Governing Information Technology (IT) and Security Vulnerabilities: Empirical Study Applied on the Jordanian Industrial Companies

Governing Information Technology (IT) and Security Vulnerabilities: Empirical Study Applied on the Jordanian Industrial Companies

Asim El Sheikh (The Arab Academy for Banking & Financial Sciences, Jordan) and Husam A. Abu Khadra (The Arab Academy for Banking & Financial Sciences, Jordan)
Copyright: © 2009 |Pages: 16
DOI: 10.4018/jitr.2009010105
OnDemand PDF Download:
$37.50

Abstract

The aims of this study is to evaluate information technology (IT) governance implementation using the COBiTs’ maturity model, investigate the perceived Security Threats that face these companies and measures the causality between them. An Empirical Survey using self-administered questionnaire has been carried out to achieve the study objectives. The study results reveal that Jordanian industrial companies did not apply IT governance in its comprehensive methodology despite the implementation of some of its aspects .The study main recommendation for the industrial companies that it should give more attention to IT governance. Industrial companies Professionals should work more to increase the IT governance strength for all of its dimensions especially with the existence of negative causality relation between the IT governance and security threats frequencies.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 10: 4 Issues (2017): Forthcoming, Available for Pre-Order
Volume 9: 4 Issues (2016)
Volume 8: 4 Issues (2015)
Volume 7: 4 Issues (2014)
Volume 6: 4 Issues (2013)
Volume 5: 4 Issues (2012)
Volume 4: 4 Issues (2011)
Volume 3: 4 Issues (2010)
Volume 2: 4 Issues (2009)
Volume 1: 4 Issues (2008)
View Complete Journal Contents Listing