A Review of The Literature on An Examination of The Effects of Cyber Security in Improved Public Sector Institution Performance in Jordan
Downloads
Gaining a clearer knowledge of the present level of cyber security adoption by public sector institutions—particularly in Jordan—was one of the study’s intended results. In order to improve the effectiveness of these institutions, the research reviewed various literature review on the current state of cyber security adoption. It also identified the obstacles that these institutions faced in embracing and executing these technologies, as well as the tactics that were required to improve cyber security applications. The assessment also highlighted cyber security initiatives that can boost operational effectiveness, enhance service delivery, and give the populace of the nation access to a safer digital environment. Therefore, by highlighting the difficulties and obstacles these organizations encounter, the research may contribute to the formulation of policy and decision-making frameworks that will direct future expenditures on cyber security and associated technology. Additionally, the results of this study may help improve cyber security protocols and implement them in Jordan’s public sector organizations. This might thus result in better service delivery, more operational efficiency, and a safer online environment for the people of the nation. The study may also contribute to policy and decision-making processes by highlighting the obstacles and difficulties these organizations confront, which might direct subsequent investments within cyber security innovations and technology.
Downloads
Akbar, M., Waseem, M. M., Mehanoor, S. H., & Barmavatu, P. (2024). Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing. Cluster Computing, 1-15.
Ali, L. (2019). Cyber crimes-A constant threat for the business sectors and its growth (A study of the online banking sectors in GCC). The Journal of Developing Areas, 53(1), 267-279.
Ali, R. F., Dominic, P. D. D., Ali, S. E. A., Rehman, M., & Sohail, A. (2021). Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance to compliance. Applied Sciences, 11(8), 3383.
Al-Jaghoub, S., Al-Yaseen, H., & Al-Hourani, M. (2010). Evaluation of Awareness and Acceptability of Using e Government Services in Developing Countries: The Case of Jordan. Electronic Journal of Information Systems Evaluation, 13(1), pp1-8.
Al‐ma'aitah, M. A. (2022). Investigating the drivers of cybersecurity enhancement in public organizations: The case of Jordan. The Electronic Journal of Information Systems in Developing Countries, 88(5), e12223.
Amer, T. B., & Al-Omar, M. I. A. (2023). The Impact of Cyber Security on Preventing and Mitigating Electronic Crimes in the Jordanian Banking Sector. International Journal of Advanced Computer Science and Applications, 14(8).
Amer, T. B., & Al-Omar, M. I. A. (2023). The Impact of Cyber Security on Preventing and Mitigating Electronic Crimes in the Jordanian Banking Sector. International Journal of Advanced Computer Science and Applications, 14(8).
Ani, U. D., He, H., & Tiwari, A. (2019). Human factor security: evaluating the cybersecurity capacity of the industrial workforce. Journal of Systems and Information Technology, 21(1), 2-35.
Atoum, I., Otoom, A., & Ali, A. A. (2017). Holistic cyber security implementation frameworks: A case study of jordan. International Journal of Information, Business and Management, 9(1), 108.
Atoum, I., Otoom, A., & Ali, A. A. (2017). Holistic cyber security implementation frameworks: A case study of jordan. International Journal of Information, Business and Management, 9(1), 108.
Bougaardt, G., & Kyobe, M. (2011, April). Investigating the factors inhibiting SMEs from recognizing and measuring losses from cybercrime in South Africa. In ICIME 2011-Proceedings of the 2nd International Conference on Information Management and Evaluation: ICIME (p. 62).
Ewurah, S. M. (2017). The concept of eGovernment: ICT policy guidelines for the policy makers of Ghana. Journal of Information Security, 8(2), 106-124.
Friedman, J., & Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses. Information Knowledge Systems Management, 7(1-2), 159-180.
Hiller, J. S., & Russell, R. S. (2013). The challenge and imperative of private sector cybersecurity: An international comparison. Computer Law & Security Review, 29(3), 236-245.
Itradat, A., Sultan, S., Al-Junaidi, M., Qaffaf, R., Mashal, F., & Daas, F. (2014). Developing an ISO27001 Information Security Management System for an Educational Institute: Hashemite University as a Case Study. Jordan Journal of Mechanical & Industrial Engineering, 8(2).
Joyner, C. C., & Lotrionte, C. (2017). Information warfare as international coercion: Elements of a legal framework. In The Use of Force in International Law (pp. 433-473). Routledge.
Njoroge, P. M., Ogalo, J. O., & Ratemo, C. M. (2021). Information System Security Practices and Implementation Issues and Challenges in Public Universities. European Journal of Information Technologies and Computer Science, 1(5), 11-15.
Nwankwo, W., & Ukaoha, K. C. (2019). Socio-technical perspectives on cybersecurity: Nigeria’s cybercrime legislation in review. International Journal of Scientific and Technology Research, 8(9), 47-58.
Osho, O., & Onoja, A. D. (2015). National cyber security policy and strategy of Nigeria: a qualitative analysis. International Journal of Cyber Criminology, 9(1), 120.
Panneerselvam, R. (2016). Managing E-Commerce Adoption Challenges for SMEs in Developing Countries. In Encyclopedia of E-Commerce Development, Implementation, and Management (pp. 1241-1249). IGI Global.
Rahman, M. H., Wuest, T., & Shafae, M. (2023). Manufacturing cybersecurity threat attributes and countermeasures: Review, meta-taxonomy, and use cases of cyberattack taxonomies. Journal of Manufacturing Systems, 68, 196-208.
Saleh, Z. I., Obeidat, R. A., & Khamayseh, Y. (2013). A Framework for an E-government Based on Service Oriented Architecture for Jordan. International Journal of Information Engineering and Electronic Business, 5(3), 1.
Siponen, M., Mahmood, M. A., & Pahnila, S. (2009). Technical opinion Are employees putting your company at risk by not following information security policies? Communications of the ACM, 52(12), 145-147.
Stewart, H., & Jürjens, J. (2017). Information security management and the human aspect in organizations. Information & Computer Security, 25(5), 494-534.
Upadhyaya, P., Shakya, S., & Pokharel, M. (2012). Information security framework for e-government implementation in Nepal. Journal of Emerging Trends in Computing and Information Sciences, 3(7).
Wall, D. S. (2013). Enemies within: Redefining the insider threat in organizational security policy. Security journal, 26, 107-124.
Wirtz, B. W., & Weyerer, J. C. (2017). Cyberterrorism and cyber attacks in the public sector: How public administration copes with digital threats. International Journal of Public Administration, 40(13), 1085-1100.
Yeh, Q. J., & Chang, A. J. T. (2007). Threats and countermeasures for information system security: A cross-industry study. Information & Management, 44(5), 480-491.
Copyright (c) 2024 Alanoud Amer Saleem Alrkeebat
This work is licensed under a Creative Commons Attribution 4.0 International License.