Nadia Samara
Managing the cybersecurity of e-government programmes: the case of Jordan
Samara, Nadia; Demetis, Dionysios
Authors
Dr Dionysios Demetis D.Demetis@hull.ac.uk
Reader in Information Systems, Head of Group (Logistics & Management Systems)
Abstract
Any e-government programme provides e-services as one of the most important means by which the interaction between citizens, businesses and governments takes place. This has brought great opportunities but also raises serious cybersecurity challenges. Information systems security is necessary to mitigate the risks and threats that are faced by the e-government programme and to safeguard the confidentiality, integrity and availability of the available e-services. This study examines how information security is managed and approached within e-government programmes and conducts an interpretative case study at the Ministry of ICT in Jordan in order to do so. By building on the Technical/Formal/Informal (TFI) framework, the study deconstructs information security at these three levels and builds up a customised TFI-informed framework for e-government security, expanding it also to include citizens’ online trust as a key component of cyber-awareness.
Citation
Samara, N., & Demetis, D. (2025). Managing the cybersecurity of e-government programmes: the case of Jordan. Journal of Information Systems Security, 21(2), 149-176
Journal Article Type | Article |
---|---|
Acceptance Date | Apr 29, 2025 |
Online Publication Date | Jul 10, 2025 |
Publication Date | Jul 10, 2025 |
Deposit Date | Apr 30, 2025 |
Publicly Available Date | Aug 18, 2025 |
Print ISSN | 1551-0123 |
Electronic ISSN | 1551-0808 |
Peer Reviewed | Peer Reviewed |
Volume | 21 |
Issue | 2 |
Pages | 149-176 |
Keywords | Information Security; Cybersecurity; e-Government; Jordan; Cyberawareness |
Public URL | https://hull-repository.worktribe.com/output/5136586 |
Publisher URL | https://www.jissec.org/Contents/V21/N2/V21N2-Samara.html |
Files
Accepted manuscript
(678 Kb)
PDF
Copyright Statement
Copyright © 2025 by The Information Institute. All rights reserved. No part of the manuscript may be reproduced in any form without written permission of the publisher, except for non-commercial, educational use such as classroom teaching purposes.
Journal open access policy
(35 Kb)
PDF
You might also like
The Case for Lean Cybersecurity Leadership
(2025)
Journal Article
The technological construction of reality
(2024)
Book
Cybercrime: Understanding the Current State of Literature and Issues Facing CISOs
(2024)
Journal Article
Value Sinks: A Process Theory of Corruption Risk during Complex Organizing
(2023)
Journal Article
Downloadable Citations
About Repository@Hull
Administrator e-mail: repository@hull.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search