IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

The Influence of Governmental Support on Cyber-Security Adoption and Performance: The Mediation of Cyber Security and Technological Readiness

The Influence of Governmental Support on Cyber-Security Adoption and Performance: The Mediation of Cyber Security and Technological Readiness
View Sample PDF
Author(s): Aleyah Al-Sharhan (College of Technological Studies, PAAET, Kuwait City, Kuwait), Ahmad Alsaber (American University of Kuwait, Kuwait), Yousef Al Khasham (American University of Kuwait, Kuwait), Anwaar Al Kandari (Kuwait Technical College, Kuwait), Rania Nafea (University of Technology, Bahrain)and Parul Setiya (Govind Ballabh Pant University of Agriculture and Technology, Pantnagar, India)
Copyright: 2024
Volume: 19
Issue: 1
Pages: 16
Source title: International Journal of Business Data Communications and Networking (IJBDCN)
DOI: 10.4018/IJBDCN.341264

Purchase


Abstract

The accelerated cyberattacks presents a severe challenge to the companies, as they seem unprepared to confront the threat of cyberattacks, they will suffer enormous losses and have their performance suffer as a result. To better serve its population and communities, Kuwait will have improved and updated its national infrastructure by 2035. This study examines how the governmental top management support, cyber security readiness, and technology readiness affect employee's organizational security adoption intentions in Kuwait governmental organizations and realization of its benefits. The quantitative method was employed in this work. The study found that top management support influencing organizational security performance mediating by cyber security readiness and technology, which affects the tangible and intangible benefits. This study can help policy makers in governmental organizations to improve cyber security adoption. The findings of this study may be utilized for enhancing the sustainability of cyber security in governmental organizations in Kuwait.

Related Content

JianTong Yu, Li Li. © 2024. 20 pages.
Md. Alimul Haque, Sultan Ahmad, Ali J. Abboud, Md. Alamgir Hossain, Kailash Kumar, Shameemul Haque, Deepa Sonal, Moidur Rahman, Senapathy Marisennayya. © 2024. 27 pages.
Neeraj Kumar, Ritu Chauhan. © 2024. 18 pages.
Gerald Dapaah Gyamfi, Eunice Akpene Dzidzinyo, Ebenezer Nortei Dowuona. © 2024. 17 pages.
Konstantin Malyshenko, Vadim Malyshenko, Marina Anashkina, Dmitry Anashkin. © 2024. 21 pages.
Aleyah Al-Sharhan, Ahmad Alsaber, Yousef Al Khasham, Anwaar Al Kandari, Rania Nafea, Parul Setiya. © 2024. 16 pages.
Angelin Gladston, S. Naveenkumar, K. Sanjeev, A. Gowthamraj. © 2024. 25 pages.
Body Bottom