Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine

International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115 (2022)
  Copy   BIBTEX

Abstract

This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation and the application of Cyber Security in the Ministry of Interior and National Security. And that there is an impact of Digital transformation on the application of security in the Ministry of Interior and National Security in the governorates of Gaza, and the impact coefficient was (0.897). It was found that the dimensions affecting the dependent variable of Cyber Security are dimensions (organizational structure, job description, data privacy and security, technical infrastructure required for digital transformation), as these dimensions affect (89.7%) of the variation in the application of Cyber Security. The study presented a set of recommendations, the most important of which are: The need for the Ministry's administration to provide a special budget to develop the quality of its electronic services as a lever for digital transformation. And the need for the number of workers in computer and information technology departments and units to be commensurate with the volume and quality of work to bridge the gap between the required performance and the actual performance. The ministry should set a clear methodology for exchanging data and information between the components of the ministry. And the need for the Ministry of Interior and National Security to use a protection network capable of detecting all threats.

Links

PhilArchive

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Computational Transformation of the Public Sphere: Theories and Cases.S. M. Amadae (ed.) - 2020 - Helsinki: Faculty of Social Sciences, University of Helsinki.
Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
4th National Cyber Security Workshop, 11-12 Nov 2016, Mumbai.Anthony Lobo - 2016 - International Review of Information Ethics 25.
An Analysis of Prospective Teachers’ Digital Citizenship Behaviour Norms.Mehmet Sincar - 2011 - International Journal of Cyber Ethics in Education 1 (2):25-40.
Concept «stability» of modern researches of a security.D. Biriukov - 2015 - Epistemological studies in Philosophy, Social and Political Sciences 5:220-228.

Analytics

Added to PP
2022-11-30

Downloads
244 (#81,932)

6 months
112 (#37,552)

Historical graph of downloads
How can I increase my downloads?

Author Profiles

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references