
It was designed to establish measures institutions implement to protect user information and to ensure its security. The third part of the interview involves regulatory, legal, and policy measures use in data management. It was designed to determine the existing vulnerabilities and threats on information systems and how institutions counteract and prevent them. The second part of the interview entails the systems vulnerabilities and types of attacks towards user information. It was designed to determine what data management involves and the existing systems to manage big data and methods to ensure data security and privacy. The first part of the interview involves applying big data, the data process, and management. Each construct will be analyzed depending on the participant's response and opinions.

This study conducted a qualitative analysis of the primary data collected from interviews using NVIVO.

A simple to display analyzed data is through tables, graphs, and charts. When the analysis is conducted, the main aim is to look for data patterns and trends. The collected information answered the research questions by pointing out the barriers and challenges that bank institutions are going through to secure user information.

This research findings study points out the existing framework in bank institutions that secure user data and protect it from the vulnerability of information threats. 81 CHAPTER 4: FINDINGS Introduction This chapter presents findings and analysis of the information collected from an interview of IT experts working in banking institutions.
