will increase our investors' confidence.” “Businesses should implement data security in their operation to protect their information from leaking and avoid stealing of data. I think it's very valuable for a business as it eliminates different threats and risks that your company might go to.” Respondent 2. Labels/ Initial Codes * To avoid important data from being leaked *To be safe from intruders/hackers *Reduces problems that companies have to deal with “The benefits I will gain if I will * Provides confidence when implement data security in my business doing business are essential, especially when it comes to strategies, money, or the formula of my product. I am sure it will be secure.” “I think firms should implement data *To be safe from security because they must protect their intruders/hackers 16 information, especially of their competitors, and also to avoid being hacked by intruders.” Respondent 3. “It can benefit me to have a smooth flow *Makes business less risky to of my business and business plan so that run the unexploited plan will not be used against me by my competitors.” “To avoid the decline of my business as a * Reduces problems that result of sabotage, and it can assist me in companies have to deal with securing critical information that could cause my business to fail. The loss of profit of business.” Respondent 4. “Aside from getting my data safe, I *Makes business less risky to consider that having secure data will aid run my business become somewhat less risky, and less likely to face setbacks” “Based on what I’ve learned in our some *To avoid important data from specialized subjects, data seems to be a being leaked critical resource that all businesses acquire, so implementing data security upon operations guards it from prospective negative publicity.” Respondent 5. “It can benefit me by making me feel *Provides confidence when secured and not to overthink things” doing business “By having data leaks can be a problem *To avoid important data from to business firms thus making it being leaked important it is very important as it can prevent leaks in data and prevent valuable information to be spread” Respondent 6. “It would be beneficial as a business can *It attracts potential investors be seen as a safe place by the customers. People we'll deal with or have an interaction with may feel secure about their provided information and the money that may be invested and earned will be secured.” 17 “Business operations are one of the crucial elements in business. Maintaining the confidentiality and data security of the operations avoid possible data intruders and lessen the barriers in the business. Cause' I believe business operations shouldn't be an open book to others to maintain the business progress and prevent system malfunction.” Respondent 7 *To avoid important data from being leaked *Reduces problems that companies have to deal with *To be safe from intruders/hackers “I think aside from the assurance that the *Provides confidence when firm will be safe from intruders, data doing business security could also aid in the efficiency of the business operation by allowing the firm to operate without being anxious of their company's data security.” “Data security is crucial in a business because mostly everything now is operated with the help of technology which is at risk of being hacked, and that could only be avoided with the help of data security. Aside from that, it will allow the business operations to go smoothly. Respondent 9 *Reduces problems that companies have to deal with “Other than it will secure our data, it will *Provides confidence when also make us comfortable in doing doing business business knowing that we'll be safe. Thus, it allows us to do work efficiently and effectively.” “We should implement data security in a business operation because it can assure customers' safety as well as the companies. It is really valuable in a way that our data won't have unauthorized access to people. Our data is safe and secure, that would make the business avoid theft and data corruption that are essential to the entity.” Respondent 8 *To be safe from intruders/hackers *To be safe from intruders/hackers *Reduces problems that companies have to deal with “Apart from keeping my data private, I *Makes business less risky to believe that having secure data will help run my firm become less risky and less prone to encounter setbacks.” 18 “According to what I've studied in our *To avoid important data from specialist subjects po, data appears to be being leaked a crucial resource that all firms acquire, therefore applying data security on operations protects it from potential unfavorable publicity.” Respondent 10 “It'll benefit by avoiding loss of business.” *Makes business less risky to run “I think businesses should implement *Reduces problems that data security in their operations because companies have to deal with it is one of the keys to maintain your competitive advantage in businesses.” The reasons why students who aspire to own a business benefit from having data security incorporated into their business play an important role in the study. The following labels or initial codes are shown in Table 1: ● ● ● ● ● ● It attracts potential investors. (2) To avoid important data from being leaked. (5) To be safe from intruders or hackers. (5) Reduce problems that companies have to deal with. (6) Provides confidence when doing business. (4) Makes businesses less risky to run. (4) The responses of the participants showed their opinions on why having data security incorporated into their business will have a benefit. The first label/initial code is "It attracts potential investors," which has been stated by 2 of the participants as having huge advantages for their businesses because of the trust of investors and customers. According to Trends (2021) cybersecurity can give an organization a more positive reputation which will lead to investors that will trust in the business because people would think that the business gives priority in protecting their confidential data and because students demand quality service from businesses, in their perspective once these qualities are met, potential investors would come and make the business successful. The second label or code is "to avoid important data from being leaked," which has been stated by 5 of the participants: that having the business data leaked can cause a huge problem because it is very important or valuable for the company. As indicated by Bhardwaj (2022) If you own a company, every important and valuable data in a business can be attacked by intruders and take important data such as trade secrets and confidential business plans. In the perspective of the students, it can be a big problem for a business to have their data leaked 19 because it can be monetized and used in a bad way by intruders that can cause damage to the company's reputation, and there will be competitors' advantage from that information. The third label or code is "to be safe from intruders or hackers," which has been stated by 5 of the participants. They believe that it's valuable for a business to eliminate different threats and risks for the business, such as intruders and hackers. As stated by Business (2021) that cyberattacks would seriously damage the business and its reputation. Multiple backup methods, programming of operating systems and installing security software will ensurely secure and protect the important information that is valuable in a business, in the perspective of the students, it will eliminate threats and risks in the business such as intruders and hackers. The fourth label or code is "To reduce problems that companies have to deal with," which has been stated by 6 of the participants. They think that the business operations will go smoothly with the help of data security. According to Tierney, (2021) Data is the most valuable asset for any business. No matter what industry you are in, it’s critical to take care of your data, whether it is financial reports, healthcare records or a start-up business plan. Securing data against unauthorized access, use and modification helps organizations reduce the risk of operational disruptions, financial losses, legal issues, compliance penalties and reputation damage. Students realized this which is why they came up with such a response. The fifth label or code is "Provide confidence when doing business," which has been stated by 4 of the participants. They said that they will have an assurance, and it will help their confidence without making them anxious about their company's data security. According to Hart, (2018) Unsecured data is a hacker’s dream. Attackers can offer it up to the dark web or use ransomware, causing financial loss and reputation damage. It can take years to uncover data manipulation, which can put everything from an organization’s business strategy to product development at risk. Having the data or strategy leaked into the business world will make business owners lose confidence. Yuee, (2019) states that keeping data protected also helps in staying ahead of competitors. By protecting the information of the clients, it will increase investor confidence which is healthy for the business. Having many investors in the business will give a boost of confidence. Hence, the students were aware of this, which is why they responded in this manner. The last label or code is "Makes business less risky to run," which has been stated by 4 of the participants. They said that having secure data will make their business less risky and less likely to encounter danger or setbacks. According to Intellipaat Blog (2022) Data is a valuable asset that generates, acquires, saves, and exchanges for any company. Protecting it from internal or external corruption and illegal access protects a company from financial loss, reputational harm, consumer trust degradation, and brand erosion. Based on the codes generated, the researchers now formulated the themes of how students, who aspire to own a business, benefit from having Data Security incorporated into their businesses. The themes formulated are the following: 20 ● From the perspective of students, businesses would benefit in various ways from having data security in their operations. This theme was formulated based on the given codes from the data. After analyzing and sorting the codes based on the data the researchers noticed that these codes all talk about the various benefits of implementing data security in their business operations which is why the researchers came up with this theme. Table 2. 2. How does data security, in the opinion of students, protect the private information of customers and business? The following shows the codes for the second research question, which centered on students' perceptions of how data security protects consumers' and businesses' private information. The questions that were created were based on the participants' perceptions of how information is protected by data security. Respondents Respondent 1 Response of the Respondents Labels/ Initial Codes “Data security can perform its role by *Through Encrypting data ensuring the security of physical records and devices to avoid leakage of information.” “I think data security is valuable in * Keeping your network businesses because it protects different secure information that was done within the company. By having data security, we avoid a lot of threats and risks because our data is protected and safe.” Respondent 2 “Data security performs its role of * Through Encrypting data protecting the sensitive information of consumers through implementing security measures that will protect the information of consumers.” “As an ABM student, it's valuable because *Make data and information the information about our business is confidential important and cannot be shared with others, especially with our competitors in business” Respondent 3 “Create strong passwords, Backup data, *Through Encrypting data 21 and Get antivirus or protection for devices” anti-malware *Through the use of Software “To assure that the plan is not exploited * Keeping your network secure or copied by the intruders.” Respondent 4 “Data security, in my opinion, plays its *Through Encrypting data role in maintaining consumer information by demanding access permissions from all possible invaders as some information needs to be kept confidential.” “Similar to what I mentioned earlier, *Make data and information there are some aspects that need confidential confidentiality, so data security is valuable in a business firm or operations to prevent disclosing some information in potential dangers.” Respondent 5 “In having data security, it can prevent *Through Encrypting data data leaks that can protect the identity of the consumers” “Having data security may protect data * Keeping your network from leaking to rival companies and secure exploiting the firm’s weakness and strengths” Respondent 6 “Data security can provide multiple *Through the use of Software identifications security to protect relevant user information.” “We all know that businesses should have * Keeping your network high information security because of their secure vital business' data that revolves around their money, strategies, and employee identification. Having data security helps the business' data remain confidential.” Respondent 7 “Data security, from the words itself. *Through Encrypting data Secure our data. I think it can help us to protect from intruders in a way that data corruption or leaked data won't occur.” 22 “Data security is valuable in a business *Make data and information and advantageous too. It is a way to confidential protect our customers' information and avoid tarnishing our company's reputation and hidden info too.” Respondent 8 “Data security, from the word itself, will *Through Encrypting data secure the data of the consumers and will assure them that their data will be used solely for the purpose of them being a consumer.” “Data security is both valuable and *Keeping your network advantageous in a firm because secure nowadays, firms are operating through the internet or other forms and most crucial information about the firm is even stored in a platform or let's say gadgets that are at risk of being hacked by an intruder. Without data security, the firm could be at risk and intruders might have access to the sensitive information of the firm and that may put the firm in a dangerous state.” Respondent 9 “I think it can be protected by encrypting *Through Encrypting data it.” “I genuinely think that data security is * Through Encrypting data valuable when implementing business operations to keep the customer's privacy safe and encrypted.” Respondent 10 “Data security is important in a way that * Through Encrypting data it can protect your sensitive information.” “I think data security is valuable in a * Keeping your network business firm, is because protects secure sensitive information from an unauthorized access and divulgence keeps you ahead of your competition.” The opinion of students who specializes in account-based marketing is essential in discovering the perspective of future business owners about data security as it gives insights on 23 their knowledge about how data security protects the private information of customers and businesses. The following labels or initial codes are shown in Table 2: ● ● ● ● Through Encrypting data (9) Through the use of Software (2) Keeping your network secure (6) Make data and information confidential (3) The responses of the participants have shown the opinions on how students' view on how data security works to protect the private information of customers and businesses. The first label/initial code is "Through encryption" which has been stated by 9 of the participants. They believe that by encrypting data or converting data into codes and adding passwords to them, the company would protect private data of customers and business-related information. As Johnson (2018) stated that it is critical to take into account the advantages of data encryption given the ongoing rise in data breaches, threats, and attacks. The important information is kept private and inaccessible to hackers with the assistance of encryption. Encrypting data at all times and in all places is recommended practice to ensure the greatest level of security, students assure that the company's private information such as customer and business data will be secured using encryption and adding password that can further reduce the risk of leakage of data and makes data unintelligible when accessed without the right authorization. The second label/initial code is "Through the use of software" which has been stated by 2 of the participants. They believe that by adding software such as anti-malware software and virus scanners would be able to secure the private data of customers and business related information. According to Network Depot (2017) malware and virus problems are serious difficulties that have become more prevalent in recent years, because technology develops so quickly, criminals who use it to break into systems, take them offline, or steal data from them expand and adapt just as quickly as security measures and programs are created to counter them. Ultimately, if private information was easily obtained during a hack, users and clients might even stop trusting a corporation. In students' perception, a company of any size should always utilize antivirus and anti-spyware software as standard tools to secure and avoid corruption of customers and business data. The third label/initial code is "Keeping your network safe" which was stated by 6 of the participants. They believe that when data security is implemented, it is able to protect the private data of customers and business-related information by securing the network that enables them access to the internet, keeping out intruders from their operations. Network security is a collection of defense mechanisms designed to safeguard network systems from unauthorized access, tampering, and other dangers. As a result, technology like computers and other devices may operate safely. Organizations frequently gather customer information for marketing and other uses. Network security protects data from malicious intrusion and upholds the legitimacy of the company (Computronix, n.d.), based on students that cyber criminals can 24 steal brand names if the network security is weak. They can steal identity and commit fraud by invading systems. Create a firewall, configure a VPN, install anti-virus software, and make a data backup. Establish functional network security for the company to prevent this. The last label/initial code is "Make data and information confidential" which was stated by 3 of the participants. They believe that when implementing data security, it is able to make data and information confidential by keeping them within the companies’ circle, preventing outsiders from ever getting access to business related information and customers data. According to CareCheck (n.d.) being confidential is important because it builds trust. When assured that all personal information is being preserved and utilized lawfully, it can permit the flow of information between employees and employers. In addition to risking losing clients or business, failing to safeguard confidential information exposes a company to the risk of that information being exploited for criminal purposes, like fraud. In implementing data security in the perception of students that making confidential their data can make businesses secure and avoiding outsiders to get access to their data. Based on the codes generated, the researchers now formulated the themes of how Data Security, in the opinion of students, protects the private information of customers and business. The themes formulated are the following: ● It protects businesses and customer information by making the system more complicated for intruders to bypass. This theme was formulated based on the given codes from the data. It shows that respondents are more aware about the system's importance for the safety of business information which is why the researchers came up with this theme. This theme was also based on the given codes that were formulated. The researchers also gathered and analyzed the formulated codes and came up with this theme since the codes talk about how data security works to protect businesses and customer information by making the system more complicated for intruders to bypass. Table 3. 3. Why is it essential that data must be protected from malicious intruders? The following shows the codes for the third research question, which discusses the perception of students on why it is essential that data must be protected from malicious intruders. The questions that were formulated were based on the participant's perception of why data must be protected from intruders. Respondents Respondent 1 Response of the Respondents Labels/ Initial Codes “For me, we need to protect our data to *Theft Prevention avoid intruders from copying or stealing it. Because data is a very important resource *Advantageous for the Business for a business as it helps a lot” 25 “I think intruders steals data to copy it *For Personal Gain which they can also use for themselves. Another reason might because they want to gain information and to hack.” Respondent 2 “We must protect our data because it is our *Theft Prevention personal info, and it contains confidential things that should be protected.” “Criminal wants to steal the data because *For Personal Gain they want to gain money from it.” Respondent 3 “It is important to protect our data from *Theft Prevention intruders since it is possible for personal information to be stolen and for others to use it for scamming or other matters that could have an impact on my personal life.” “To use it for scamming” Respondent 4 *For Personal Gain “In light of being ABM student po, *Theft Prevention basically, we have this thing called privacy, so meaning to say not all data should be necessarily conveyed. I presume that having our data protected from intruders is certainly for safety.” “Idk, maybe for some certain matters or *For Personal Gain for their own goods, I guess?” Respondent 5 “To prevent identity theft from happening” * Theft Prevention “They steal data in order to access *For Personal Gain something for example your credit card info so that they can have money” Respondent 6 “Our personal information is important to *Theft Prevention us as it contains our identifications such as an address, contact number, etc. Protecting it from intruders is like protecting our identity from being a victim of identity theft and cybercrime.” 26 “With the unpleasant intention, intruders * For Personal Gain seek to steal crucial information from technology users to invade their privacy and use others identities for their scheming and also to blackmail the person.” Respondent 7 “We need to protect our data from *Theft Prevention intruders to simply avoid dangers. Intruders might steal our information and may use those for shady activities like scamming.” “Intruders steal data maybe because they * For Personal Gain need another identity to use to scam other people. They also steal to gather information secluded from the public.” Respondent 8 “We have to protect our data from *Theft Prevention intruders because basically, it's OUR data. It's something personal and it's not supposed to be invaded by someone whom we didn't give our consent to. Second, it might be used by the intruder to his/her advantage which could be dangerous for us.” “I couldn't actually tell their specific reason *For Personal Gain because those intruders must have different ulterior motives. For instance, their reason could be something personal or it could be for their personal gain, which is the common ulterior motive of scammers.” Respondent 9 “In terms of being an ABM student, we *Theft Prevention have this notion called privacy, which means that not all data should be conveyed. I assume that keeping our data safe from intruders is for our own good.” “Maybe because that's their usual way of *For Personal Gain finding means to live” Respondent 10 “Well based on my perspective, we need to *Theft Prevention protect our data from intruders to prevent 27 problems like cyber-attacks, and also to * Advantageous for the Business protect your reputation.” “I think the reason why intruders steal *For Personal Gain data, is to steal your identity. That makes them commit identity theft.” Determining the reasons behind the malicious acts of intruders and the reasons why data must be protected both play vital roles in the study as both of it improve the different aspects of businesses and increase the chance of businesses to succeed. The following labels or initial codes are shown in Table 3: ● Theft Prevention (10) ● Advantageous for the Business (2) ● For Personal Gain (10) The responses of the participants have shown their insights on why intruders steal vital data and information and why it is truly important to protect data from malicious intruders. The first label/initial code is "Theft prevention", which has been stated by all of the respondents. They believe that having data security incorporated in businesses will increase the integrity of its security and prevent valuable information from being stolen and used in illegal activities. According to Pearson (2019), Human resources data are information that can be about the employees, client transaction data, case information; lots and lots of data that is private and valuable. The answer to protecting data as a small business is to implement layers of security. Most businesses fail in this aspect because they only have one or two layers, or they have improperly implemented the layer they have put into place, leaving their data exposed. The second label/initial code is "Advantageous for the Business", which has been stated by 2 of the respondents. They trust that having data security in businesses is advantageous as it's able to preserve the good reputation of the business and helps prevent cyber attacks that could damage or destroy the business. According to Kim et al. (2016), One of the most important things that information security professionals try to protect is their organization's reputation and brand image. Companies that suffer from security breaches and malicious attacks that expose any asset are likely to face serious negative consequences in the public eye. For example, a security breach that allows an attacker to steal customer credit card data and distribute that data internationally would do significant harm to that company's reputation and brand image. Even if the company's response were swift and solved the problem effectively, the negative public perception of the company and its brands could lead to a decline in the organization's revenues, net worth, and market capitalization. The third label/initial code is "For personal gain", which has been stated by all of the respondents. They think that intruders and criminals steal valuable data to fulfill their own ulterior motives such as earning money from it, using it for illegal activities, and to destroy one's 28 reputation. According to Minick (2017), hackers steal customer information to sell it on a black market. These sites are places where carders - people who actively trade stolen credit card information - gather to buy, sell and trade their wares. Similarly, Cyber thieves are beginning to steal not just credit cards, but information that can be used for identity theft. Credit cards eventually expire and can be turned off, but stealing a person's identity is the gift that keeps on giving. Purchasers of identities on these black markets can create new accounts and file false tax returns years after they steal the original information. Based on the codes generated, the researchers now formulated the themes of why it is essential to protect data from malicious intruders. The themes formulated are the following: ● To avoid data loss from intruders, which they use for their own benefit. This theme was formulated based on the given codes from the data. Responses of the respondent shows that when malicious intruders have accessed the business' private data, they will use it for their own benefits such as selling it to other companies or destroying the business’ reputation. Now, this theme was also formulated based on the formulated codes and the researchers analyzed and sorted the codes and came up with this theme since all of the codes talk about the avoidance of data loss from intruders which they use for their own benefit. 29 CHAPTER V SUMMARY, CONCLUSION, AND RECOMMENDATION This chapter presents the summary of the problems, the conclusions drawn from the findings as well as the recommendations based on the conclusions. Summary of the Problem The study focused on understanding the perception of grade 12 ABM students in Buting Senior High School regarding the importance of data security in businesses. This study uses a qualitative research method and uses a Descriptive research design to further focus on understanding the students' different perspectives about the importance of Data Security in businesses. This study was conducted at Buting Senior High School located at Pasig City. With no specific age required as long as they are Grade 12 ABM students from Buting Senior High School, they are able to participate in this study conducted by the researchers. Using the Purposive sampling technique, researchers are able to select students that fit to participate for the purpose of this study. The chosen students are to answer questions through an online interview. Questions constructed are to answer how do students, who aspire to own a business, benefit from having data security incorporated in their business, how does data security, in the opinion of students, protect the private information of customers and business and why is it essential that data must be protected from malicious intruders? Moreover, the researchers have also focused on acknowledging the benefits that students who aspire to have their own business can acquire from having data security incorporated in their business, the ways how data security works in protecting data and private information of customers and businesses, and the essentiality of protecting data from malicious intruders. Thematic analysis was used in this study to analyze the data from the respondents after gathering each respondent's data. This was used by the researchers to obtain information about the students' perception about the importance of data security in businesses. Findings The salient findings of the study are as follows: 1. How do students benefit from having data security in their businesses? 1. Findings show that students think that they benefit from data security in many different ways; however, the most prominent benefit that students think they would gain from having data security is the ability of it to reduce problems that companies have to deal with. Second most prominent benefit that students think they would benefit from data security is its ability to avoid important data from being leaked and to make data safe from the intruders who want 30 to steal it, providing safety and security to the rightful owners of data and information preventing them from being victims of data theft related crimes. The third one is its ability to provide confidence when doing business as having data security makes one feel secure that no valuable data and information would be accessed and stolen by an unauthorized person. Lastly, the least prominent benefit from the data is its ability to attract potential investors, since using data security makes business owners confident that the data is secured allowing data to improve business performance which then leads to attracting potential investors. 2. How does data security, in the opinion of students, protect the private information of customers and business 2. Findings show the perception or opinion of the students on how data security protects the information of customers and businesses in many different ways; however, the most prominent way, in their opinion, is through encrypting data. The second-most prominent opinion of students on how data security protects the private information of customers and businesses is by keeping your network safe. The third one is by making data and information confidential. And lastly, the least prominent opinion is through the use of software, since adding software such as anti-malware software and virus scanners would be able to secure the private data of customers and business-related information. 3. Why is it essential that data must be protected from malicious intruders? 3. Findings show that it is truly essential to protect data from malicious intruders. The most prominent reason why students think that it's important to protect data is for theft prevention, it indicates that having data security would prevent data such as contact information, address, and other personal information that we own from being stolen by data intruders. The second most prominent reason is that intruders use the data they steal for their own personal gains, not protecting data gives them the freedom to steal it and use it for doing illegal activities, earning money, their ulterior motives, scam people, and blackmailing the owner of the data or information. The least prominent reason is that it is advantageous for businesses for the reason that malicious attacks from intruders would be prevented benefiting businesses in terms of their security and stability. Conclusions Based on the findings, the researcher concluded the following: 1. The researchers conclude that the grade 12 ABM students benefit from Data Security incorporated into their business operations in various ways such as; reducing problems that companies deal with, avoiding important data from being leaked, being safe from intruders and hackers, providing confidence when doing businesses, makes business less risky to operate, and lastly but not least is it attracts potential investors. 2. The researchers conclude that the opinions of students on how data security protects the private information of customers and businesses is based on their knowledge on how data security works. The respondents gave different opinions, the highest, which is nine, answered 31 through encrypting data. Six of the respondents answered by keeping your network safe. Three of the respondents answered by making data and information confidential. The lowest opinion given by the respondent, which is two, is through the use of software. 3. The researchers conclude that the perspective of grade 12 ABM students on why it is essential to protect data from intruders is to avoid data loss from intruders which they use for their benefit. Aside from that, protecting data provides an advantage for businesses since they can use their data to improve their businesses while being confident that it is protected through Data Security. Recommendations Based on the findings and conclusions, the following are recommended: 1. Students' responses indicate that they are aware of the potential risks of not implementing data security in a business, but their perspective may be limited because there are numerous ways to protect confidential data. As a result, students should study more on their organization to further solidify their knowledge and increase the chances of implementing such data security in their future businesses, because the type of security that will be implemented will depend on the type of market they will be pursuing. This will assist them in comprehending the various methods of safeguarding their establishment's critical data. It is also recommended that they share their thoughts with students and teachers of the ICT strand to get their second opinion on the topic at hand since they are more knowledgeable in this type of field. 2. The use of technology in businesses has been rapidly increasing in amount, as a result many intruders have generated new ways on how to exploit businesses' data to their own liking. Because this is the case, students who intend to own a business in the future should take lessons on handling and configuring their establishment's security so that they are more aware of handling their businesses' confidential data and can take a more hands-on approach when it comes to protecting their consumers' and businesses' private data. 3. Either small and flourished business owners in order to raise their awareness of managing confidential data & practically assessing their customers and enterprises demand for secured information, then a checklist from their future business plan must enroll courses that support installation of digital security features in their marketplace. Furthermore, a business of high confidence in terms of reliability and credibility must maintain their regular security checks annually and to marginally change their systematic data protection policy, thus malicious attempts will less likely intervene their business. 4. Respondents must formulate a pre and post knowledge in order to expand their likelihood of filling an empty gap in data security issues that their institution may potentially face in the future. Additionally, the ABM respondents should have proposed an ideal approach to discuss a crucial recommendation on ICT strand students and academic advisors for them to be able to get a second opinion. 32 5. The researchers recommend that businesses must train their employees to increase data privacy awareness. Regular training on password security, phishing emails, malware, and physical security can help companies or businesses to minimize the risk of a data breach due to employee negligence. 6. Businesses have a great impact in our society, they need to protect essential data not only to protect their business, but also to protect the identity of their clients and employees. The researchers recommend that businesses must keep the software up to date to remove critical vulnerabilities that hackers use to access the devices. 33 REFERENCES Balzer, F., Bollig, B., & Binckebanck, L. (2017). Perception of Data Security in e-Commerce. Hochschule Furtwangen. Retrieved on Oct. 16, 2022 from https://d-nb.info/1139774573/34 Bharwaj, P. (2022). What Is Data Leakage and How Can You Prevent It?. Retrieved on December 4, 2022 from https://www.makeuseof.com/what-is-data-leakage-and-how-can-youprevent-it/ Business. (2021). Protect your business from cyber threats. Retrieved on December 4, 2022 from https://business.gov.au/online/cyber-security/protect-your-business-from-cyber-threats Caulfield, J. (2019). How to Do Thematic Analysis | Step-by-Step Guide & Examples. Retrieved on Oct. 27, 2022 from https://www.scribbr.com/methodology/thematic-analysis/ CareCheck. (n.d.). Confidentiality – Why Is It Important?. Retrieved on December 6, 2022 from https://www.carecheck.co.uk/confidentiality-why-is-it-important/ CFI Team. (2021). Data Security. Retrieved on October 21, 2022 from https://corporatefinanceinstitute.com/resources/knowledge/data-analysis/data-security/ Chavez, F. & Poblador, R. (2021). Contributors of Security Management Practices Among Jail Officers in Kidapawan City. Retrieved on Oct. 19 from https://cmc.edu.ph/research/index.php/journals/article/view/27 Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 1165-1188. Retrieved on September 22, 2022 Chen, J. (2021, October 31). Agency Security. Retrieved on September 22, 2022 from https://www.investopedia.com/terms/a/agencysecurities.asp/ Computronix. (n.d.). Why Is Network Security Important To Organizations And Businesses. Retrieved on December 6, 2022 from https://computronixusa.com/why-is-network-securityimportant-to-organizations-and-businesses/ Dalimunthe, R. (2019). Understanding the types of data in a business/organization. Retrieved on October 11, 2022 from https://towardsdatascience.com/understanding-the-types-of-data-ina-business-organization-67d7cb9914bd Fleckenstein, M., & Fellows, L. (2018). Data Security. Retrieved on October 21, 2022 from doi:10.1007/978-3-319-68993-7_15 Foerderer, J., & Schuetz, SW. (2022, Feb 15). Data Breach Announcements and Stock Market Reactions: A Matter of Timing [Abstract]. Retrieved on September 9, 2022 from 34 https://pubsonline.informs.org/doi/abs/10.1287/mnsc.2021.4264 Foote, D. (2020). A Brief History of Data Security. Retrieved on October 6, 2022 from https://www.dataversity.net/brief-history-data-security/?fbclid Frankenfield, J. (2022). Data Analytics: What It Is, How It's Used, and 4 Basic Techniques. Retrieved on October 13, 2022 from https://www.investopedia.com/terms/d/data-analytics.asp Fruhlinger, J. & Pratt, M. (2019). What is business intelligence? Transforming data into business insights. Retrieved on October 13, 2022 from https://www.google.com/amp/s/www.cio.com/article/272364/business-intelligence-definitionand-solutions.html/amp/#ip=1 Global knowledge. (2022). Cyber Security Glossary of Terms. Retrieved on October 13, 2022 from https://www.globalknowledge.com/us-en/topics/cybersecurity/glossary-of-terms/#gref Guest Blogger. (2019). The Online Entrepreneur’s Guide to Data Security & Privacy. Retrieved on September 28, 2022 from https://www.botreetechnologies.com/blog/the-online-entrepreneurs-guide-to-data-securityprivacy/ Hart, J. (2018). Lack of confidence in data security can cost you more than you think. Retrieved on December 6, 2022 https://www.csoonline.com/article/3290379/lack-of-confidence-in-datasecurity-can-cost-you-more-than-you-think.html Hisrich, R., & Ramadani, V. (2018, Oct 26). Chapter 1: Entrepreneurial marketing: Entrepreneurship and marketing interface. Retrieved on October 6, 2022 from https://www.elgaronline.com/view/9781788111317/chapter01.xhtml#:~:text=Entrepreneurial% 20marketing%20is%20proactive%20identification,resource%20leveraging%2C%20and%20valu e%20creation Hu, L. (2019). E-commerce Trade Consumption Payment Security and Privacy Based on Improved B2C Model. Int. J. Netw. Secur., 21(4), 545-550. http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p545-550.pdf IBM. (n.d.). What is data security?. Retrieved on October 21, 2022 from https://www.ibm.com/ph-en/topics/data-security Indeed Editorial Team. (2022, April 2). What Is Data in Business?. (Plus Importance and Examples). Retrieved in September 22, 2022 from https://www.indeed.com/career-advice/career-development/data-in-business Intellipaat. (2022). The Importance of Data Security in 2022. Retrieved on September 25, 2022 from https://intellipaat.com/blog/importance-of-data-security/?fbclid 35 Isaak, J., & Hanna, M. J. (2018). User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer, 51, (56-59). Retrieved on September 22, 2022 from https://doi.org/10.1109/MC.2018.3191268 Johnson, K. (2018). Data Encryption: Why You Should Protect Your Business. Retrieved on December 4, 2022 from https://www.aureon.com/services/it-management/itservices/security/data-encryption-why-you-should-protect-your-business/ Joshi, S. (2022) Data Security. Retrieved on October 26, 2022 from https://www.g2.com/glossary/data-security-definition Kim, D., Solomon, M. (2016). Fundamentals of Information Systems Security. Retrieved on December 05, 2022 from https://books.google.com.ph/books?id=Yb4eDQAAQBAJ&pg=PA78&dq=how+data+security+pr otects+a+company%27s+image&hl Knight, S. (2020). Strategies to Reduce Small Business Data Security Breaches. Retrieved on October 20, 2022, from https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Strategies+to+Reduce+Small+Bu siness+Data+Security+Breaches&btnG=#d=gs_qabs&t=1666284032789&u=%23p%3D2qfZIXr kn14J Kurtus, R. (n.d.). Theory of Security. Retrieved on October 06, 2022 from https://www.schoolfor-champions.com/security/theory_of_security.htm#.Yz7LM7cRUVH Leonard, K. (2018, October 25). The Role of Data in Business. Retrieved on September 22, 2022 from https://smallbusiness.chron.com/role-data-business-20405.html Levitin, G., Xing, L., & Dai, Y. (2021). Security and reliability of N-version cloud-based task solvers with individual version cancellation under data theft attacks. Reliability Engineering & System Safety, 216, 107920. Retrieved on October 20, 2022, from https://doi.org/10.1016/j.ress.2021.107920 Massarczyk, E., Winzer, P. (2017, June 30). Influence of the Perception of Data Security and Security Importance on Customer Usage of Internet Services. Retrieved on Oct. 17, 2022 from http://personales.upv.es/thinkmind/IntTech/IntTech_v10_n12_2017/inttech_v10_n12_2017_1.h tml McCombes, S. (2019, May 15). Descriptive Research | Definition, Types, Methods & Examples. Retrieved on Nov. 31, 2022 from https://www.scribbr.com/methodology/descriptive-research/ McCullough, D., & Medina, B. (2019, September 20). What Is Entrepreneurship?. Retrieved on October 6, 2022 from https://fee.org/articles/what-is-entrepreneurship/ 36 Minick, B. (2017). Facing Cyber Threats Head On: Protecting Yourself and Your Business. Retrieved on December 05, 2022 from https://books.google.com.ph/books?id=EGrEDQAAQBAJ&pg=PA52&dq=how+hackers+steal+c redit+card&hl Mohr, H., Walter, Z. (2018). Consumer Perception of Data Security: A Trust Transfer Perspective. Retrieved on Jan. 31, 2023, from https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Consumer+Perception+of+Data+ Security%3A+A++Trust+Transfer+Perspective+&btnG=#d=gs_qabs&t=1675164033465&u=%2 3p%3DpdNZ--ZEnFcJ Mukherjee, S. (2019). Overview of the Importance of Corporate Security in business. Retrieved on October 20, 2022, from http://dx.doi.org/10.2139/ssrn.3415960 Network Depot. (2017). Virus and Malware Solutions for Your Business. Retrieved on December 6, 2022 from https://www.networkdepot.com/virus-and-malware-solutions/ Pearson, J. (2019). Essential Cyber Security for Your Small Business: How to Protect Your Small Business from Cyber Attacks, Hackers, and Identity Thieves Without Breaking the Bank. Retrieved on December 05, 2022 from https://books.google.com.ph/books?id=MJ6mDwAAQBAJ&printsec=frontcover&dq=importance +of+data+security+in+business&hl Pleger, L., Guirguis K., & Mertes A., (2021). Making public concerns tangible: An empirical study of German and UK citizens’ perception of data protection and data security. Retrieved on Oct 18, 2022 from https://www.sciencedirect.com/science/article/pii/S0747563221001539 Promsri, C. (2015). Passengers’ Perception Towards Physical Security Measures of Suvarnabhumi Airport Rail Link Service. Retrieved on Oct. 19, 2022 from https://www.researchgate.net/publication/273353102_Passengers'_Perception_Towards_Physic al_Security_Measures_of_Suvarnabhumi_Airport_Rail_Link_Service Swift Systems. (n.d.). Business Benefits Of Offering Data Protection. Retrieved on December 6, 2022 https://www.swiftsystems.com/guides-tips/benefits-of-data-protection/ Statista Research Department. (2022). Number of incidents of data breaches in the Philippines in 2020 and 2021(in millions). Retrieved on October 12, 2022 from https://www.statista.com/statistics/1271333/philippines-number-of-data-breaches/?fbclid Streefkerk, R. (2019, April 12). Qualitative vs. Quantitative Research | Differences, Examples & Methods. Retrieved on Oct 25, 2022 from https://www.scribbr.com/methodology/qualitativequantitativeresearch/#:~:text=A%20rule%20of%20thumb%20for,(concepts%2C%20thoughts%2C%20experi ences) 37 Tibco. (2022). What is Transactional Data?. Retrieved on September 8, 2022 from https://www.tibco.com/reference-center/what-is-transactionaldata#:~:text=Transactional%20data%20is%20information%20that,qualities%20associated%20 with%20the%20transaction. Tierney, M. (2021). Data Security Explained: Challenges and Solutions. Retrieved on December 6, 2022 from https://blog.netwrix.com/2021/07/26/data-security/ Tham, J., Yazid, M.S.A, Khatibi, A.A, & Azam, F. (2017). INTERNET AND DATA SECURITY-UNDERTANDING CUSTOMERS PERCEPTION ON TRUSTING VIRTUAL BANKING SECURITY IN MALYSIA. Retrived on October 20, 2022 from https://en.calameo.com/read/0047058165b73e03036b9 The Upwork Team. (2021, August 23). What Is Data Security? Why Data Security Is Important for Your Business. Retrieved on September 22, 2022 from https://www.upwork.com/resources/data-security Trends, M. (2021). Why investing in cybersecurity makes sense?. Retrieved on December 4, 2022 from https://www.analyticsinsight.net/why-investing-in-cyber-security-makes-sense Voxco. (2021, Sept. 29). Descriptive Research Design. Retrieved on Nov. 30, 2022 from https://www.voxco.com/blog/descriptive-research-design/ Zeng, W. (2019). A methodology for cost‐benefit analysis of information security technologies. Concurrency and Computation: Practice and Experience, 31(7), e5004. Retrieved on October 20, 2022, from https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Data+security+technologis+appli ed+on+businesses&btnG=#d=gs_qabs&t=1666259926809&u=%23p%3Dp6s6rBe9j7wJ 38 APPENDICES Consent Form signatured by Principal 39 Interview Questions Participants Forms 40 Participants Forms 41 42 43 44 45 46 47 48 49 50 Resume 51 52 53 54 55 56 57 58