Professional Documents
Culture Documents
A Qualitative research
In Partial Fulfillment
Practical Research 2
December 2020
ST. ROSE CATHOLIC SCHOOL, INC.
PANIQUI, TARLAC
APPROVAL SHEET
The research entitled- The Importance Information Technology in Security. In which was prepared and
submitted by Vjay Lawrece F.Ignacio for the fulfillment of the requirements of the subject Practical
RESEARCH COMMITTEE
Principal
ACKNWOLEDGEMENT
I would like to express my special thanks of gratitude to my teacher Prof. Embasan Socrates as well as
our principal Sr. Grace F. Tagnipez who gave me the golden opportunity to do this wonderful project on
the topic Importance of Information Technology in Security, which also helped me in doing a lot of
Research and I came to know about so many new things I am really thankful to them.
Secondly I would also like to thank my parents and friends who helped me a lot in finalizing this project
within the limited time frame.
I am are over helmed in all humbleness and gratefulness to acknowledge my depth to all those who have
helped me to put these ideas, well above the level of simplicity and into something concrete.
I would like to express my special thanks of gratitude to my teacher as well as our principal who gave me
the golden opportunity to do this wonderful project on the topic "Importance of Information Technology
in Security" , which also helped me in doing a lot of Research and I came to know about so many new
things. I am really thankful to them.
Any attempt at any level can 't be satisfactorily completed without the support and guidance of my parents
and friends.
I would like to thank my parents who helped me a lot in gathering different information, collecting data
and guiding me from time to time in making this project, despite of their busy schedule, they gave me
different ideas in making this project unique\
Thanking you
The Researcher
DEDICATION
PAGE
TITLE PAGE…………………………………………………………………………………………....i
APPROVAL SHEET…………………………………………………………………………………...ii
ACKNOWLEDGEMENT…………………………………………………………………………….iii
DEDICATION…………………………………………………………………………………………iv
LIST OF TABLE AND FIGURE………………………………………………………………………v
Introduction…………………………………………………………………………………….1
IT Security Tools……………………………………………………………………...13-14
Summary of finding……………………………………………………………………..18
Conclusion………………………………………………………………………………18
Recommendation…………………………………………………………………….18-19
REFERNCES……………………………………………………………………………………20
Online resources…………………………………………………………………………21
LIST OF APPENDICIES
A. Letter of request……………………………………………………………………...23
D. Survey Questionnaire………………………………………………………………..26
CURRICULUM VITAE……………………………………………………………………….27
Chapter 1
Introduction
Nowadays many people have the ability to take information from others using technology because it
contains data that can make you content with your life and other people just do it to bully or blackmailed
Advancements of modern technology are actually making us safer not only can new forms of password
protection help to safeguard our digital files and documents, advances in voice recognition and gesture
control also create a heightened degree of security for our devices and homes.
Although IT security and information security sound similar, they do refer to different types of security.
Information security refers to the processes and tools designed to protect sensitive business information
from invasion, whereas IT security refers to securing digital data, through computer network security.
IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets
such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive
information, blocking the access of sophisticated hackers. As hackers get smarter, the need to protect your
digital assets and network devices is even greater. While providing IT security can be expensive, a
significant breach costs an organization far more. Large breaches can jeopardize the health of a small
business. During or after an incident, IT security teams can follow an incident response plan as a risk
The researchers believe that this study can help other students and researcher to give deep understanding
about the student on how to protect or secure their data when going online. It will see here the importance
data and to keep confidential the academic performance of the students. It can help the students to be
knowledgeable enough to keep their accounts or data in a private way Santiago, (2016).
To all adults who uses gadgets or technology this may help them to increase their knowledge in terms of
securing their data when opening their account in internet. Benefits of technological solutions become
quite clear to them. They’re waking up to understand that simply placing a security officer at a post is no
The researcher could gather reliable data by the questionnaires and could evaluate the center of the study
by those data collected. The study is focus to the Senior High School students. The researcher will
conduct the survey to TVL- St Jordan in St. Rose Catholic School. The researcher importance of could
easily identify the important detail as being a senior high school student in the same school because there
is reliable knowledge between the researcher. The researcher, accepting their complains and compliments
is understandable.
Chapter 2
This chapter presents the review of related literature and studies with the use of these literature
and studies, both foreign, and local, the researcher gained insight that served as a reference for
the study.
Related Literature
A. Foreign
Over the past decade, businesses and consumers have seen technological advancements automate
business tasks and make paces toward an accessible society. With such critical implications of tech’s role
in our personal and working lives, though, we have seen the unfortunate results of leaving our now
If we are to anticipate how broad-based the next digital revolution will be, we should look to our
increasingly connected working landscape—from our devices, to key functions in our businesses. what do
you need for your business to be ready, and how can you get there?
Levy observes that the responsibility to manage this massive change is twofold, and it begins with the
“It’s about asking ourselves how we might be exposing people around us to unnecessary risk and to be
responsible upfront,” he explains. The new SWOT analysis for any business venture, he urges, should
Security has become an undertaking for which we are all become responsible.
According to Levy, the solution to insecurity will be a change of culture, and it starts with the
understanding that in order to build the robust and secure businesses urgently needed in tomorrow’s
Security shouldn’t be a luxury. Buy it upfront. Organizations need to start adopting an attitude of
understanding—that ransomware preparedness, time spent on a disaster recovery plan, or dollars spent on
cyber awareness for staff—is necessary to accommodate the changes in our cyber landscape.
To sum it up, the idea that the proactive protection of your organization’s assets is an “extra cost”, won’t
allow for the “security-first culture” that we need to adopt, promote and innovate around to foster a truly
prosperous economy.
Levy insists that these are conversations that we have to have with our own stakeholders and communities
as well. Widespread education makes for a safer society, without hindering the way we embrace
innovation. “We need to incorporate that into our storytelling. They’re looking to us in our myriad of
B. Local
In a virtual briefing Friday, Networks country manager for the Philippines, said the result of the survey
showed that one in two companies in the Philippines alone hiked their cybersecurity budget this year
compared to last year. He said 43 percent of the officials from surveyed businesses said bulk of their
information technology (IT) investments are allocated for cybersecurity, particularly to upgrade their
percent said they use anti-malware and antivirus tools, 59 percent said they use next-generation firewalls,
and 47 percent said they have started to invest in cloud native security.
Despite the increasing awareness among companies, the survey results showed that challenges remain and
these include employees’ lack of awareness on cybersecurity and risks from third-party service providers
and suppliers. Visaya said the lack of cybersecurity experts is a problem not only in the Philippines but
He added the national government and local governments have partnered with schools to address the lack
of cybersecurity experts not just locally but hopefully overseas. Villanueva (2019)
Conceptual Framework
Age
Sex
Residency/present
location
Religion
Business Importance of Information
Data Technology in Security
Chapter 3
Methodology
Research Methodology
The research methodology provided the necessary information such as the methods used, the
sources and the overall process in gathering and conducting the data.
Research Design
“Consequently, any discussion can only be a partial description of possibilities, but a review of
several major interpretive frameworks can provide a sense of options.” [ CITATION Joh \l 1033 ] The
research made use of descriptive research design. The study had employed exploratory case
study to explore TVL students’ usage of the internet in their everyday situation and how they
secure their accounts. The researchers want to gain in depth understanding on how to surely
secure their account while using internet with the help of analyzing data from quantitative and
qualitative data. This method will avoid biased interpretations and the difficulty in generalizing
Participants
The participants of the study will be grade 11 TVL ICT students of Saint Rose Catholic School
Inc. The participant was asked politely if they can answer the interview question. Overall there
will be 18 respondents, which will be gathered by the researcher once they’re done.
Data Collection
The gathering of data will last for about one week and it will in Microsoft word. The respondents will be
Grade 12 TVL St. Jordan Students and the respondents can answer Yes or No. Each interview will take at
To Explore Grade 12 TVL St. Jordan. We will use interview to the students who are using different social
media apps/networks. Semi-structured interviews will be conducted to the students to gather information.
Data Analysis
The verbatim translated from the interview will be deciphered and a duplicate of the entire verbatim
deciphered elucidation will be given to the interviewees to guarantee them that just the information that
Ethical Issues
In this study, interviewing someone is all about asking something that may get to the meaningful part that
the interviewer will ask something private and if there will be questions that may seem uncomfortable for
the interviewee to answer the interviewers will not force the interviewee to answer the question. Also, the
interviewers will inform the interviewee that the conversation will be recorded and will be used for
academic purposes. To guarantee the respondents that anything they will state in the interview is in high
secrecy. The researches will give them an informed consent letter, it stated there the information that will
be stated by the interviewee will be in high secrecy and will also be protected. Likewise, the motivation
behind the study and how it will be utilized are stated there. The researchers will not force the interviewee
This chapter present the analysis and interprets data gathered in order to draw out important information
ang significant points about the Importance of information technology in Security. For clarity and
consistency in the discussion, the data are presented by the likert scale and Pearson’s coefficient analysis.
Demographic Profile
16-17 10 62.5%
18 4 25%
19-20 2 12.5%
Total 16 100%
The table 1 shows the age of the respondents. 62.5% of the respondents are 16-17 in age. 25% of the
Male 11 68.75%
Female 5 31.25%
Total 16 100%
The table 2 shows the gender of the respondents. Out of 16 respondents there are 11 students that are
male which are 68.75% of the population. While 5 of the respondents are Female which is 31.25% of the
The table 3 shows the answer of the respondents. Out of 16 students there are 2 student that are strongly
disagree which are 12.5% of the population. 6.25% of students are Disagree. Same as Neutral that has
6.26% of the respondents. 56.25 of the respondents are Agree of the population. 3 students are Strongly
The table 4 shows agree with IT Security regulations. 6.25% of respondents are strongly Disagree. 6.25%
of respondents are Disagree. 1 student which is 6.25% is neutral. There are 11 students that are Agree
which are 68.75% of the population. While 2 students are Strongly Agree which is 12.5% of the
The table 5 shows often use of IT Security tool such as antivirus. Out of 16 respondents there are 0
students are strongly Disagree and Disagree. While there 4 students are neutral which is 25% of the
population. 62.5% of the students are agree in using IT Security. While 2 students are Strongly Agree
The table 5 shows the lost an account due to hacking. There are 4 respondents are Strongly Disagree
which is 25% of the population. While 25% of the students are Disagree. There are 12.5% of students are
neutral. While there are 3 respondents agree which is 18.75%. while there are also 3 students are Strongly
Security?
The table 6 shows the numbers of hackers during this time do you secure your accounts using IT Security.
Out of 16 respondents there are 1 Strongly Disagree. While 1 respondent Disagree which is 6.26%. there
are 4 students are neutral which is 25% of the population. While 7 students are Agree which has 43.75%
and there are 3 students are Strongly Agree which is 18.75% of the respondents.
The table 7 shows the IT security helps me to secure my accounts. Out of 16 respondents 1 student
Strongly Disagree. While none of students are Disagree. There 3 students Neutral which is 18.75% of the
respondents. There are 8 respondents agree which is 50%. While there are 4 students are Strongly Agree
The table 8 shows the IT Security gives me freedom to choose my security password. Out of 16
respondent 0 students are Strongly Disagree and Disagree. While there is 1 student neutral which is
6.25% of the respondents. 10 of respondents are agree which is 62.5. While 5 of the students are Strongly
This chapter present the summary of the study, findings, the conclusion drawn from the general problem,
Summary of findings
1. based on the answer of respondents, most of the big and important data is secured by the help of IT
Security using their ability and applications that can protect data into there mobiles or other kind of
technology.
2. based on the respondents they are using protected application that authorized by the IT Security to
secure their transaction with other people to prevent their account from hackers.
3. there are many ways to protect your data and control access based on this research IT Security make a
applications that can protect you from being hacked. They make a high Quality application to prevent and
Conclusion
Based on the findings of this study, The Importance Information Technology Security is significant
related to this situation we’re technology is the source information of a students during this pandemic.
Recommendation
Based from the findings and conclusion drawn, the following are recommendation:
1. future researcher may investigate what hackers can get by hacking and creating various viruses.
2. future researcher may investigate what can happen to the technologies and lives of a person affected by
Creswell, J. (n.d.). Qualitative Inquiry and Reasearch Design. Retrieved from Choosing Among five approaches:
https://www.goodreads.com/book/show/1080660.Qualitative_Inquiry_and_Research_Design
Rathbone, C. (2020, January 27). Techalliance. Retrieved from The first step to future-proofing? A culture of
security.: https://techalliance.ca/the-first-step-to-future-proofing-a-culture-of-security/?
gclid=EAIaIQobChMI08L57MTN7QIV0m4qCh1adwsgEAAYASAAEgLIW_D_BwE
Visaya, A. (2019, July 10). Philippine News Agency. Retrieved from PH companies consider cybersecurity risks:
https://www.pna.gov.ph/articles/1108649
Appendix A
LETTER OF REQUEST
December 2020
Prof. Embasan Socrates
Class Adviser/ Subject Teacher
St. Rose Catholic School, Inc Paniqui, tarlac
Noted by:
Embasan Socrates
Research Adviser
Approved by:
Mr. Mitchell D. Alabado
SHS Academic Coordinator
Appendix B
LETTER OF REQUEST
December2020
Dear Teacher:
I, Vjay Lawrence F. Ignacio of Grade 12- TVL student is currently working on a Quantitative
In this regard we would like to solicit for your cooperate to distribute the questionnaire to the
Grade 12 TVL in you class as the Respondents of this Research Study. Thank you and God Bless!
Sincerely yours,
Researcher
Noted by:
Embasan Socrates
Researcher Adviser
Approved by:
December2020
Dear Respondent
I, Vjay Lawrence F. Ignacio of Grade 12- TVL student is currently working on a Quantitative
Research entitled “Importance of Information Technology in Security” to complete my requirements on
Research on Daily Life 2.
In the regard. We are asking for your precious time, and effort to answer all the questions in the
questionnaire that are important and helpful for the completion of the study.
Rest assured that all data gathered from you will be kept in the highest level of confidentially.
Your positive response in this request will be valuable contribution for the success of the study and highly
appreciate.
Thank you very much for your cooperation and God Bless!
Sincerely yours,
Vjay Lawrence F. Ignacio
Researcher
Noted by:
Embasan Socrates
Research Adviser
Approved by
Mr. Mitchell D. Alabado
SHS Academic Coordinator
Appendix D
Name(optional): Date:
Questionnaires:
Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree
Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree
Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree
Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree
5. . With the numbers of hackers during this time do you secure your accounts using IT Security?
Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree
Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree
Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree
CURRICULUM VITAE
PERSONAL DATA
Name: Vjay Lawrence F. Ignacio
Address: Dapdap, Pabiqui, Tarlac
Religion: Roman Catholic
Date of Birth: August 3 2002
Place of Birth: Baguio City
Parents: Mr. Edgar Ignacio
Mrs. Ada Marie Ignacio
EDUCATION BACKGROUND
Elementary: 2015
P.O Domingo Montessori Elementary School
Magallanes Street, Paniqui, Tarlac
Philosophy in Life:
“LIFE IS NOT A PROBLEM TO BE SOLVED BUT A REALITY TO BE EXPERIENCE”