Abstract

Adopting the technologies among organizations comes with the continuous worries of protection and hacking. The idea of cyber-security has become over the years the main interest of many organizations, which depend on technologies in its operations, which requires them to pay extra attention to their technological infrastructure. The current study aims at examining the influence of cyber-security forces on organizational internal operations and the role of technological infrastructure in defining and controlling the level of protection that cyber-security has on organizational internal processes. Quantitative approach was adopted, and a questionnaire was utilized to collect the data from a convenient sample of 360 software engineers, network engineers, software testers, web developers, and technical support using a structured survey questionnaire, and analyzed using SPSS version 21. The results confirmed that cyber-security motivators (data growth, technology expansion, access to required resources, operational control, and technical control) indirectly affect solid internal processes that are attributed to the consistency of technological infrastructure in an organization. The variable of ‘data growth’ appeared to be the most influential motivator on cyber-security strategies, as it scored a mean of 4.2661, which is the highest among all adopted variables and followed by the variable of ‘technical control’, which scored a mean of 4.1296. Accordingly, the study recommends that organizations should consider IT infrastructure as a main item within their risk management strategies to avoid unpredicted risks and attacks.

Highlights

  • Nowadays society runs largely on technology, as it depends on it for commerce, industry, and interaction

  • The current study aims at examining the influence of cyber-security forces on organizational internal operations and the role of technological infrastructure in defining and controlling the level of protection that cyber-security has on organizational internal processes

  • The results confirmed that cyber-security motivators indirectly affect solid internal processes that are attributed to the consistency of technological infrastructure in an organization

Read more

Summary

Introduction

Nowadays society runs largely on technology, as it depends on it for commerce, industry, and interaction This dependency of society on technology has made cyber to be firmly entrenched in people’s mindset and language. While the use of the technology or cyber/internet has led to significant advances in many areas, it has exposed individuals and organizations to a host of security risks emanating from cyber-attacks via digital interfaces. Examples of these cyber-attacks include data breaches on personal and corporate devices, the virus that attacks computer infrastructure, and denial-of-service (DoS) attacks on computer networks.

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.