You are on page 1of 31

Importance of Information Technology in Security

A Qualitative research

Presented to the faculty of Senior High School Department

St. Rose Catholic School, Inc.

Sta. Rosa St., Pob. Sur, Paniqui, Tarlac

In Partial Fulfillment

of the Requirements of the Senior High School

Practical Research 2

Ignacio, Vjay Lawrence

December 2020
ST. ROSE CATHOLIC SCHOOL, INC.
PANIQUI, TARLAC

APPROVAL SHEET

The research entitled- The Importance Information Technology in Security. In which was prepared and

submitted by Vjay Lawrece F.Ignacio for the fulfillment of the requirements of the subject Practical

Research which hereby accepted.

RESEARCH COMMITTEE

Prof. Embesan Socrates Mr. Mitchell D. Alabado

Research Teacher Academic Coordinator

Sr. Grace F. Tagnipez, OP

Principal
ACKNWOLEDGEMENT

I would like to express my special thanks of gratitude to my teacher Prof. Embasan Socrates as well as
our principal Sr. Grace F. Tagnipez who gave me the golden opportunity to do this wonderful project on
the topic Importance of Information Technology in Security, which also helped me in doing a lot of
Research and I came to know about so many new things I am really thankful to them.

Secondly I would also like to thank my parents and friends who helped me a lot in finalizing this project
within the limited time frame.

I am are over helmed in all humbleness and gratefulness to acknowledge my depth to all those who have
helped me to put these ideas, well above the level of simplicity and into something concrete.

I would like to express my special thanks of gratitude to my teacher as well as our principal who gave me
the golden opportunity to do this wonderful project on the topic "Importance of Information Technology
in Security" , which also helped me in doing a lot of Research and I came to know about so many new
things. I am really thankful to them.

Any attempt at any level can 't be satisfactorily completed without the support and guidance of my parents
and friends.

I would like to thank my parents who helped me a lot in gathering different information, collecting data
and guiding me from time to time in making this project, despite of their busy schedule, they gave me
different ideas in making this project unique\

Thanking you

The Researcher
DEDICATION

I dedicate my dissertation work to my family and many friends. A special


feeling of gratitude to my loving parents, Ada Marie and Edgar Ignacio whose
words of encouragement and push for tenacity ring in my ears. Aira Ignacio
have never left my side and are very special.
I also dedicate this dissertation to my many friends and church family who have
supported me throughout the process. I will always appreciate all they have done,
especially Doc Ed Padama for helping me develop my technology skills, France Byron for the many
hours of proofreading, and Joanna Lanojan for
helping me to master the leader dots.
I dedicate this work and give special thanks to my friends Cyril Kavana Valencia
and Jhon Rhey Dayan for being there for me throughout the
entire doctorate program. Both of you have been my best cheerleaders.
THE RESEARCHER
TABLE OF CONTENT

PAGE

TITLE PAGE…………………………………………………………………………………………....i
APPROVAL SHEET…………………………………………………………………………………...ii
ACKNOWLEDGEMENT…………………………………………………………………………….iii
DEDICATION…………………………………………………………………………………………iv
LIST OF TABLE AND FIGURE………………………………………………………………………v

CHAPTER 1: THE PROBLEM AND ITS BACKGROUND……………………………………....1

Introduction…………………………………………………………………………………….1

Statement of the problem………………………………………………………………………2

Significant of the study………………………………………………………………………...2

Scope and delimitation…………………………………………………………………...……3

Chapter 2: REVIEW OF RELATED LITERATURE AND STUDIES………………….………..4


Related Literature……………………………………………………………………………...4
Foreign studies…………………………………………………………………………..…..4-5
Local studies…………………………………………………………………………………...6
Conceptual Framework………………………………………………………………………..7
Chapter 3: RESEARCH METHODOLOGY……………………………………………………….8
Researcher Methodology……………………………………………………………………...8
Research Design………………………………………………………………………………8
Research Participants………………………………………………………………………8-9
Data Collection………………………………………………………………………………..9
Data Analysis…………………………………………………………………………………9
Ethical Issues………………………………………………………………………………9-10
Chapter 4: PRESENTAION, INTERPRETATION AND DATA ANALYSIS…………………11
Demographic Profile ………………………………………………………………………..11
Age of the Respondents……………………………………………………………………..11
Gender of the Respondents………………………………………………………………11-12
IT Security helps you as a Student………………………………………………………12-13
IT Security Regulation……………………………………………………………………13

IT Security Tools……………………………………………………………………...13-14

Lost an account due to Hacking………………………………………………………14-15

This time do you secure your accounts using IT Security………………………………15

IT Security helps to secure my account …………………………………………..…15-16

IT Security gives freedom to choose security password……………………………..16-17

CHAPTER 5: FINDING, CONCLUSION AND RECOMMENDATION1………………...18

Summary of finding……………………………………………………………………..18

Conclusion………………………………………………………………………………18

Recommendation…………………………………………………………………….18-19

REFERNCES……………………………………………………………………………………20

Online resources…………………………………………………………………………21

LIST OF APPENDICIES

A. Letter of request……………………………………………………………………...23

B. Letter to the Teacher…………………………………………………………………24

C. Letter to the respondents……………………………………………………………..25

D. Survey Questionnaire………………………………………………………………..26

CURRICULUM VITAE……………………………………………………………………….27
Chapter 1

Introduction

Background of the study

Nowadays many people have the ability to take information from others using technology because it

contains data that can make you content with your life and other people just do it to bully or blackmailed

other people which is one of the reasons to commit suicide.

Advancements of modern technology are actually making us safer not only can new forms of password

protection help to safeguard our digital files and documents, advances in voice recognition and gesture

control also create a heightened degree of security for our devices and homes.

Although IT security and information security sound similar, they do refer to different types of security.

Information security refers to the processes and tools designed to protect sensitive business information

from invasion, whereas IT security refers to securing digital data, through computer network security.
IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets

such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive

information, blocking the access of sophisticated hackers. As hackers get smarter, the need to protect your

digital assets and network devices is even greater. While providing IT security can be expensive, a

significant breach costs an organization far more. Large breaches can jeopardize the health of a small

business. During or after an incident, IT security teams can follow an incident response plan as a risk

management tool to gain control of the situation

Statement of the problem

1. How does technology can secure important data?

2. How technology secure transactions?

3. How many ways to protect data and control access?

Significance of the study

The researchers believe that this study can help other students and researcher to give deep understanding

about the student on how to protect or secure their data when going online. It will see here the importance

of securing and how to secure one’s data.


To all students and teachers this study is important for them to know the process on how to secure their

data and to keep confidential the academic performance of the students. It can help the students to be

knowledgeable enough to keep their accounts or data in a private way Santiago, (2016).

To all adults who uses gadgets or technology this may help them to increase their knowledge in terms of

securing their data when opening their account in internet. Benefits of technological solutions become

quite clear to them. They’re waking up to understand that simply placing a security officer at a post is no

longer a viable option Folmer, (2019)

Scope and Delimitation

The researcher could gather reliable data by the questionnaires and could evaluate the center of the study

by those data collected. The study is focus to the Senior High School students. The researcher will

conduct the survey to TVL- St Jordan in St. Rose Catholic School. The researcher importance of could

easily identify the important detail as being a senior high school student in the same school because there

is reliable knowledge between the researcher. The researcher, accepting their complains and compliments

is understandable.
Chapter 2

REVIEW OF RELATED LITERATURE AND STUDIES

This chapter presents the review of related literature and studies with the use of these literature

and studies, both foreign, and local, the researcher gained insight that served as a reference for

the study.

Related Literature

A. Foreign

Over the past decade, businesses and consumers have seen technological advancements automate

business tasks and make paces toward an accessible society. With such critical implications of tech’s role

in our personal and working lives, though, we have seen the unfortunate results of leaving our now

digitally-dependent businesses untended and unsecured.


In today’s connected world, human error can do just as much damage as a skilled hacker. Data has value,

and cyber criminals know that.

If we are to anticipate how broad-based the next digital revolution will be, we should look to our

increasingly connected working landscape—from our devices, to key functions in our businesses. what do

you need for your business to be ready, and how can you get there?

Levy observes that the responsibility to manage this massive change is twofold, and it begins with the

question, ‘What will this do to us?’

“It’s about asking ourselves how we might be exposing people around us to unnecessary risk and to be

responsible upfront,” he explains. The new SWOT analysis for any business venture, he urges, should

include the humanistic consequences of an innovation in action.

Security has become an undertaking for which we are all become responsible.

According to Levy, the solution to insecurity will be a change of culture, and it starts with the

understanding that in order to build the robust and secure businesses urgently needed in tomorrow’s

landscape, there’s an initial cost.

Security shouldn’t be a luxury. Buy it upfront. Organizations need to start adopting an attitude of

understanding—that ransomware preparedness, time spent on a disaster recovery plan, or dollars spent on

cyber awareness for staff—is necessary to accommodate the changes in our cyber landscape.
To sum it up, the idea that the proactive protection of your organization’s assets is an “extra cost”, won’t

allow for the “security-first culture” that we need to adopt, promote and innovate around to foster a truly

prosperous economy.

Levy insists that these are conversations that we have to have with our own stakeholders and communities

as well. Widespread education makes for a safer society, without hindering the way we embrace

innovation. “We need to incorporate that into our storytelling. They’re looking to us in our myriad of

business abilities for that understanding.[ CITATION Chr20 \l 1033 ]

B. Local

Executives of Philippine corporations consider their entities’ risk to cyberthreats to be “low” to

“moderate” given the increased investments on cybersecurity.

In a virtual briefing Friday, Networks country manager for the Philippines, said the result of the survey

showed that one in two companies in the Philippines alone hiked their cybersecurity budget this year

compared to last year. He said 43 percent of the officials from surveyed businesses said bulk of their

information technology (IT) investments are allocated for cybersecurity, particularly to upgrade their

security frameworks to automated technologies, as well as to increase securities on rising volume of

cyberthreats. Visaya, Alto (2019)


In terms of products that companies use to further strengthen their cybersecurity capacity, Visaya said 86

percent said they use anti-malware and antivirus tools, 59 percent said they use next-generation firewalls,

and 47 percent said they have started to invest in cloud native security.

Despite the increasing awareness among companies, the survey results showed that challenges remain and

these include employees’ lack of awareness on cybersecurity and risks from third-party service providers

and suppliers. Visaya said the lack of cybersecurity experts is a problem not only in the Philippines but

around the world.

He added the national government and local governments have partnered with schools to address the lack

of cybersecurity experts not just locally but hopefully overseas. Villanueva (2019)

Conceptual Framework

 Age
 Sex
 Residency/present
location
 Religion
 Business Importance of Information
 Data Technology in Security
Chapter 3

Methodology

Research Methodology

The research methodology provided the necessary information such as the methods used, the

sources and the overall process in gathering and conducting the data.

Research Design

“Consequently, any discussion can only be a partial description of possibilities, but a review of

several major interpretive frameworks can provide a sense of options.” [ CITATION Joh \l 1033 ] The

research made use of descriptive research design. The study had employed exploratory case

study to explore TVL students’ usage of the internet in their everyday situation and how they

secure their accounts. The researchers want to gain in depth understanding on how to surely

secure their account while using internet with the help of analyzing data from quantitative and

qualitative data. This method will avoid biased interpretations and the difficulty in generalizing

the results or findings.

Participants
The participants of the study will be grade 11 TVL ICT students of Saint Rose Catholic School

Inc. The participant was asked politely if they can answer the interview question. Overall there

will be 18 respondents, which will be gathered by the researcher once they’re done.

Data Collection

The gathering of data will last for about one week and it will in Microsoft word. The respondents will be

Grade 12 TVL St. Jordan Students and the respondents can answer Yes or No. Each interview will take at

least 30-50 seconds and will be recorded by mobile phones.

To Explore Grade 12 TVL St. Jordan. We will use interview to the students who are using different social

media apps/networks. Semi-structured interviews will be conducted to the students to gather information.

Data Analysis

The verbatim translated from the interview will be deciphered and a duplicate of the entire verbatim

deciphered elucidation will be given to the interviewees to guarantee them that just the information that

won’t hurt them and they wish to see will be written.

Ethical Issues

In this study, interviewing someone is all about asking something that may get to the meaningful part that

the interviewer will ask something private and if there will be questions that may seem uncomfortable for

the interviewee to answer the interviewers will not force the interviewee to answer the question. Also, the

interviewers will inform the interviewee that the conversation will be recorded and will be used for
academic purposes. To guarantee the respondents that anything they will state in the interview is in high

secrecy. The researches will give them an informed consent letter, it stated there the information that will

be stated by the interviewee will be in high secrecy and will also be protected. Likewise, the motivation

behind the study and how it will be utilized are stated there. The researchers will not force the interviewee

and will not use violence, it must be voluntarily.


Chapter 4

PRESENTAION, INTERPRETATION AND DATA ANALYSIS

This chapter present the analysis and interprets data gathered in order to draw out important information

ang significant points about the Importance of information technology in Security. For clarity and

consistency in the discussion, the data are presented by the likert scale and Pearson’s coefficient analysis.

Demographic Profile

Table 1. Age of the Respondents

Age Frequency Percentage

16-17 10 62.5%
18 4 25%
19-20 2 12.5%
Total 16 100%

The table 1 shows the age of the respondents. 62.5% of the respondents are 16-17 in age. 25% of the

respondents are 18 in age. 12.5 of the respondents are 19-20 in age.

table 2. Gender of the Respondents

Gender Frequency Percentage

Male 11 68.75%
Female 5 31.25%
Total 16 100%
The table 2 shows the gender of the respondents. Out of 16 respondents there are 11 students that are

male which are 68.75% of the population. While 5 of the respondents are Female which is 31.25% of the

population of the research.

Table 3. Does IT Security help you as a student?

Question no. 1 Frequency Percentage


Strongly Disagree 2 12.5%
Disagree 1 6.25%
Neutral 1 6.25%
Agree 9 56.25%
Strongly Agree 3 18.75%

The table 3 shows the answer of the respondents. Out of 16 students there are 2 student that are strongly

disagree which are 12.5% of the population. 6.25% of students are Disagree. Same as Neutral that has

6.26% of the respondents. 56.25 of the respondents are Agree of the population. 3 students are Strongly

Agree of the population of the research.

Table 4. Do you agree with the IT Security regulations?

Question no. 2 Frequency Percentage


Strongly Disagree 1 6.25%
Disagree 1 6.25%
Neutral 1 6.25%
Agree 11 68.75%
Strongly Agree 2 12.5%

The table 4 shows agree with IT Security regulations. 6.25% of respondents are strongly Disagree. 6.25%

of respondents are Disagree. 1 student which is 6.25% is neutral. There are 11 students that are Agree
which are 68.75% of the population. While 2 students are Strongly Agree which is 12.5% of the

population of this research.

Table 5. Do you often use IT Security tools? Example Antivirus.

Question no. 3 Frequency Percentage


Strongly Disagree 0 0
Disagree 0 0
Neutral 4 25%
Agree 10 62.5%
Strongly Agree 2 12.5%

The table 5 shows often use of IT Security tool such as antivirus. Out of 16 respondents there are 0

students are strongly Disagree and Disagree. While there 4 students are neutral which is 25% of the

population. 62.5% of the students are agree in using IT Security. While 2 students are Strongly Agree

which is 12.5% of the population.

Table 5. Have you ever lost an account due to hacking?

Question no. 4 Frequency Percentage


Strongly Disagree 4 25%
Disagree 4 25%
Neutral 2 12.5%
Agree 3 18.75%
Strongly Agree 3 18.75%

The table 5 shows the lost an account due to hacking. There are 4 respondents are Strongly Disagree

which is 25% of the population. While 25% of the students are Disagree. There are 12.5% of students are

neutral. While there are 3 respondents agree which is 18.75%. while there are also 3 students are Strongly

Agree which is 18.75% of the population.


The table 6. With the numbers of hackers during this time do you secure your accounts using IT

Security?

Question no. 5 Frequency Percentage


Strongly Disagree 1 6.25%
Disagree 1 6.25%
Neutral 4 25%
Agree 7 43.75%
Strongly Agree 3 18.75%

The table 6 shows the numbers of hackers during this time do you secure your accounts using IT Security.

Out of 16 respondents there are 1 Strongly Disagree. While 1 respondent Disagree which is 6.26%. there

are 4 students are neutral which is 25% of the population. While 7 students are Agree which has 43.75%

and there are 3 students are Strongly Agree which is 18.75% of the respondents.

The table 7. IT Security helps me to secure my accounts.

Question no. 6 Frequency Percentage


Strongly Disagree 1 6.25%
Disagree 0 0
Neutral 3 18.75%
Agree 8 50%
Strongly Agree 4 25%

The table 7 shows the IT security helps me to secure my accounts. Out of 16 respondents 1 student

Strongly Disagree. While none of students are Disagree. There 3 students Neutral which is 18.75% of the

respondents. There are 8 respondents agree which is 50%. While there are 4 students are Strongly Agree

which is 25% of the population.

The table 8. IT Security gives me freedom to choose my security password.


Question no. 7 Frequency Percentage
Strongly Disagree 0 0
Disagree 0 0
Neutral 1 6.25%
Agree 10 62.5%
Strongly Agree 5 31.25%

The table 8 shows the IT Security gives me freedom to choose my security password. Out of 16

respondent 0 students are Strongly Disagree and Disagree. While there is 1 student neutral which is

6.25% of the respondents. 10 of respondents are agree which is 62.5. While 5 of the students are Strongly

Agree which is 31.25% of the population.


Chapter 5

FINDINGS, CONCLUSIO, RECOMMENDATION

This chapter present the summary of the study, findings, the conclusion drawn from the general problem,

and recommendation drawn from the findings.

Summary of findings

1. based on the answer of respondents, most of the big and important data is secured by the help of IT

Security using their ability and applications that can protect data into there mobiles or other kind of

technology.

2. based on the respondents they are using protected application that authorized by the IT Security to

secure their transaction with other people to prevent their account from hackers.

3. there are many ways to protect your data and control access based on this research IT Security make a

applications that can protect you from being hacked. They make a high Quality application to prevent and

remove virus made by the hackers.

Conclusion

Based on the findings of this study, The Importance Information Technology Security is significant

related to this situation we’re technology is the source information of a students during this pandemic.

Recommendation
Based from the findings and conclusion drawn, the following are recommendation:

1. future researcher may investigate what hackers can get by hacking and creating various viruses.

2. future researcher may investigate what can happen to the technologies and lives of a person affected by

a virus created by a hacker.


Refences:

Creswell, J. (n.d.). Qualitative Inquiry and Reasearch Design. Retrieved from Choosing Among five approaches:

https://www.goodreads.com/book/show/1080660.Qualitative_Inquiry_and_Research_Design

Rathbone, C. (2020, January 27). Techalliance. Retrieved from The first step to future-proofing? A culture of

security.: https://techalliance.ca/the-first-step-to-future-proofing-a-culture-of-security/?

gclid=EAIaIQobChMI08L57MTN7QIV0m4qCh1adwsgEAAYASAAEgLIW_D_BwE

Visaya, A. (2019, July 10). Philippine News Agency. Retrieved from PH companies consider cybersecurity risks:

https://www.pna.gov.ph/articles/1108649
Appendix A
LETTER OF REQUEST

St. Catholic School, Inc.


Paniqui, Tarlac

December 2020
Prof. Embasan Socrates
Class Adviser/ Subject Teacher
St. Rose Catholic School, Inc Paniqui, tarlac

Dear Prof. Embasan Socrates :


I, Vjay Lawrence F. Ignacio of Grade 12- TVL student is currently working on a Quantitative
Research entitled “Importance of Information Technology in Security” to complete my requirements on
Research on Daily Life 2.
In line with this, I would like to seek your approval to conduct my study and to request your
consent to distribute questionnaires to the Grade 11 TVL Students as my Respondents of the Research
Study. The survey will last only about 5 to 10 minutes. Rest assured that the data gathered will remain
confidential and for academic purpose only. We are hoping that this request will merit you memorable
approval.
Sincerely yours,
Vjay Lawrence F. Ignacio
The Researcher

Noted by:
Embasan Socrates
Research Adviser
Approved by:
Mr. Mitchell D. Alabado
SHS Academic Coordinator
Appendix B
LETTER OF REQUEST

St. Catholic School, Inc.


Paniqui, Tarlac

December2020

Dear Teacher:
I, Vjay Lawrence F. Ignacio of Grade 12- TVL student is currently working on a Quantitative

Research entitled “Importance of Information Technology in Security” to complete my requirements on

Research on Daily Life 2.

In this regard we would like to solicit for your cooperate to distribute the questionnaire to the

Grade 12 TVL in you class as the Respondents of this Research Study. Thank you and God Bless!

Sincerely yours,

Vjay Lawrence F. Ignacio

Researcher

Noted by:

Embasan Socrates

Researcher Adviser

Approved by:

Mr. Mitchell D. Alabado

SHS Academic Coordinator


Appendix C
LETTER OF REQUEST

St. Catholic School, Inc.


Paniqui, Tarlac

December2020

Dear Respondent

I, Vjay Lawrence F. Ignacio of Grade 12- TVL student is currently working on a Quantitative
Research entitled “Importance of Information Technology in Security” to complete my requirements on
Research on Daily Life 2.
In the regard. We are asking for your precious time, and effort to answer all the questions in the
questionnaire that are important and helpful for the completion of the study.
Rest assured that all data gathered from you will be kept in the highest level of confidentially.
Your positive response in this request will be valuable contribution for the success of the study and highly
appreciate.
Thank you very much for your cooperation and God Bless!
Sincerely yours,
Vjay Lawrence F. Ignacio
Researcher
Noted by:
Embasan Socrates
Research Adviser
Approved by
Mr. Mitchell D. Alabado
SHS Academic Coordinator
Appendix D
Name(optional): Date:

Grade and Section

Questionnaires:

1. Does IT Security help you as a student?

Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree

2. Do you agree with the IT Security regulations?

Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree

3. Have you ever lost an account due to hacking?

Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree

4. Do you often use IT Security tools? Example Antivirus.

Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree

5. . With the numbers of hackers during this time do you secure your accounts using IT Security?

Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree

6. IT Security helps me to secure my accounts.

Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree

7. IT Security gives me freedom to choose my security password.

Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree
CURRICULUM VITAE

Vjay Lawrence F. Ignaio

Email address: ignaciovjaylawrence@gmail.com

PERSONAL DATA
Name: Vjay Lawrence F. Ignacio
Address: Dapdap, Pabiqui, Tarlac
Religion: Roman Catholic
Date of Birth: August 3 2002
Place of Birth: Baguio City
Parents: Mr. Edgar Ignacio
Mrs. Ada Marie Ignacio

EDUCATION BACKGROUND

Senior high: Present


St. Rose Catholic School Inc.
Sta. Rosa St, Pob Sur, Paniqui, Tarlac

Junior high: 2019


St. Rose Catholic School Inc.
Sta. Rosa St, Pob Sur, Paniqui, Tarlac

Elementary: 2015
P.O Domingo Montessori Elementary School
Magallanes Street, Paniqui, Tarlac

Philosophy in Life:
“LIFE IS NOT A PROBLEM TO BE SOLVED BUT A REALITY TO BE EXPERIENCE”

You might also like