Managing the Cybersecurity of e-Government Programmes: The Case of Jordan
Full text | |||
Source | Journal of Information Systems Security Volume 21, Number 2 (2025)
Pages 149–176
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Nadia Samara — Arab Open University, Jordan
Dionysios Demetis — University of Hull, United Kingdom
|
||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
Any e-government programme provides e-services as one of the most important means by which the interaction between citizens, businesses and governments takes place. This has brought great opportunities but also raises serious cybersecurity challenges. Information systems security is necessary to mitigate the risks and threats that are faced by the e-government programme and to safeguard the confidentiality, integrity and availability of the available e-services. This study examines how information security is managed and approached within e-government programmes and conducts an interpretative case study at the Ministry of ICT in Jordan in order to do so. By building on the Technical/Formal/Informal (TFI) framework, the study deconstructs information security at these three levels and builds up a customised TFI-informed framework for e-government security, expanding it also to include citizens’ online trust as a key component of cyber-awareness.
Keywords
Information Security, Cybersecurity, e-Government, Jordan, Cyberawareness.
References
Adebukola, A. A., Navya, A. N., Jordan, F. J., Jenifer, N. J., and Begley, R. D. (2022). Cyber Security as a Threat to Health Care. Journal of Technology and Systems, 4(1), 32–64.
Åhlfeldt, R.-M., Spagnoletti, P., and Sindre, G. (2007). Improving the information security model by using TFI. New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC-11 22 Nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africa 22, 73–84.
Al Khasawneh, M. H. (2015). An empirical examination of consumer adoption of mobile banking (M-banking) in Jordan. Journal of Internet Commerce, 14(3), 341–362.
Algarni, A. (2019). A survey and classification of security and privacy research in smart healthcare systems. IEEE Access, 7, 101879–101894.
Alharbi, I., Zyngier, S., and Hodkinson, C. (2013). Privacy by design and customers’ perceived privacy and security concerns in the success of e-commerce. Journal of Enterprise Information Management, 26(6), 702–718.
Al-Jaghoub, S., Al-Yaseen, H., and Al-Hourani, M. (2010). Evaluation of Awareness and Acceptability of Using e-Government Services in Developing Countries: The Case of Jordan. Electronic Journal of Information Systems Evaluation, 13(1), pp1-8.
Almaiah, M. A., Al-Rahmi, A., Alturise, F., Hassan, L., Lutfi, A., Alrawad, M., Alkhalaf, S., Al-Rahmi, W. M., Al-sharaieh, S., and Aldhyani, T. H. (2022). Investigating the Effect of Perceived Security, Perceived Trust, and Information Quality on Mobile Payment Usage through Near-Field Communication (NFC) in Saudi Arabia. Electronics, 11(23), 3926.
Al-Omari, H. (2006). E-government architecture in Jordan: A comparative analysis. Journal of Computer Science, 2(11), 846–852.
Al-Shboul, M., Rababah, O., Ghnemat, R., and Al-Saqqa, S. (2014). Challenges and factors affecting the implementation of e-government in Jordan. Journal of Software Engineering and Applications, 7(13), 1111.
Alzyadat, A., and Alarabiat, A. (2022). Electronic Government Research in Jordan a Bird’s Eye View Using Meta Analysis. Journal of Theoretical and Applied Information Technology, 100(18), 5257–5273.
Ashaye, O. R., and Irani, Z. (2014). E-government implementation benefits, risks, and barriers in developing countries: Evidence from Nigeria. US-China Education Review, 13.
Baskerville, R. (1993). Information systems security design methods: Implications for information systems development. ACM Computing Surveys (CSUR), 25(4), 375–414.
Chuanfan, L. (2010). Research on role-based access control policy of e-government. 2010 International Conference on E-Business and E-Government, 714–716.
Cordella, A., and Iannacci, F. (2010). Information systems in the public sector: The e-Government enactment framework. The Journal of Strategic Information Systems, 19(1), 52–66.
Creswell, J. W. (2009). Mapping the field of mixed methods research. In Journal of mixed methods research (Vol. 3, Issue 2, pp. 95–108). SAGE publications Sage CA: Los Angeles, CA.
Dhillon, G. (2001). Challenges in managing information security in the new millennium. In Information security management: Global challenges in the new millennium (pp. 1–8). IGI Global.
Hansche, S. (2001). Designing a security awareness program: Part 1. Information Systems Security, 9(6), 1–9.
Khanyako, E., and Maiga, G. (2013). An information security model for e-government services adoption in Uganda. 2013 IST-Africa Conference & Exhibition, 1–11.
Luo, P. (2010). Researches on Information Security Evaluation of E-Government System. 2010 International Conference on E-Product E-Service and E-Entertainment, 1–3.
Maharaj, M. S., and Munyoka, W. (2019). Privacy, security, trust, risk and optimism bias in e-government use: The case of two Southern African Development Community countries. South African Journal of Information Management, 21(1), 1–9.
Mohammad, A., and Alsobeh, R. (2023). Cybersecurity awareness factors among adolescents in Jordan: Mediation effect of cyber scale and personal factors. 13(2).
MOICT. (2023). https://www.modee.gov.jo/En/Pages/Welcome_Note
Munyoka, W., and Maharaj, M. S. (2019). Privacy, security, trust, risk and optimism bias in e-government use: The case of two Southern African Development Community countries. SA Journal of Information Management, 21(1), 1–9.
Naik, K. S., Ramachandra, G. A., and Reddy, M. B. (2014). An Extended Security Framework for E-Government. International Journal of Advanced Research in Computer Science, 5(1).
Ndou, V. (2004). E-government for developing countries: Opportunities and challenges. Electron. J. Inf. Syst. Dev. Ctries., 18(1), 1–24.
Ramtohul, A., and Soyjaudah, K. M. S. (2016). Information security governance for eservices in southern African developing countries e-Government projects. Journal of Science & Technology Policy Management, 7(1), 26–42.
Salem, A., and Al-Sayyed, R. (2023). Security Framework for Hosting Systems on the Cloud: Case Study of Jordan E-Government Websites. 1–6.
Samonas, S., and Coss, D. (2014). The CIA strikes back: Redefining confidentiality, integrity and availability in security. Journal of Information System Security, 10(3).
Shandler, R., and Gomez, M. A. (2022). The hidden threat of cyber-attacks–undermining public confidence in government. Journal of Information Technology and Politics, 00(00), 1–16.
Shannak, R. O. (2013). The difficulties and possibilities of e-government: The case of Jordan. Journal of Management Research, 5(2), 189.
Tassabehji, R., Elliman, T., and Mellor, J. (2007). Generating citizen trust in egovernment security: Challenging perceptions. International Journal of Cases on Electronic Commerce (IJCEC), 3(3), 1–17.
Walsham, G. (2006). Doing interpretive research. European Journal of Information Systems, 15(3), 320–330.