Uploaded by Llanes Kurt Luis E.

Thesis

advertisement
BUTING SENIOR HIGH SCHOOL
A. Santos St., Buting, Pasig City
Students' Perceptions About the Importance of
Data Security in Businesses: A Descriptive Study
A Thesis Proposal
Presented to
The Faculty of the Buting Senior High School
by
Benitez, Jane Marinel
Divina, Brycenkirt Quitoles
Francisco, Paul Justin
Ison, Harold
Llanes, Kurt Luis
Malanay, Jason Del Pilar
Soria, Marc Angelo
Yutuc, Kishiel Faith
Grade 12 Information and Communication Technology (ICT) - A
S.Y. 2021-2022
TABLE OF CONTENTS
Dedication
Abstract
ix
Chapter 1 – The Problem and Its Setting
Introduction
1
Background of the Study
1
Framework of the Study
3
Statement of the Problem
5
Assumptions
5
Definition of Terms
5
Significance of the Study
6
Scope and Limitation of the Study
7
Chapter 2 – Review of Related Literature and Studies
Data Security Technologies Applied in Business
8
Perception on Data Security in Different Industries
10
Synthesis
12
Chapter 3 – Research Methodology
Research Design
13
Research Locale
13
Participants of the Study
13
Research Instrument/s
14
Data Gathering Procedure
14
Treatment of Data
14
Data Analysis and Interpretation
15
Chapter 4 – Presentation, Analysis, and Interpretation of Data
16
Chapter 5 – Summary, Conclusion and Recommendation
30
References
34
Appendices
39
Dedication
We dedicate this research to the students who participated in this study, for their
valuable insights and perspectives on the importance of data security in businesses. Their
participation has greatly contributed to our understanding of this important issue and their
willingness to share their thoughts and experiences is greatly appreciated. We also dedicate this
research to the future business leaders and entrepreneurs, as the findings of this study will help
them to be more aware of the importance of data security, in order to protect the sensitive
information of their customers and employees. And, to all the victims of data breaches, that this
research may bring awareness and help to prevent future data breaches. In addition to the
students and future business leaders, we also dedicate this research to the body of knowledge
on data security in businesses. The findings of this study will contribute to the ongoing
conversation and understanding of the importance of data security in today's digital age. We
hope that our research will serve as a valuable resource for professionals and organizations in
their efforts to protect sensitive information and prevent data breaches. We also dedicate this
research to the future researchers who will continue to explore this topic, and build upon the
foundation laid by our study.
Abstract
This study focuses on determining the perceptions of grade 12 ABM students about the
importance of Data Security in Businesses. Specifically, on how students who aspire to own a
business will benefit from having Data Security in their businesses, how Data Security protects
the information of customers and businesses, and lastly, why is it essential that data must be
protected from intruders. This study uses a descriptive research design with a qualitative
method and was conducted at Buting Senior High School located in Pasig City. There are 10
participants in this study and were gathered through the Purposive Sampling technique. This
study also uses the interview as our research instrument to gather the information that will be
needed in this study. And were analyzed through thematic analysis. Based on our findings
researchers conclude that the grade 12 ABM students benefit from Data Security incorporated
into their business operations in various ways such as; reducing problems that companies deal
with, avoiding important data from being leaked, being safe from intruders and hackers,
providing confidence when doing businesses, makes business less risky to operate, and lastly
but not least is it attracts potential investors. Researchers also concluded that the opinions of
students on how data security protects the private information of customers and businesses are
based on their knowledge of how data security works. The respondents gave different opinions,
the highest, which is nine, answered through encrypting data. Six of the respondents answered
by keeping your network safe. Three of the respondents answered by making data and
information confidential. The lowest opinion given by the respondent, which is two, is through
the use of the software. And lastly, the researchers also concluded that the perspective of grade
12 ABM students on why it is essential to protect data from intruders is to avoid data loss from
intruders which they use for their benefit. Aside from that, protecting data provides an
advantage for businesses since they can use their data to improve their businesses while being
confident that it is protected through Data Security.
ix
CHAPTER I
THE PROBLEM AND ITS SETTING
Introduction
Big data is a significant asset for your company when developing more efficient methods
for attracting and keeping clients. However, if this data falls into the wrong hands, it may spell
disaster (The Upwork Team, 2021). This is why securing data is important for an entrepreneur,
because data must be kept within an organization or company and not shared with anyone
because it is confidential data, and also to avoid data breaches.
The vast majority of people nowadays are connected to a worldwide system of computer
networks. This opens an opportunity for entrepreneurs to make innovative ideas and convert
these ideas into profit making business ventures. But, in order to make successful products and
services as well as meaningful decisions on where to start, they need to gather a fair amount of
user data to analyze. Business intelligence and analytics, which are commonly referred to as the
techniques, practices, and applications that evaluate critical business data to help an enterprise
quickly identify its market and make timely investment choices, have become extremely popular
as a result of the opportunities associated with data and analysis in many organizations (Chen
et al., 2012).
Data's role is to enable business leaders to make decisions based on facts, trends, and
statistical figures (Leonard, 2018) and as more firms go online, data has become an essential
resource (Indeed Editorial Team, 2022) that can assist a company in learning more about clients'
preferences, grievances, and daily operations. As many know, data is vital for businesses and is
the foundation of an entrepreneur or businessman's decision, that's why such a valuable asset
should be properly secured to avoid any compromises. An example of such is when Facebook got
compromised and released unrestricted access of private data of over 87 million unaware
Facebook users, which gained growing interest in the discussion of how technology affects
society and poses hazards to people's privacy and well-being (Isaak and Hanna, 2018).
This study aims to determine the perception of grade 12 ABM students about the
importance of Data Security in Business.
Background of the Study
Data security is one component of a company's overall data strategy. Data security is
frequently defined as delivering the right information to the right people at the right time
(Fleckenstein & Fellows, 2018). In addition, data breach is the illegal access to data, usually for
the purpose of reading or copying the information (Foote, 2020). As CFI Team (2021) stated that
the foremost purpose of data security is to safeguard organizational data, which includes trade
1
information and customer information. Cybercriminals may gain access to the data for malicious
purposes, jeopardizing customer privacy. Data breaches can occur because of inadequate data
security practices, exposing organizations to financial loss, a decrease in consumer confidence,
and brand erosion. When customers lose trust in a company, they are more inclined to move
their business elsewhere, devaluing the brand. Breaches that result in the loss of trade secrets
and intellectual property can have a long-term impact on an organization's ability to innovate
and remain profitable (Guest Blogger, 2019).
However, when correctly implemented, strong data security plans safeguard an
organization's information assets not just from cybercriminal activity, but also from insider
threats and human mistake, which are still among the primary causes of data breaches today.
Data security entails deploying tools and technologies that improve the organization's visibility;
These tools should be able to apply safeguards such as encryption, data masking, and sensitive
file redaction, as well as automate reporting to streamline audits and ensure compliance with
regulatory requirements (IBM, n.d.). It is important for entrepreneurs to secure data to prevent
their clients' personal information from being exposed and to be protected from cyber-attacks.
Entrepreneurs need to keep the important information they have safe and protected for their
company, income, an old the trust of their clients or customers.
In a business, there are different types of data that are important and need to be protected
by cyber-attacks. Transactional data is data that describes the core business; this is production
data for the manufacturing company. The master data is primary transactional data, which
includes places (addresses, cities, countries), parties (customers, suppliers, employees), and
things (products, assets, items, etc.) Reference data is master data subset references, it's
codified, standardized data. Reporting data is a compilation of analytic and reporting data that
is strategic and used in decision-making. Metadata shows when and where the data was
collected, and it answers questions that data alone cannot answer (Dalimunthe, 2019).
Confidential data, including client information, credit card details, and trade secrets, may be
present in stolen data. A cyberattack is far more violent, hackers attempt to disable or demolish
a computer system or network (Foote, 2020).
Formal research is being done to determine whether markets’ lack of responsiveness
might be attributed to companies purposefully timing announcements to fall on media-busy
days, which would deflect attention and in turn, dampen market responses. Data breaches are
reported 4.44% more frequently on days with one standard deviation more predictable news
pressure (or approximately 19.024 data records). Significant breaches that expose healthcare
data or passwords, entail firm-internal elements, and are timed strategically are more common.
(Foerderer & Schuetz, 2022). According to the Statista Research Department (2022), in 2021,
around 4.59 million data breaches would have been recorded in the Philippines, a decline of
approximately 89% compared to the 43.19 million reported in the previous year. It indicates the
number of data breaches that occurred in the Philippines in 2021 compared to the previous year.
For any business, data is a priceless resource that is generated, acquired, saved, and exchanged.
A corporation may avoid financial loss, reputational damage, a decline in consumer trust, and
brand erosion by safeguarding it from internal and external malfeasance and unauthorized
access (IntelliPaat, 2022).
2
Framework of the Study
Input
Process
Part 1: Demographics
● Age
● Gender
● Grade-Level
● Strand
Part 2.
● Benefits of Data
Security
● Importance of
Protecting Data
● Students Perception
of Data Security
Output
● Collecting data through
● Perception of the Students
interviewing students for
about the importance of Data
information
Security in Business.
● Findings of the data
● Organization of Data
gathered and analyzed by
the authors
● Analyzation of Data
● Conclusions and
recommendations of the
● Interpretation of Data
authors based on the results
and findings that have been
found.
Figure 1. Conceptual Framework of the Study
The first frame, which serves as the study's input, includes the information about the
students who will be this study's respondents, such as age, gender, grade level, and strand. The
Benefits of Data Security, Importance of Protecting Data, Students Perception of Data Security
are also the variables that will be used to arrive at the results. The researchers will gather this
information and utilize it to perform the next step. The second frame is the process of this study,
which consists of the collection of data, organizing data, analysis of data, and interpretation of
data. Here, the data collected will be organized, analyzed, and interpreted so that this
information can be used effectively to make the study plausible. And finally, the third and last
frame is the output of the study, which is the deciding relevance of data security for
entrepreneurs, as well as the conclusions and recommendations that are provided by the authors
based on the results and outcome of the process section of the study.
Theoretical Framework
This study is anchored by the Theory of Security by Kurtus (n.d.), which emphasizes the
need to understand potential attack types, attack reasons, and your connection to those
motivations. This theory first discusses the different types of potential assaults that require
security, such as attacks on people (which may be intended to harm them physically,
psychologically, or even kill them), attacks on property (which may cause property damage to a
person), and attacks on organizations (which may involve attempts to subvert the structure of
the organization or to take control of it by force or deception). Secondly, it also discusses what
you should do to counter such dangers, such as protecting yourself and knowing the possible
vulnerabilities that can be attacked. And lastly, it discusses the many different
countermeasures you can employ, such as; having a pre-emptive attack, making it difficult to
3
attack, and Threatening a counter-attack to people who want to attack you, your property, or
your organization. Additionally, according to this theory, the reason why a criminal may aim to
hurt another person, property, or organization for a multitude of motives, including personal
gain, personal vengeance, supporting a cause, or merely for kicks or pleasures. You may often
detect a genuine threat to your security by linking the motives of criminal-mined persons to
your position.
Now, since data is so vital for a business and entrepreneurs, keeping them secure through
data security is an excellent choice. And based on the theory of Security by Kurtus (n.d.), some
criminally minded persons may attempt to steal this data for various reasons since they might
know how vital it is for a Business. They could get money from it, destroy an organization or
business reputation, take personal revenge on someone, etc., and these reasons are the
motivations of criminals by which security is needed to be used according to this theory. This
theory also emphasized the countermeasures that can be applied to defend such valuable things,
such as making it difficult to attack, having a pre-emptive attack, or threatening a
counterattack; having Data Security falls into one of these countermeasures that this theory
highlighted, which is making it difficult to attack.
A study that was carried out by Chavez and Poblador (2021) and was given the title
"Contributors of Security Management Practices Among Jail Officers in Kidapawan City" aims
to determine the leadership behavior and organizational commitment and its effect on security
management practices of Jail Officers in Kidapawan City. This research makes use of the same
theory of security that was developed by Kurtus (n.d). And they found in their findings that
there is a significant relationship between leadership behavior and security management
practices. This denotes that the increase in leadership behavior would also likely increase
security management practices. Similarly, there is a significant relationship between
organizational commitment and security management practices. This further suggests that
when organizational commitment goes up, security management practices also go up. These
findings make the authors conclude that leadership behavior and organizational commitment
have a positive contribution to the security management practices of jail officers.
Another study by Promsri (2015). Entitled "Passengers' Perception Towards Physical
Security Measures of Suvarnabhumi Airport Rail Link Service," uses the same theory by Kurtus
(n.d.) to examine the differences between passengers according to their gender, marital status,
age, educational level, and frequency of use in assessing security risk measures of
Suvarnabhumi Airport Rail Link. This study highlights physical security measures that affect
travelers' perceived safety. The Suvarnabhumi Airport Rail Link has numerous security officers
at stops and on trains to oversee passenger safety and security. In analyzing Suvarnabhumi
Airport Rail Link security, independent t-tests indicated no significant mean differences
between male and female passengers or marital status. Gender and marital status didn't affect
Airport Rail Link safety. Analysis of variance (ANOVA) showed statistically significant
differences at the 0.05 level among passengers of different ages, educational levels, and service
usage frequencies for perceived Suvarnabhumi Airport Rail Link security. Older clients are
more inclined to worry about Airport Rail Link's security than younger ones. Higher-educated
travelers are more aware of Airport Rail Link, therefore they pay greater attention to security.
4
More frequent Airport Rail Link travelers checked security than infrequent riders. They
scanned the environment and noticed security measures at stations and on trains.
Statement of the Problem
This study aims to determine the perception of grade 12 ABM students about the
importance of Data Security in Business. Specifically, this study aims to discover the following:
1. How do students, who aspire to own a business, benefit from having data security
incorporated in their business?
2. How does data security, in the opinion of students, protect the private information of
customers and business?
3. Why is it essential that data must be protected from malicious intruders?
Assumption
The researchers assume that the students will implement Data Security when they have
their own type of businesses.
1. The students are aware of the uses of Data Security and know that owners will reap its
benefits when they implement it in their businesses.
2. The students believe that securing data is the most important priority in running a business.
3. The researchers assume that the students will implement Data Security when they have their
own type of businesses.
Definition of Terms
1. Analytics - Focused on extracting insights from data. It comprises the processes, tools
and techniques of data analysis and management, including the collection, organization,
and storage of data (Frankenfield, 2022).
2. Business Intelligence - Business intelligence comprises gathering, processing, and
presenting actionable data based on the workings and performance of the company
(Fruhlinger & Pratt, 2019).
5
3. Data Breach - A data breach (also known as data spill or data leak) is unauthorized
access and retrieval of sensitive information by an individual, group, or software system.
It is a cybersecurity mishap that happens when data, intentionally or unintentionally,
falls into the wrong hands without the knowledge of the user or owner (Frankenfield,
2022).
4. Cybercrime - An attempt to damage business processes, exploiting flaws, monitoring
targets, interrupting business tasks, extracting value, causing damage to logical or
physical assets and destroying the integrity of the data and stealing controlled
information (Global Knowledge, 2022).
5. Data Security - It is focused on protecting data from unauthorized access or malicious
attacks. It enables businesses to set preventive measures using different technologies and
practices to ensure data privacy (Joshi, 2022).
6. Entrepreneurship - It is the process of developing, acquiring, and commercializing a
concept, technology, good, or service while also taking on the accompanying risks and
benefits (McCullough & Medina, 2019).
7. Entrepreneurial Market - Innovative approaches to risk management, resource
leveraging, and value generation are the foundation of entrepreneurial marketing, which
is the proactive identification and exploitation of chances for attracting and retaining
lucrative clients (Hisrich & Ramadani, 2018).
8. Security Agency - They carry out intelligence operations for a country's internal
security, as a response for imposed malicious threats commonly linked from cyberattacks
(Chen, 2021).
9. Transactional Data - It is the information that has been gathered from transactions. It
captures crucial information to create a succinct background explanation (Tibco, 2022).
Significance of the Study
The continuous growth of businesses comes with a risk of data hacking and cyber-attacks.
Data holds a huge value for consumers and entrepreneurs as information about them is included
in their data. To protect the data and information of entrepreneurs, businesses, and consumers,
data security is heavily needed. This study is made to determine the importance of data security
to entrepreneurs and businesses. This research study would be beneficial for the following
groups and sectors.
Students - With this study, students would be able to gain prior knowledge that is
relevant to their choices when they create their own businesses. This study would help them
determine the importance of data security in businesses, thus, making them knowledgeable of
the things that they should do once they decide to start their own business. This study would
6
serve as a guide for them to build a foundation for their chosen business and help them learn
the importance of one big part of a business which is data security.
Entrepreneurs - Entrepreneurs would benefit heavily from having data security.
Having data security for their businesses would be a great start for them. With them having
data security, they would be able to protect and secure their data and information making it
safe from hackers which could bring them down. Furthermore, consumers would be interested
in businesses that have data security set up and prioritized by the entrepreneurs as this would
make them feel comfortable about having a transaction with entrepreneurs or the business,
making the entrepreneur or business earn sales.
General Public - With this study, the general public would learn and be informed of how
valuable their data is. They will also learn that there is a thing such as data security, how it
works, and that it holds a high value to them. They will be knowledgeable of various forms of
cyber-attacks. Furthermore, the general public would pay more attention to their data
protection whenever they involve themselves in businesses, access their services, and buy their
goods.
Data Security Analysts - With data security being important to entrepreneurs and
businesses, data security analysts would be more in-demand, therefore making them have a
huge array of job opportunities. Furthermore, they would be able to innovate and improve their
work as tech continuously grows and the demand for the best data security increases within
businesses.
Future Researchers - This study will be able to help future researchers to further
improve their study and this study will also be able for them to use as a reference of ideas that
might be able to help them construct their studies.
Scope and Limitation of the Study
This study focused on the perception of grade 12 ABM students about the importance of
data security when it comes to protecting confidential data from outsiders who want to obtain
it. The target respondents of this are Grade 12 ABM students at Buting Senior High School that
engage or relate themselves to entrepreneurship, there is no specific age required as long as
they are Grade 12 ABM students. This study was conducted at Buting Senior High School where
the researchers conducted a Descriptive Study concerning the importance of data security to
entrepreneurs in securing their private data and information involving Grade 12 ABM students
from September 2022 to June 2022.
7
CHAPTER II
REVIEW OF RELATED LITERATURE AND STUDIES
This chapter presents the relevant literature and studies that the researcher considered
in strengthening the claim and importance of the present study.
Data security technologies applied in business
Businesses targeted by data security breaches may deal damage to their reputation and
remediation costs. It's vital to understand several data security strategies for businesses to
protect and secure company's data and consumers' personal information. It is also said that
technology leaders have reported an increase in data security threats in organizations with the
use of information-based technology. Hackers have used data from information-based
technology to access financial and private data. Small business owners experience 71% of all
data security breaches. Small businesses are targeted by hackers due to their size (Knight, 2020)
According to a study made by Knight (2020), the four (4) participants of the study have
varied data security strategies consisting of password protection, encryption, and data recovery.
P1, P2, and P3 all made their own websites where users have to create a user ID and a password
to obtain access to their systems. P4's pc is also protected by a password which can only be
accessed by P4 and P4's espouses. P3 also mentioned the use of two-factor authentication. Data
security is increased in using two-factor authentication by having a secondary method when
identifying a user. Furthermore, encryption services were also used as a data security strategy
by some of the participants. User information, such as credit card and login information, are all
protected and secured from hackers when transmitted with the use of SSL encryption.
In addition to passwords and encryption, all the participants of the study made by Knight
(2020), references the theme of third-party dependency as a valuable factor to enhance the
ability to reduce data security breaches. Third-party data security services can be used to secure
data, access content, and store data. P1 and P3 relied on corporate offices for some of their data
security services. On the other hand, P2 and P4 used third-party companies to get their data
backed up while having no affiliation with a corporate office. At the end of the study, P1 and
P3's corporate offices have experienced data breaches, while P2 and P4 have indicated that they
have not experienced a data breach, this indicates that business owners should not use thirdparty companies to store their data and use it for data security backups. Furthermore, it's also
indicated that incorporating data security into their businesses have reduced the risk of data
breach with the help of different strategies such as using passwords, having data backups, and
using encryptions.
According to Zeng (2019), Microsoft Information Rights Management centrally manages
documents and messages and uses encryption to keep their information secure. Authorized
8
users use decryption keys to open the document and access the information. When a user tries
to open a protected document, the centralized server will check the authentication of the user.
The deployment of the MS IRM system was used as a case study. In order to exemplify the
suggested process, Microsoft Information Rights Management (MS IRM) is examined in this
section. Microsoft Corporation created MS IRM, a DRM (Digital Rights Management) product.
The simulation results provided important information that the business needed to make
decisions on whether or not to implement this type of information security system. This
procedure was developed for the project in this particular case study under a set of assumptions
but could be used by security investors to evaluate the benefits and costs of implementing
information security technologies.
Cloud computing is another method utilized by businesses to store data. Due to
technological improvements, data storage can be time-consuming and expensive (Levitin et al.,
2021). Many businesses employ cloud computing as a means of data storage because it
substantially eliminates the requirement for hardware and software purchases. According to
Levitin et al. (2021), N-Version programming, a cloud-based task solver, was developed from a
single specification and used many task solver versions of the same program to prevent data
theft on cloud computing. They subsequently applied it to cloud computing by building a number
of Virtual Machines (one for every Task Solver Version) and assigning them to cloud servers for
utilization. They gave examples of N-version programming being applied to a diagnostic medical
system. The attacker can purchase malware-based virtual machines from the cloud.
In order to protect patient data to the appropriate degree while increasing the possibility
of a correct diagnosis, the system user must choose the number of versions (task reliability).
Both the confidentiality of patient information and the possibility of an accurate diagnosis are
impacted by the number of Task Solver Versions. By choosing the proper number of Task Solver
Versions, a user can enhance task reliability while preserving the required level of patient data
safety. According to their findings, the ideal number of Task Solver Versions should be increased
as the number of cloud servers increases, as individual Task Solver Version dependability
increases, or as the voting threshold falls. The ideal number of Task Solver Versions should be
reduced as the number of assaulting Virtual Machines or the required level of data security rises
(Levitin et al., 2021).
The most valuable resource in every company, according to Mukherjee (2019), is its data.
Due to the complexity of managing client data, each company has established a special strategy
for managing sensitive customer data, phishing attacks, strong password management, boosting
staff knowledge, and preventing malicious intent when it manifests. Every company takes data
privacy into account from the beginning in order to safeguard its sensitive data because data
leaks can lead the company to suffer serious losses.
Malware is also the name for malicious software designed to access a system without
authorization. One way of malware defense is to prevent the malicious program from accessing
the target computer. By blocking users from accessing data or the computer network until the
ransom has been paid, ransomware is a type of malicious software that is used to transfer
money. The recovery of the records after the money has been spent is not guaranteed. In order
9
to get rid of ransomware, a good antivirus program must run frequently and keep the browserrelated components updated.
When engaging in e-commerce, data exchanged during transactions can easily be
intercepted or fabricated by a third party, but neither side can successfully assume the identity
of the other party while the information is being transferred or received. In a study conducted
by Linzhu Hu (2019), the Double Encryption Algorithm was used to prevent consumer
information from being easily accessed by hackers through public domains, with the usage of
the model SSL (Secure Socket Layer), which assesses if a website is trustworthy through
certificates. As a result, the double encryption technique was found to be more appropriate for
exchanging confidential information due to its lower runtime complexity and shorter total
encryption and decryption times. In a short experiment Hu tested data packets containing order
information and payment information that were divided into data packets of varying sizes, and
using the SSL security protocol based on the double encryption technique, the data packets were
encrypted and decoded 100 times. After decrypting the data packet encrypted by the two
encryption techniques for 60 minutes, it was discovered that the larger data packet had a
substantially lower decryption difficulty. Data encrypted with the double encryption algorithm
had reduced decryption integrity and greater security, and it helped to prevent decryption to
some extent. Finally, the enhanced Business to Consumer e-commerce mode with the addition
of a third-party privacy server based on a double encryption technology may provide payment
security and privacy. (Hu, 2019)
Perception on data security in different industries
A study that was carried out by Massarczyk, E., and Winzer, P. (2017) and given the title
"Influence of the Perception of Data Security and Security Importance on Customer Usage" of
Internet Service aims to determine whether or not the perception of data security and security
importance has a negative impact on the usage of Internet services. The following is a hypothesis
put forward by the authors: The customer's perception of data security (perceived security) has
a direct positive effect on the usage of (mobile) Internet services, the customer's perception of
the importance of data security (perceived importance of data security) also has a direct positive
effect on the usage of (mobile) Internet services, and higher customer perception of the
importance of data security leads to a higher perceived level of data security. After obtaining
the results, the author decided to disregard these hypotheses and conclude that there is no
general correlation between the perception of data security, the relevance of data security, and
the usage of Internet services. The key finding of this study is that, from the point of view of
consumers, the general level of perceived data security is significantly most influenced by the
level of perceived security associated with email accounts.
Another study that was conducted by Pleger et al. (2021) and which investigates the
German and UK citizens’ perceptions of data protection and data security found that citizens do
not fully understand the terminology used in newspaper articles concerning data protection and
data security. This research also examined how well individuals grasp Data Protection and Data
security media terms. Findings reveal that people value data privacy and security. Online
banking has the greatest perception of data privacy and security. Compared to Germans, UK
10
residents were more concerned about internet privacy. Citizens regularly create personal and
sensitive data, and the state must protect it. Despite variations, both samples show a lack of
awareness of data protection and security. The research provides a three-dimensional
framework that separates people's perceptions of Data Protection and Data Security from legal
and technological aspects. The researchers advise concentrating on the subjective viewpoint
rather than the legal and technical aspects to address the people's perspective. The study's
findings show the presence of a subjective viewpoint that goes beyond individuals' concerns and
includes their priorities and conceptions of Data Protection and Data Security. When educating
individuals on DP and DS, the subjective viewpoint should be considered. The results
demonstrate that people's comprehension of DP and DS may be enhanced. Citizens' better
awareness of DP and DS may improve state-citizen understanding. This is a necessity for egovernment activities that include people's subjective perspectives. The resultant citizen idea of
data protection and security might mediate between politics, technology, and the public in egovernment projects and data protection and security standards. Citizens must comprehend DP
and DS for governments to solve e-government problems effectively.
Balzer et al. (2017) conduct a study titled "Perception of Data Security in e-Commerce,"
in which they examine the perception of data security in e-Commerce services and the
knowledge of computer security among e-Commerce users. It also looks at how shoppers'
perceived data security (PDS) is affected by a variety of circumstances. According to their
findings, the frequency with which a customer consumes information regarding data security
issues, on the one hand, and the experience of a hacker assault, on the other, have significant
impacts on the customer's view of data security. Data security expertise, on the other hand, was
shown to have no significant impact on the PDS of the sample. This suggests that people's PDS
are influenced in various ways by the two distinct elements of information collection and expert
knowledge of data security issues. Having been hacked is the second factor that affects online
buyers' perceptions of the security of their personal information, and the results demonstrate a
clear negative effect on PDS. For a business to successfully enhance its customers' PDS, it must
take all necessary precautions to ensure the safety of its customers' personal information.
Researchers propose that teaching people about data security issues and, more significantly,
how to protect themselves against digital threats, could prevent a potential hacker assault and,
by extension, the bad effect of that incident on a customer's PDS.
A study that was carried out by Mohr and Walter (2018) and was given the title
"Consumer Perception of Data Security: A Trust Transfer Perspective" investigates the
apparent contradiction that exists between the elevated consumer data security concerns that
are reported in surveys and the lax consumer security behavior that is displayed online. The
study's authors found that shoppers put their trust in a company's ability to keep their personal
information safe rather than the retailer itself. Consumers' confidence in an online store hinges
on their perception that it treats them fairly and treats them honestly whenever they engage
with the store. However, trust in data security is a distinct form of trust: The consumer has a
sense of security that software flaws won't cost them anything. According to their findings,
confidence in data security is not a necessary condition for making a purchase, but rather the
end result of transferring trust from the retailer to the data provider. This is an unjustified leap
of trust on the part of customers, though, because retailers aren't always responsible for fixing
software security vulnerabilities.
11
Synthesis
The overview of related literature that has been presented covers a number of topics
linked to data security, including how it is used in businesses and how various sectors evaluate
its value. According to certain studies, implementing data security into business operations has
reduced the risk of data breaches by employing various strategies like using passwords, keeping
data backups, and encrypting data (Zeng, 2019; Knight, 2020). The findings also showed that
customers' perceptions of data security is influenced by their experiences with hackers trying to
attack their system to obtain personal information about their private data; affects how they
view data security and also positively impacts their view when implementing a better system to
protect their data (Tham et al., 2017; Balzar and Bollig, 2017).
The authors stressed the importance of adopting data security into businesses in order to
safeguard customer data as well as to provide customers with a positive perception of the
product and increase their faith in the brand (Tham et al., 2017; Knight, 2020). Furthermore,
the authors also stressed how important it is for business owners to provide security for their
customers, but they did not go into detail about how data security can benefit owners. Instead,
most of the authors concentrated on how data security can be implemented in a business and
the consequences that can result from doing so as well as how they perceive such security. This
study will be answering the question of how important data security is for business owners in a
more in-depth manner.
12
CHAPTER III
RESEARCH METHODOLOGY
In this chapter, the researcher discusses the research design, where the study will take
place, qualifications of the participants, the instrument, how the data will be collected, what
statistical treatment will be applied, how the data will be analyzed to come up with the
interpretation, and what ethical considerations the researcher will follow.
Research Design
This study uses a qualitative research method and uses a Descriptive research design.
According to Streefkerk (2019), qualitative is used when you want to understand something,
either concept, thoughts, experience, etc. The researchers use a qualitative method for this topic
since we want to find out the perception of students, which is a suitable method for this topic.
Additionally, Descriptive research seeks to comprehensively and accurately describe a
population, situation, or phenomenon. It is employed in studies where identifying patterns,
classifications, and types of data is of interest (McCombes, 2015). Voxco (2021) states that you
can use descriptive research design to determine the characteristics of the subjects, which
includes opinions, traits, behaviors, etc., which is why researchers chose this research design
because the study will be describing the population's views about the importance of Data
Security in Businesses.
Research Locale
The Buting Senior High School (BSHS), located in Pasig City, served as the location for
the carrying out of this research project. Given that this is the only location for which they have
been granted permission to undertake an investigation, the researchers have decided to focus
their efforts here.
Participants of the Study
The individuals who took part in this research were students from Buting Senior High
School who were enrolled in ABM in the 12th grade. The selection of each of these participants
was accomplished through the use of a purposive sampling method. The qualifications that the
respondents need to have is: First, they need to be Grade 12 ABM students enrolled in Buting
Senior High School. Second, they must have their own business or engage themselves in
13
businesses or have the plan to have a business in the future. The number of respondents that
this study will accommodate is 10 respondents from ABM.
Research Instrument/s
The researchers chose an interview as their research instrument in order to obtain
information for this study, and it consists of two parts. In Part 1, the profile of the respondents
will be asked. The profile will determine the age, gender, grade level, and strand. Now in Part
2, it consists of questions that will be asked of the respondents, which are: First, from your
perspective, why do we need to protect our data from intruders? Second, what do you believe are
the motives for data theft by intruders? Third, how do you think data security can carry out its
responsibility to safeguard private consumer data? Fourth, why do you believe that
implementing data security into business operations is useful for a company? Fifth, aside from
keeping your data safe, how would implementing data security in your company benefit you?
Last but not least, why do you think companies should incorporate data security into their
operations? How valuable do you think it would be?
The creation of interview questions for this study is self-made and consistent with the study
of the researchers to gather information. The answers of the respondents are based on what
they perceive about data security. There will be no definite or fixed answer offered by
respondents, who can freely answer the set of questions; the study material is open-ended. Each
of the researchers will use an audio recording to encode the conversation for decoding purposes
that will be used on the later pages of this study.
Data Gathering Procedure
The first step of gathering data is to create a consent form that will be validated by the
researchers' thesis adviser. After securing a consent form, the second step is that the researchers
may now go to the respective sections of grade 12 ABM and present the consent form to the
advisers of each grade 12 ABM section and ask for their permission. In the third step,
researchers may now use the purposive sampling method to find suitable respondents for the
study. The fourth step is to present the consent form to the respondents, the consent form will
explain the researchers' agenda, and once the request is accepted by the student, the researchers
will conduct an interview. After that, in the fifth step, the researchers will now process the
gathered data through a process called Thematic Data Analysis. And lastly, once the data has
been thoroughly processed and analyzed, the researchers can now come up with a conclusion
and resolution to their topic.
Treatment of the Data
Once the researchers gather enough data from the respondents, they will use thematic
analysis to analyze the data given by each respondent. According to Caulfield (2019), when
14
dealing with qualitative information, thematic analysis is a useful tool. It is typically used with
a collection of texts, such as interviews or transcripts. Caulfield (2019) further states that
thematic analysis is a useful research method when attempting to glean information about
people's perspectives, opinions, knowledge, experiences, or values from qualitative data. And
since this study aims to conduct the student's views or perspectives about the importance of
Data Security in businesses, thematic analysis is really appropriate to use as a treatment for
the data that will be provided.
Data Analysis and Interpretation
Caulfield (2019) stated that there are various types of approaches to conducting thematic
analysis. However, the most common form of conducting a thematic analysis follows a six steps
process which is: familiarization, coding, generating themes, reviewing themes, defining and
naming themes, and writing up. These six steps were originally developed by the study of
Virginia Braun and Victoria Clarke, which will also be used by the present researchers in this
study.
Now in this study, after the researchers interviewed the qualified participants, the
researchers may now use thematic analysis based on the six steps stated above in analyzing the
data. The first step is Familiarization. Researchers in this study will familiarize themselves
with the data the researchers acquired by transcribing some audio, reading the text, and making
some preliminary notes. Step 2 is coding the data. Coding means the researchers highlight the
text and phrases on the data and come up with labels or codes on those data. Researchers will
code the data after familiarizing themselves with it. Step 3 is generating themes. After
familiarizing themselves with the data, coming up with the codes, and identifying the patterns,
researchers will now create themes based on the codes. At this stage, according to Caulfield
(2019), researchers can decide if the themes and codes are too vague or relevant enough so that
they can discard those data. Step 4 is reviewing the themes. Here researchers will make sure
that the themes are useful and accurate. Step 5 is defining and naming the themes. Here
researchers will now interpret what the formulated themes exactly mean and if it really helps
us understand the data. Lastly is step 6, which is writing up. Here researchers will now write
the findings that they accumulated based on the themes that they have created; they will also
explain at this stage the meanings behind those themes. The conclusions will also be in this
part, and it contains the main takeaways of this analysis and how this analysis answered the
research questions.
15
CHAPTER IV
PRESENTATION, ANALYSIS, AND INTERPRETATION OF DATA
This chapter presents the elements and concepts of presenting, analyzing and
interpreting data to answer the specific problems posited in chapter one of the study.
Table 1
1. How do students, who aspire to own a business, benefit from having data
security incorporated in their business?
The following shows the codes for the first research question, which explored the perception of
students about the benefits of data security. The questions that were constructed were anchored to the
participants' insights on the benefits businesses gain when data security is implemented.
Respondents
Respondent 1.
Response of the Respondents
“It can help my company stay ahead of *It attracts potential investors
my competitors because keeping our data
secured will increase our investors'
confidence.”
“Businesses should implement data
security in their operation to protect their
information from leaking and avoid
stealing of data. I think it's very valuable
for a business as it eliminates different
threats and risks that your company
might go to.”
Respondent 2.
Labels/ Initial Codes
* To avoid important data
from being leaked
*To be safe from
intruders/hackers
*Reduces problems that
companies have to deal with
“The benefits I will gain if I will * Provides confidence when
implement data security in my business doing business
are essential, especially when it comes to
strategies, money, or the formula of my
product. I am sure it will be secure.”
“I think firms should implement data *To be safe from
security because they must protect their intruders/hackers
16
information,
especially
of
their
competitors, and also to avoid being
hacked by intruders.”
Respondent 3.
“It can benefit me to have a smooth flow *Makes business less risky to
of my business and business plan so that run
the unexploited plan will not be used
against me by my competitors.”
“To avoid the decline of my business as a * Reduces problems that
result of sabotage, and it can assist me in companies have to deal with
securing critical information that could
cause my business to fail. The loss of
profit of business.”
Respondent 4.
“Aside from getting my data safe, I *Makes business less risky to
consider that having secure data will aid run
my business become somewhat less risky,
and less likely to face setbacks”
“Based on what I’ve learned in our some *To avoid important data from
specialized subjects, data seems to be a being leaked
critical resource that all businesses
acquire, so implementing data security
upon operations guards it from
prospective negative publicity.”
Respondent 5.
“It can benefit me by making me feel *Provides confidence when
secured and not to overthink things”
doing business
“By having data leaks can be a problem *To avoid important data from
to business firms thus making it being leaked
important it is very important as it can
prevent leaks in data and prevent
valuable information to be spread”
Respondent 6.
“It would be beneficial as a business can *It attracts potential investors
be seen as a safe place by the customers.
People we'll deal with or have an
interaction with may feel secure about
their provided information and the
money that may be invested and earned
will be secured.”
17
“Business operations are one of the
crucial
elements
in
business.
Maintaining the confidentiality and data
security of the operations avoid possible
data intruders and lessen the barriers in
the business. Cause' I believe business
operations shouldn't be an open book to
others to maintain the business progress
and prevent system malfunction.”
Respondent 7
*To avoid important data from
being leaked
*Reduces problems that
companies have to deal with
*To be safe from
intruders/hackers
“I think aside from the assurance that the *Provides confidence when
firm will be safe from intruders, data doing business
security could also aid in the efficiency of
the business operation by allowing the
firm to operate without being anxious of
their company's data security.”
“Data security is crucial in a business
because mostly everything now is
operated with the help of technology
which is at risk of being hacked, and that
could only be avoided with the help of
data security. Aside from that, it will
allow the business operations to go
smoothly.
Respondent 9
*Reduces problems that
companies have to deal with
“Other than it will secure our data, it will *Provides confidence when
also make us comfortable in doing doing business
business knowing that we'll be safe.
Thus, it allows us to do work efficiently
and effectively.”
“We should implement data security in a
business operation because it can assure
customers' safety as well as the
companies. It is really valuable in a way
that our data won't have unauthorized
access to people. Our data is safe and
secure, that would make the business
avoid theft and data corruption that are
essential to the entity.”
Respondent 8
*To be safe from
intruders/hackers
*To be safe from
intruders/hackers
*Reduces problems that
companies have to deal with
“Apart from keeping my data private, I *Makes business less risky to
believe that having secure data will help run
my firm become less risky and less prone
to encounter setbacks.”
18
“According to what I've studied in our *To avoid important data from
specialist subjects po, data appears to be being leaked
a crucial resource that all firms acquire,
therefore applying data security on
operations protects it from potential
unfavorable publicity.”
Respondent 10
“It'll benefit by avoiding loss of business.” *Makes business less risky to
run
“I think businesses should implement *Reduces problems that
data security in their operations because companies have to deal with
it is one of the keys to maintain your
competitive advantage in businesses.”
The reasons why students who aspire to own a business benefit from having data security
incorporated into their business play an important role in the study. The following labels or
initial codes are shown in Table 1:
●
●
●
●
●
●
It attracts potential investors. (2)
To avoid important data from being leaked. (5)
To be safe from intruders or hackers. (5)
Reduce problems that companies have to deal with. (6)
Provides confidence when doing business. (4)
Makes businesses less risky to run. (4)
The responses of the participants showed their opinions on why having data security
incorporated into their business will have a benefit. The first label/initial code is "It attracts
potential investors," which has been stated by 2 of the participants as having huge advantages
for their businesses because of the trust of investors and customers. According to Trends (2021)
cybersecurity can give an organization a more positive reputation which will lead to investors
that will trust in the business because people would think that the business gives priority in
protecting their confidential data and because students demand quality service from businesses,
in their perspective once these qualities are met, potential investors would come and make the
business successful.
The second label or code is "to avoid important data from being leaked," which has been
stated by 5 of the participants: that having the business data leaked can cause a huge problem
because it is very important or valuable for the company. As indicated by Bhardwaj (2022) If
you own a company, every important and valuable data in a business can be attacked by
intruders and take important data such as trade secrets and confidential business plans. In the
perspective of the students, it can be a big problem for a business to have their data leaked
19
because it can be monetized and used in a bad way by intruders that can cause damage to the
company's reputation, and there will be competitors' advantage from that information.
The third label or code is "to be safe from intruders or hackers," which has been stated by
5 of the participants. They believe that it's valuable for a business to eliminate different threats
and risks for the business, such as intruders and hackers. As stated by Business (2021) that
cyberattacks would seriously damage the business and its reputation. Multiple backup methods,
programming of operating systems and installing security software will ensurely secure and
protect the important information that is valuable in a business, in the perspective of the
students, it will eliminate threats and risks in the business such as intruders and hackers.
The fourth label or code is "To reduce problems that companies have to deal with," which
has been stated by 6 of the participants. They think that the business operations will go
smoothly with the help of data security. According to Tierney, (2021) Data is the most valuable
asset for any business. No matter what industry you are in, it’s critical to take care of your data,
whether it is financial reports, healthcare records or a start-up business plan. Securing data
against unauthorized access, use and modification helps organizations reduce the risk of
operational disruptions, financial losses, legal issues, compliance penalties and reputation
damage. Students realized this which is why they came up with such a response.
The fifth label or code is "Provide confidence when doing business," which has been stated
by 4 of the participants. They said that they will have an assurance, and it will help their
confidence without making them anxious about their company's data security. According to
Hart, (2018) Unsecured data is a hacker’s dream. Attackers can offer it up to the dark web or
use ransomware, causing financial loss and reputation damage. It can take years to uncover
data manipulation, which can put everything from an organization’s business strategy to
product development at risk. Having the data or strategy leaked into the business world will
make business owners lose confidence. Yuee, (2019) states that keeping data protected also
helps in staying ahead of competitors. By protecting the information of the clients, it will
increase investor confidence which is healthy for the business. Having many investors in the
business will give a boost of confidence. Hence, the students were aware of this, which is why
they responded in this manner.
The last label or code is "Makes business less risky to run," which has been stated by 4 of
the participants. They said that having secure data will make their business less risky and less
likely to encounter danger or setbacks. According to Intellipaat Blog (2022) Data is a valuable
asset that generates, acquires, saves, and exchanges for any company. Protecting it from
internal or external corruption and illegal access protects a company from financial loss,
reputational harm, consumer trust degradation, and brand erosion.
Based on the codes generated, the researchers now formulated the themes of how
students, who aspire to own a business, benefit from having Data Security incorporated into
their businesses.
The themes formulated are the following:
20
● From the perspective of students, businesses would benefit in various ways from having
data security in their operations.
This theme was formulated based on the given codes from the data. After analyzing
and sorting the codes based on the data the researchers noticed that these codes all talk
about the various benefits of implementing data security in their business operations
which is why the researchers came up with this theme.
Table 2.
2. How does data security, in the opinion of students, protect the private
information of customers and business?
The following shows the codes for the second research question, which centered on
students' perceptions of how data security protects consumers' and businesses' private
information. The questions that were created were based on the participants' perceptions
of how information is protected by data security.
Respondents
Respondent 1
Response of the Respondents
Labels/ Initial Codes
“Data security can perform its role by *Through Encrypting data
ensuring the security of physical records
and devices to avoid leakage of
information.”
“I think data security is valuable in * Keeping your network
businesses because it protects different secure
information that was done within the
company. By having data security, we
avoid a lot of threats and risks because
our data is protected and safe.”
Respondent 2
“Data security performs its role of * Through Encrypting data
protecting the sensitive information of
consumers
through
implementing
security measures that will protect the
information of consumers.”
“As an ABM student, it's valuable because *Make data and information
the information about our business is confidential
important and cannot be shared with
others, especially with our competitors in
business”
Respondent 3
“Create strong passwords, Backup data, *Through Encrypting data
21
and Get antivirus or
protection for devices”
anti-malware
*Through the use of Software
“To assure that the plan is not exploited * Keeping your network
secure
or copied by the intruders.”
Respondent 4
“Data security, in my opinion, plays its *Through Encrypting data
role in maintaining consumer information
by demanding access permissions from all
possible invaders as some information
needs to be kept confidential.”
“Similar to what I mentioned earlier, *Make data and information
there are some aspects that need confidential
confidentiality, so data security is
valuable in a business firm or operations
to prevent disclosing some information in
potential dangers.”
Respondent 5
“In having data security, it can prevent *Through Encrypting data
data leaks that can protect the identity of
the consumers”
“Having data security may protect data * Keeping your network
from leaking to rival companies and secure
exploiting the firm’s weakness and
strengths”
Respondent 6
“Data security can provide multiple *Through the use of Software
identifications security to protect relevant
user information.”
“We all know that businesses should have * Keeping your network
high information security because of their secure
vital business' data that revolves around
their money, strategies, and employee
identification. Having data security helps
the business' data remain confidential.”
Respondent 7
“Data security, from the words itself. *Through Encrypting data
Secure our data. I think it can help us to
protect from intruders in a way that data
corruption or leaked data won't occur.”
22
“Data security is valuable in a business *Make data and information
and advantageous too. It is a way to confidential
protect our customers' information and
avoid
tarnishing
our
company's
reputation and hidden info too.”
Respondent 8
“Data security, from the word itself, will *Through Encrypting data
secure the data of the consumers and will
assure them that their data will be used
solely for the purpose of them being a
consumer.”
“Data security is both valuable and *Keeping your network
advantageous in a firm because secure
nowadays, firms are operating through
the internet or other forms and most
crucial information about the firm is even
stored in a platform or let's say gadgets
that are at risk of being hacked by an
intruder. Without data security, the firm
could be at risk and intruders might have
access to the sensitive information of the
firm and that may put the firm in a
dangerous state.”
Respondent 9
“I think it can be protected by encrypting *Through Encrypting data
it.”
“I genuinely think that data security is * Through Encrypting data
valuable when implementing business
operations to keep the customer's privacy
safe and encrypted.”
Respondent 10
“Data security is important in a way that * Through Encrypting data
it can protect your sensitive information.”
“I think data security is valuable in a * Keeping your network
business firm, is because protects secure
sensitive
information
from
an
unauthorized access and divulgence keeps
you ahead of your competition.”
The opinion of students who specializes in account-based marketing is essential in
discovering the perspective of future business owners about data security as it gives insights on
23
their knowledge about how data security protects the private information of customers and
businesses. The following labels or initial codes are shown in Table 2:
●
●
●
●
Through Encrypting data (9)
Through the use of Software (2)
Keeping your network secure (6)
Make data and information confidential (3)
The responses of the participants have shown the opinions on how students' view on how
data security works to protect the private information of customers and businesses.
The first label/initial code is "Through encryption" which has been stated by 9 of the
participants. They believe that by encrypting data or converting data into codes and adding
passwords to them, the company would protect private data of customers and business-related
information. As Johnson (2018) stated that it is critical to take into account the advantages of
data encryption given the ongoing rise in data breaches, threats, and attacks. The important
information is kept private and inaccessible to hackers with the assistance of encryption.
Encrypting data at all times and in all places is recommended practice to ensure the greatest
level of security, students assure that the company's private information such as customer and
business data will be secured using encryption and adding password that can further reduce the
risk of leakage of data and makes data unintelligible when accessed without the right
authorization.
The second label/initial code is "Through the use of software" which has been stated by 2
of the participants. They believe that by adding software such as anti-malware software and
virus scanners would be able to secure the private data of customers and business related
information. According to Network Depot (2017) malware and virus problems are serious
difficulties that have become more prevalent in recent years, because technology develops so
quickly, criminals who use it to break into systems, take them offline, or steal data from them
expand and adapt just as quickly as security measures and programs are created to counter
them. Ultimately, if private information was easily obtained during a hack, users and clients
might even stop trusting a corporation. In students' perception, a company of any size should
always utilize antivirus and anti-spyware software as standard tools to secure and avoid
corruption of customers and business data.
The third label/initial code is "Keeping your network safe" which was stated by 6 of the
participants. They believe that when data security is implemented, it is able to protect the
private data of customers and business-related information by securing the network that
enables them access to the internet, keeping out intruders from their operations. Network
security is a collection of defense mechanisms designed to safeguard network systems from
unauthorized access, tampering, and other dangers. As a result, technology like computers and
other devices may operate safely. Organizations frequently gather customer information for
marketing and other uses. Network security protects data from malicious intrusion and upholds
the legitimacy of the company (Computronix, n.d.), based on students that cyber criminals can
24
steal brand names if the network security is weak. They can steal identity and commit fraud by
invading systems. Create a firewall, configure a VPN, install anti-virus software, and make a
data backup. Establish functional network security for the company to prevent this.
The last label/initial code is "Make data and information confidential" which was stated
by 3 of the participants. They believe that when implementing data security, it is able to make
data and information confidential by keeping them within the companies’ circle, preventing
outsiders from ever getting access to business related information and customers data.
According to CareCheck (n.d.) being confidential is important because it builds trust. When
assured that all personal information is being preserved and utilized lawfully, it can permit the
flow of information between employees and employers. In addition to risking losing clients or
business, failing to safeguard confidential information exposes a company to the risk of that
information being exploited for criminal purposes, like fraud. In implementing data security in
the perception of students that making confidential their data can make businesses secure and
avoiding outsiders to get access to their data.
Based on the codes generated, the researchers now formulated the themes of how Data
Security, in the opinion of students, protects the private information of customers and business.
The themes formulated are the following:
● It protects businesses and customer information by making the system more complicated
for intruders to bypass.
This theme was formulated based on the given codes from the data. It shows that
respondents are more aware about the system's importance for the safety of business
information which is why the researchers came up with this theme. This theme was also
based on the given codes that were formulated. The researchers also gathered and
analyzed the formulated codes and came up with this theme since the codes talk about
how data security works to protect businesses and customer information by making the
system more complicated for intruders to bypass.
Table 3.
3. Why is it essential that data must be protected from malicious intruders?
The following shows the codes for the third research question, which discusses the
perception of students on why it is essential that data must be protected from malicious
intruders. The questions that were formulated were based on the participant's perception
of why data must be protected from intruders.
Respondents
Respondent 1
Response of the Respondents
Labels/ Initial Codes
“For me, we need to protect our data to *Theft Prevention
avoid intruders from copying or stealing it.
Because data is a very important resource *Advantageous for the
Business
for a business as it helps a lot”
25
“I think intruders steals data to copy it *For Personal Gain
which they can also use for themselves.
Another reason might because they want
to gain information and to hack.”
Respondent 2
“We must protect our data because it is our *Theft Prevention
personal info, and it contains confidential
things that should be protected.”
“Criminal wants to steal the data because *For Personal Gain
they want to gain money from it.”
Respondent 3
“It is important to protect our data from *Theft Prevention
intruders since it is possible for personal
information to be stolen and for others to
use it for scamming or other matters that
could have an impact on my personal life.”
“To use it for scamming”
Respondent 4
*For Personal Gain
“In light of being ABM student po, *Theft Prevention
basically, we have this thing called privacy,
so meaning to say not all data should be
necessarily conveyed. I presume that
having our data protected from intruders is
certainly for safety.”
“Idk, maybe for some certain matters or
*For Personal Gain
for their own goods, I guess?”
Respondent 5
“To prevent identity theft from happening” * Theft Prevention
“They steal data in order to access *For Personal Gain
something for example your credit card
info so that they can have money”
Respondent 6
“Our personal information is important to *Theft Prevention
us as it contains our identifications such as
an address, contact number, etc. Protecting
it from intruders is like protecting our
identity from being a victim of identity
theft and cybercrime.”
26
“With the unpleasant intention, intruders * For Personal Gain
seek to steal crucial information from
technology users to invade their privacy
and use others identities for their
scheming and also to blackmail the
person.”
Respondent 7
“We need to protect our data from *Theft Prevention
intruders to simply avoid dangers.
Intruders might steal our information and
may use those for shady activities like
scamming.”
“Intruders steal data maybe because they * For Personal Gain
need another identity to use to scam other
people. They also steal to gather
information secluded from the public.”
Respondent 8
“We have to protect our data from *Theft Prevention
intruders because basically, it's OUR data.
It's something personal and it's not
supposed to be invaded by someone whom
we didn't give our consent to. Second, it
might be used by the intruder to his/her
advantage which could be dangerous for
us.”
“I couldn't actually tell their specific reason *For Personal Gain
because those intruders must have
different ulterior motives. For instance,
their reason could be something personal
or it could be for their personal gain, which
is the common ulterior motive of
scammers.”
Respondent 9
“In terms of being an ABM student, we *Theft Prevention
have this notion called privacy, which
means that not all data should be
conveyed. I assume that keeping our data
safe from intruders is for our own good.”
“Maybe because that's their usual way of *For Personal Gain
finding means to live”
Respondent 10
“Well based on my perspective, we need to *Theft Prevention
protect our data from intruders to prevent
27
problems like cyber-attacks, and also to * Advantageous for the
Business
protect your reputation.”
“I think the reason why intruders steal *For Personal Gain
data, is to steal your identity. That makes
them commit identity theft.”
Determining the reasons behind the malicious acts of intruders and the reasons why data
must be protected both play vital roles in the study as both of it improve the different aspects of
businesses and increase the chance of businesses to succeed. The following labels or initial codes
are shown in Table 3:
● Theft Prevention (10)
● Advantageous for the Business (2)
● For Personal Gain (10)
The responses of the participants have shown their insights on why intruders steal vital
data and information and why it is truly important to protect data from malicious intruders.
The first label/initial code is "Theft prevention", which has been stated by all of the
respondents. They believe that having data security incorporated in businesses will increase the
integrity of its security and prevent valuable information from being stolen and used in illegal
activities. According to Pearson (2019), Human resources data are information that can be about
the employees, client transaction data, case information; lots and lots of data that is private and
valuable. The answer to protecting data as a small business is to implement layers of security.
Most businesses fail in this aspect because they only have one or two layers, or they have
improperly implemented the layer they have put into place, leaving their data exposed.
The second label/initial code is "Advantageous for the Business", which has been stated
by 2 of the respondents. They trust that having data security in businesses is advantageous as
it's able to preserve the good reputation of the business and helps prevent cyber attacks that
could damage or destroy the business. According to Kim et al. (2016), One of the most important
things that information security professionals try to protect is their organization's reputation
and brand image. Companies that suffer from security breaches and malicious attacks that
expose any asset are likely to face serious negative consequences in the public eye. For example,
a security breach that allows an attacker to steal customer credit card data and distribute that
data internationally would do significant harm to that company's reputation and brand image.
Even if the company's response were swift and solved the problem effectively, the negative
public perception of the company and its brands could lead to a decline in the organization's
revenues, net worth, and market capitalization.
The third label/initial code is "For personal gain", which has been stated by all of the
respondents. They think that intruders and criminals steal valuable data to fulfill their own
ulterior motives such as earning money from it, using it for illegal activities, and to destroy one's
28
reputation. According to Minick (2017), hackers steal customer information to sell it on a black
market. These sites are places where carders - people who actively trade stolen credit card
information - gather to buy, sell and trade their wares. Similarly, Cyber thieves are beginning
to steal not just credit cards, but information that can be used for identity theft. Credit cards
eventually expire and can be turned off, but stealing a person's identity is the gift that keeps on
giving. Purchasers of identities on these black markets can create new accounts and file false
tax returns years after they steal the original information.
Based on the codes generated, the researchers now formulated the themes of why it is
essential to protect data from malicious intruders.
The themes formulated are the following:
● To avoid data loss from intruders, which they use for their own benefit.
This theme was formulated based on the given codes from the data. Responses of
the respondent shows that when malicious intruders have accessed the business' private
data, they will use it for their own benefits such as selling it to other companies or
destroying the business’ reputation. Now, this theme was also formulated based on the
formulated codes and the researchers analyzed and sorted the codes and came up with
this theme since all of the codes talk about the avoidance of data loss from intruders which
they use for their own benefit.
29
CHAPTER V
SUMMARY, CONCLUSION, AND RECOMMENDATION
This chapter presents the summary of the problems, the conclusions drawn from the
findings as well as the recommendations based on the conclusions.
Summary of the Problem
The study focused on understanding the perception of grade 12 ABM students in Buting
Senior High School regarding the importance of data security in businesses. This study uses a
qualitative research method and uses a Descriptive research design to further focus on
understanding the students' different perspectives about the importance of Data Security in
businesses. This study was conducted at Buting Senior High School located at Pasig City. With
no specific age required as long as they are Grade 12 ABM students from Buting Senior High
School, they are able to participate in this study conducted by the researchers.
Using the Purposive sampling technique, researchers are able to select students that fit to
participate for the purpose of this study. The chosen students are to answer questions through
an online interview. Questions constructed are to answer how do students, who aspire to own a
business, benefit from having data security incorporated in their business, how does data
security, in the opinion of students, protect the private information of customers and business
and why is it essential that data must be protected from malicious intruders? Moreover, the
researchers have also focused on acknowledging the benefits that students who aspire to have
their own business can acquire from having data security incorporated in their business, the
ways how data security works in protecting data and private information of customers and
businesses, and the essentiality of protecting data from malicious intruders. Thematic analysis
was used in this study to analyze the data from the respondents after gathering each
respondent's data. This was used by the researchers to obtain information about the students'
perception about the importance of data security in businesses.
Findings
The salient findings of the study are as follows:
1. How do students benefit from having data security in their businesses?
1. Findings show that students think that they benefit from data security in many different
ways; however, the most prominent benefit that students think they would gain from having
data security is the ability of it to reduce problems that companies have to deal with. Second
most prominent benefit that students think they would benefit from data security is its ability
to avoid important data from being leaked and to make data safe from the intruders who want
30
to steal it, providing safety and security to the rightful owners of data and information
preventing them from being victims of data theft related crimes. The third one is its ability to
provide confidence when doing business as having data security makes one feel secure that no
valuable data and information would be accessed and stolen by an unauthorized person. Lastly,
the least prominent benefit from the data is its ability to attract potential investors, since using
data security makes business owners confident that the data is secured allowing data to improve
business performance which then leads to attracting potential investors.
2. How does data security, in the opinion of students, protect the private information
of customers and business
2. Findings show the perception or opinion of the students on how data security protects
the information of customers and businesses in many different ways; however, the most
prominent way, in their opinion, is through encrypting data. The second-most prominent opinion
of students on how data security protects the private information of customers and businesses
is by keeping your network safe. The third one is by making data and information confidential.
And lastly, the least prominent opinion is through the use of software, since adding software
such as anti-malware software and virus scanners would be able to secure the private data of
customers and business-related information.
3. Why is it essential that data must be protected from malicious intruders?
3. Findings show that it is truly essential to protect data from malicious intruders. The
most prominent reason why students think that it's important to protect data is for theft
prevention, it indicates that having data security would prevent data such as contact
information, address, and other personal information that we own from being stolen by data
intruders. The second most prominent reason is that intruders use the data they steal for their
own personal gains, not protecting data gives them the freedom to steal it and use it for doing
illegal activities, earning money, their ulterior motives, scam people, and blackmailing the
owner of the data or information. The least prominent reason is that it is advantageous for
businesses for the reason that malicious attacks from intruders would be prevented benefiting
businesses in terms of their security and stability.
Conclusions
Based on the findings, the researcher concluded the following:
1. The researchers conclude that the grade 12 ABM students benefit from Data Security
incorporated into their business operations in various ways such as; reducing problems that
companies deal with, avoiding important data from being leaked, being safe from intruders and
hackers, providing confidence when doing businesses, makes business less risky to operate, and
lastly but not least is it attracts potential investors.
2. The researchers conclude that the opinions of students on how data security protects the
private information of customers and businesses is based on their knowledge on how data
security works. The respondents gave different opinions, the highest, which is nine, answered
31
through encrypting data. Six of the respondents answered by keeping your network safe. Three
of the respondents answered by making data and information confidential. The lowest opinion
given by the respondent, which is two, is through the use of software.
3. The researchers conclude that the perspective of grade 12 ABM students on why it is essential
to protect data from intruders is to avoid data loss from intruders which they use for their
benefit. Aside from that, protecting data provides an advantage for businesses since they can
use their data to improve their businesses while being confident that it is protected through
Data Security.
Recommendations
Based on the findings and conclusions, the following are recommended:
1. Students' responses indicate that they are aware of the potential risks of not implementing
data security in a business, but their perspective may be limited because there are numerous
ways to protect confidential data. As a result, students should study more on their organization
to further solidify their knowledge and increase the chances of implementing such data security
in their future businesses, because the type of security that will be implemented will depend on
the type of market they will be pursuing. This will assist them in comprehending the various
methods of safeguarding their establishment's critical data. It is also recommended that they
share their thoughts with students and teachers of the ICT strand to get their second opinion
on the topic at hand since they are more knowledgeable in this type of field.
2. The use of technology in businesses has been rapidly increasing in amount, as a result many
intruders have generated new ways on how to exploit businesses' data to their own liking.
Because this is the case, students who intend to own a business in the future should take lessons
on handling and configuring their establishment's security so that they are more aware of
handling their businesses' confidential data and can take a more hands-on approach when it
comes to protecting their consumers' and businesses' private data.
3. Either small and flourished business owners in order to raise their awareness of managing
confidential data & practically assessing their customers and enterprises demand for secured
information, then a checklist from their future business plan must enroll courses that support
installation of digital security features in their marketplace. Furthermore, a business of high
confidence in terms of reliability and credibility must maintain their regular security checks
annually and to marginally change their systematic data protection policy, thus malicious
attempts will less likely intervene their business.
4. Respondents must formulate a pre and post knowledge in order to expand their likelihood of
filling an empty gap in data security issues that their institution may potentially face in the
future. Additionally, the ABM respondents should have proposed an ideal approach to discuss a
crucial recommendation on ICT strand students and academic advisors for them to be able to
get a second opinion.
32
5. The researchers recommend that businesses must train their employees to increase data
privacy awareness. Regular training on password security, phishing emails, malware, and
physical security can help companies or businesses to minimize the risk of a data breach due to
employee negligence.
6. Businesses have a great impact in our society, they need to protect essential data not only to
protect their business, but also to protect the identity of their clients and employees. The
researchers recommend that businesses must keep the software up to date to remove critical
vulnerabilities that hackers use to access the devices.
33
REFERENCES
Balzer, F., Bollig, B., & Binckebanck, L. (2017). Perception of Data Security in e-Commerce.
Hochschule Furtwangen. Retrieved on Oct. 16, 2022 from https://d-nb.info/1139774573/34
Bharwaj, P. (2022). What Is Data Leakage and How Can You Prevent It?. Retrieved on
December 4, 2022 from https://www.makeuseof.com/what-is-data-leakage-and-how-can-youprevent-it/
Business. (2021). Protect your business from cyber threats. Retrieved on December 4, 2022 from
https://business.gov.au/online/cyber-security/protect-your-business-from-cyber-threats
Caulfield, J. (2019). How to Do Thematic Analysis | Step-by-Step Guide & Examples.
Retrieved on Oct. 27, 2022 from https://www.scribbr.com/methodology/thematic-analysis/
CareCheck. (n.d.). Confidentiality – Why Is It Important?. Retrieved on December 6, 2022 from
https://www.carecheck.co.uk/confidentiality-why-is-it-important/
CFI Team. (2021). Data Security. Retrieved on October 21, 2022 from
https://corporatefinanceinstitute.com/resources/knowledge/data-analysis/data-security/
Chavez, F. & Poblador, R. (2021). Contributors of Security Management Practices Among Jail
Officers in Kidapawan City. Retrieved on Oct. 19 from
https://cmc.edu.ph/research/index.php/journals/article/view/27
Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big
data to big impact. MIS quarterly, 1165-1188. Retrieved on September 22, 2022
Chen, J. (2021, October 31). Agency Security. Retrieved on September 22, 2022 from
https://www.investopedia.com/terms/a/agencysecurities.asp/
Computronix. (n.d.). Why Is Network Security Important To Organizations And Businesses.
Retrieved on December 6, 2022 from https://computronixusa.com/why-is-network-securityimportant-to-organizations-and-businesses/
Dalimunthe, R. (2019). Understanding the types of data in a business/organization. Retrieved
on October 11, 2022 from https://towardsdatascience.com/understanding-the-types-of-data-ina-business-organization-67d7cb9914bd
Fleckenstein, M., & Fellows, L. (2018). Data Security. Retrieved on October 21, 2022 from
doi:10.1007/978-3-319-68993-7_15
Foerderer, J., & Schuetz, SW. (2022, Feb 15). Data Breach Announcements and Stock Market
Reactions: A Matter of Timing [Abstract]. Retrieved on September 9, 2022 from
34
https://pubsonline.informs.org/doi/abs/10.1287/mnsc.2021.4264
Foote, D. (2020). A Brief History of Data Security. Retrieved on October 6, 2022 from
https://www.dataversity.net/brief-history-data-security/?fbclid
Frankenfield, J. (2022). Data Analytics: What It Is, How It's Used, and 4 Basic Techniques.
Retrieved on October 13, 2022 from https://www.investopedia.com/terms/d/data-analytics.asp
Fruhlinger, J. & Pratt, M. (2019). What is business intelligence? Transforming data into
business insights. Retrieved on October 13, 2022 from
https://www.google.com/amp/s/www.cio.com/article/272364/business-intelligence-definitionand-solutions.html/amp/#ip=1
Global knowledge. (2022). Cyber Security Glossary of Terms. Retrieved on October 13, 2022
from https://www.globalknowledge.com/us-en/topics/cybersecurity/glossary-of-terms/#gref
Guest Blogger. (2019). The Online Entrepreneur’s Guide to Data Security & Privacy. Retrieved
on September 28, 2022 from
https://www.botreetechnologies.com/blog/the-online-entrepreneurs-guide-to-data-securityprivacy/
Hart, J. (2018). Lack of confidence in data security can cost you more than you think. Retrieved
on December 6, 2022 https://www.csoonline.com/article/3290379/lack-of-confidence-in-datasecurity-can-cost-you-more-than-you-think.html
Hisrich, R., & Ramadani, V. (2018, Oct 26). Chapter 1: Entrepreneurial marketing:
Entrepreneurship and marketing interface. Retrieved on October 6, 2022 from
https://www.elgaronline.com/view/9781788111317/chapter01.xhtml#:~:text=Entrepreneurial%
20marketing%20is%20proactive%20identification,resource%20leveraging%2C%20and%20valu
e%20creation
Hu, L. (2019). E-commerce Trade Consumption Payment Security and Privacy Based on
Improved B2C Model. Int. J. Netw. Secur., 21(4), 545-550.
http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p545-550.pdf
IBM. (n.d.). What is data security?. Retrieved on October 21, 2022 from
https://www.ibm.com/ph-en/topics/data-security
Indeed Editorial Team. (2022, April 2). What Is Data in Business?. (Plus Importance and
Examples). Retrieved in September 22, 2022 from
https://www.indeed.com/career-advice/career-development/data-in-business
Intellipaat. (2022). The Importance of Data Security in 2022. Retrieved on September 25, 2022
from https://intellipaat.com/blog/importance-of-data-security/?fbclid
35
Isaak, J., & Hanna, M. J. (2018). User data privacy: Facebook, Cambridge Analytica, and
privacy protection. Computer, 51, (56-59). Retrieved on September 22, 2022 from
https://doi.org/10.1109/MC.2018.3191268
Johnson, K. (2018). Data Encryption: Why You Should Protect Your Business. Retrieved on
December 4, 2022 from https://www.aureon.com/services/it-management/itservices/security/data-encryption-why-you-should-protect-your-business/
Joshi, S. (2022) Data Security. Retrieved on October 26, 2022 from
https://www.g2.com/glossary/data-security-definition
Kim, D., Solomon, M. (2016). Fundamentals of Information Systems Security. Retrieved on
December 05, 2022 from
https://books.google.com.ph/books?id=Yb4eDQAAQBAJ&pg=PA78&dq=how+data+security+pr
otects+a+company%27s+image&hl
Knight, S. (2020). Strategies to Reduce Small Business Data Security Breaches. Retrieved on
October 20, 2022, from
https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Strategies+to+Reduce+Small+Bu
siness+Data+Security+Breaches&btnG=#d=gs_qabs&t=1666284032789&u=%23p%3D2qfZIXr
kn14J
Kurtus, R. (n.d.). Theory of Security. Retrieved on October 06, 2022 from https://www.schoolfor-champions.com/security/theory_of_security.htm#.Yz7LM7cRUVH
Leonard, K. (2018, October 25). The Role of Data in Business. Retrieved on September 22, 2022
from https://smallbusiness.chron.com/role-data-business-20405.html
Levitin, G., Xing, L., & Dai, Y. (2021). Security and reliability of N-version cloud-based task
solvers with individual version cancellation under data theft attacks. Reliability Engineering &
System Safety, 216, 107920. Retrieved on October 20, 2022, from
https://doi.org/10.1016/j.ress.2021.107920
Massarczyk, E., Winzer, P. (2017, June 30). Influence of the Perception of Data Security and
Security Importance on Customer Usage of Internet Services. Retrieved on Oct. 17, 2022 from
http://personales.upv.es/thinkmind/IntTech/IntTech_v10_n12_2017/inttech_v10_n12_2017_1.h
tml
McCombes, S. (2019, May 15). Descriptive Research | Definition, Types, Methods & Examples.
Retrieved on Nov. 31, 2022 from https://www.scribbr.com/methodology/descriptive-research/
McCullough, D., & Medina, B. (2019, September 20). What Is Entrepreneurship?. Retrieved on
October 6, 2022 from https://fee.org/articles/what-is-entrepreneurship/
36
Minick, B. (2017). Facing Cyber Threats Head On: Protecting Yourself and Your Business.
Retrieved on December 05, 2022 from
https://books.google.com.ph/books?id=EGrEDQAAQBAJ&pg=PA52&dq=how+hackers+steal+c
redit+card&hl
Mohr, H., Walter, Z. (2018). Consumer Perception of Data Security: A Trust Transfer
Perspective. Retrieved on Jan. 31, 2023, from
https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Consumer+Perception+of+Data+
Security%3A+A++Trust+Transfer+Perspective+&btnG=#d=gs_qabs&t=1675164033465&u=%2
3p%3DpdNZ--ZEnFcJ
Mukherjee, S. (2019). Overview of the Importance of Corporate Security in business. Retrieved
on October 20, 2022, from http://dx.doi.org/10.2139/ssrn.3415960
Network Depot. (2017). Virus and Malware Solutions for Your Business. Retrieved on
December 6, 2022 from https://www.networkdepot.com/virus-and-malware-solutions/
Pearson, J. (2019). Essential Cyber Security for Your Small Business: How to Protect Your
Small Business from Cyber Attacks, Hackers, and Identity Thieves Without Breaking the Bank.
Retrieved on December 05, 2022 from
https://books.google.com.ph/books?id=MJ6mDwAAQBAJ&printsec=frontcover&dq=importance
+of+data+security+in+business&hl
Pleger, L., Guirguis K., & Mertes A., (2021). Making public concerns tangible: An empirical
study of German and UK citizens’ perception of data protection and data security. Retrieved on
Oct 18, 2022 from https://www.sciencedirect.com/science/article/pii/S0747563221001539
Promsri, C. (2015). Passengers’ Perception Towards Physical Security Measures of
Suvarnabhumi Airport Rail Link Service. Retrieved on Oct. 19, 2022 from
https://www.researchgate.net/publication/273353102_Passengers'_Perception_Towards_Physic
al_Security_Measures_of_Suvarnabhumi_Airport_Rail_Link_Service
Swift Systems. (n.d.). Business Benefits Of Offering Data Protection. Retrieved on December 6,
2022 https://www.swiftsystems.com/guides-tips/benefits-of-data-protection/
Statista Research Department. (2022). Number of incidents of data breaches in the Philippines
in 2020 and 2021(in millions). Retrieved on October 12, 2022 from
https://www.statista.com/statistics/1271333/philippines-number-of-data-breaches/?fbclid
Streefkerk, R. (2019, April 12). Qualitative vs. Quantitative Research | Differences, Examples
& Methods. Retrieved on Oct 25, 2022 from https://www.scribbr.com/methodology/qualitativequantitativeresearch/#:~:text=A%20rule%20of%20thumb%20for,(concepts%2C%20thoughts%2C%20experi
ences)
37
Tibco. (2022). What is Transactional Data?. Retrieved on September 8, 2022 from
https://www.tibco.com/reference-center/what-is-transactionaldata#:~:text=Transactional%20data%20is%20information%20that,qualities%20associated%20
with%20the%20transaction.
Tierney, M. (2021). Data Security Explained: Challenges and Solutions. Retrieved on
December 6, 2022 from https://blog.netwrix.com/2021/07/26/data-security/
Tham, J., Yazid, M.S.A, Khatibi, A.A, & Azam, F. (2017). INTERNET AND DATA
SECURITY-UNDERTANDING CUSTOMERS PERCEPTION ON TRUSTING VIRTUAL
BANKING SECURITY IN MALYSIA. Retrived on October 20, 2022 from
https://en.calameo.com/read/0047058165b73e03036b9
The Upwork Team. (2021, August 23). What Is Data Security? Why Data Security Is Important
for Your Business. Retrieved on September 22, 2022 from
https://www.upwork.com/resources/data-security
Trends, M. (2021). Why investing in cybersecurity makes sense?. Retrieved on December 4,
2022 from https://www.analyticsinsight.net/why-investing-in-cyber-security-makes-sense
Voxco. (2021, Sept. 29). Descriptive Research Design. Retrieved on Nov. 30, 2022 from
https://www.voxco.com/blog/descriptive-research-design/
Zeng, W. (2019). A methodology for cost‐benefit analysis of information security technologies.
Concurrency and Computation: Practice and Experience, 31(7), e5004. Retrieved on October 20,
2022, from
https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Data+security+technologis+appli
ed+on+businesses&btnG=#d=gs_qabs&t=1666259926809&u=%23p%3Dp6s6rBe9j7wJ
38
APPENDICES
Consent Form signatured by Principal
39
Interview Questions
Participants Forms
40
Participants Forms
41
42
43
44
45
46
47
48
49
50
Resume
51
52
53
54
55
56
57
58
Download