Abstract

Gaining a clearer knowledge of the present level of cyber security adoption by public sector institutions—particularly in Jordan—was one of the study’s intended results. In order to improve the effectiveness of these institutions, the research reviewed various literature review on the current state of cyber security adoption. It also identified the obstacles that these institutions faced in embracing and executing these technologies, as well as the tactics that were required to improve cyber security applications. The assessment also highlighted cyber security initiatives that can boost operational effectiveness, enhance service delivery, and give the populace of the nation access to a safer digital environment. Therefore, by highlighting the difficulties and obstacles these organizations encounter, the research may contribute to the formulation of policy and decision-making frameworks that will direct future expenditures on cyber security and associated technology. Additionally, the results of this study may help improve cyber security protocols and implement them in Jordan’s public sector organizations. This might thus result in better service delivery, more operational efficiency, and a safer online environment for the people of the nation. The study may also contribute to policy and decision-making processes by highlighting the obstacles and difficulties these organizations confront, which might direct subsequent investments within cyber security innovations and technology.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.