Governing Information Technology (IT) and Security Vulnerabilities: Empirical Study Applied on the Jordanian Industrial Companies

Governing Information Technology (IT) and Security Vulnerabilities: Empirical Study Applied on the Jordanian Industrial Companies

Asim El Sheikh, Husam A. Abu Khadra
Copyright: © 2009 |Pages: 16
DOI: 10.4018/jitr.2009010105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The aims of this study is to evaluate information technology (IT) governance implementation using the COBiTs’ maturity model, investigate the perceived Security Threats that face these companies and measures the causality between them. An Empirical Survey using self-administered questionnaire has been carried out to achieve the study objectives. The study results reveal that Jordanian industrial companies did not apply IT governance in its comprehensive methodology despite the implementation of some of its aspects .The study main recommendation for the industrial companies that it should give more attention to IT governance. Industrial companies Professionals should work more to increase the IT governance strength for all of its dimensions especially with the existence of negative causality relation between the IT governance and security threats frequencies.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 15: 6 Issues (2022): 1 Released, 5 Forthcoming
Volume 14: 4 Issues (2021)
Volume 13: 4 Issues (2020)
Volume 12: 4 Issues (2019)
Volume 11: 4 Issues (2018)
Volume 10: 4 Issues (2017)
Volume 9: 4 Issues (2016)
Volume 8: 4 Issues (2015)
Volume 7: 4 Issues (2014)
Volume 6: 4 Issues (2013)
Volume 5: 4 Issues (2012)
Volume 4: 4 Issues (2011)
Volume 3: 4 Issues (2010)
Volume 2: 4 Issues (2009)
Volume 1: 4 Issues (2008)
View Complete Journal Contents Listing