Cybersecurity Practices and Supply Chain Performance: The Case of Jordanian Banks
<p>Research model, text inside circles need to be formatted correctly, if you please make them in the center of the shape with the same font size and bold effect.</p> "> Figure 2
<p>Structural model estimate for main hypothesis H1.</p> "> Figure 3
<p>Structural model estimate for sub-hypotheses.</p> ">
Abstract
:1. Introduction
2. Theoretical Framework
2.1. Cybersecurity Practices
2.2. Supply Chain Performance
2.3. Summary of Previous Studies and Research Gap
2.4. Research Model and Hypotheses
3. Methodology
3.1. Research Design
3.2. Study Population and Sample
3.3. Respondents’ Profiles
3.4. Measurement Scale Items
3.5. Data Preparation and Screening
3.6. Instrument Validity and Reliability
Examining the Quality of Measurement Models (Instruments)
4. Analysis
4.1. Respondents’ Profiles
Levels of Cybersecurity Practices and SCP in the Jordanian Banking Sectors
4.2. Measurement Model
4.3. Structural Measurement
5. Discussion
- Q1: what is the level of awareness of managers and customers regarding the significance of SCS in the service sector of Jordanian banks?
- Q2: what are the primary cybersecurity practices applied to the service sector in Jordanian banks?
- Level of Service Quality
- Q3: what is the expected impact of cybersecurity practices on the SCP of the service sector in Jordanian banks?
5.1. Theoretical Implications
5.2. Practical Implications
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Abu AlKhair, D. M. H. M. I. (2023). The impact of internal audit quality in reducing cyber risks in order to support financial stability in electronic banks (a field study). Scientific Journal of Financial and Administrative Studies and Research, 15(1), 1–71. [Google Scholar]
- Al-Alawi, A. I., Mehrotra, A. A., & Al-Bassam, S. A. (2020). Cybersecurity: Cybercrime prevention in higher learning institutions. In Implementing computational intelligence techniques for security systems design (pp. 255–274). IGI Global. [Google Scholar]
- Alhassan, M. M., & Adjei-Quaye, A. (2017). Information security in an organization. International Journal of Computer (IJC), 24(1), 100–116. Available online: https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/820 (accessed on 1 September 2024).
- Ali, N., Ahmed, A., Anum, L., Ghazal, T. M., Abbas, S., Khan, M. A., Alzoubi, H. M., & Ahmad, M. (2021). Modeling supply chain information collaboration empowered with machine learning techniques. Intelligent Automation and Soft Computing, 30(1), 243–257. [Google Scholar] [CrossRef]
- Alkhatib, S. F. S. (2024). An advanced fuzzy approach for assessing supply chain resilience in developing economies. International Journal of Operational Research, 50(4), 401–425. [Google Scholar] [CrossRef]
- Almufleh, N. M., & Alkhatib, S. F. (2023). The impact of supply chain management practices on the operational performance of 5-star hotels operating in Jordan. Jordan Journal of Business Administration, 19(1). [Google Scholar] [CrossRef]
- Alnadi, M., & Altahat, S. (2024). Artificial intelligence applications for enhancing organizational excellence: Modifying role of supply chain agility. Problems and Perspectives in Management, 22(2), 339–351. [Google Scholar] [CrossRef]
- Alotaibi, F., Furnell, S., Stengel, I., & Papadaki, M. (2016). A review of using gaming technology for cyber-security awareness. International Journal for Information Security Research (IJISR), 6(2), 660–666. [Google Scholar] [CrossRef]
- Al-Samour, A. M. S., & Al-Khazali, A. S. K. (2020). Assessment of national cyber security in preventing crisis and disaster in Jordanian banks [Unpublished master’s thesis, Hashemite University]. Available online: http://search.mandumah.com/Record/1318679 (accessed on 1 September 2024).
- Al-Sarhan, H. A. -M. S., & Al-Mashaqbeh, M. N. M. H. (2020). The impact of applying cyber security policy on the quality of accounting information in Jordanian commercial banks [Unpublished master’s thesis, Al al-Bayt University]. [Google Scholar]
- Alzoubi, H., Alshurideh, M., Kurdi, B., Akour, I., & Aziz, R. (2022). Does BLE technology contribute towards improving marketing strategies, customers’ satisfaction and loyalty? The role of open innovation. International Journal of Data and Network Science, 6(2), 449–460. [Google Scholar] [CrossRef]
- Arabyat, Y. A., Alarabeyyat, A., & Abuaddous, M. (2023, December 18–19). Overview of cybersecurity trends in Jordan’s financial sector. International Conference of Reliable Information and Communication Technology (pp. 285–292), Johor Bahru, MalaysiaAvailable online: https://link.springer.com/chapter/10.1007/978-3-031-59707-7_25 (accessed on 1 September 2024).
- Bada, M., Sasse, A. M., & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv, arXiv:1901.02672. [Google Scholar] [CrossRef]
- Baltacioglu, T., Ada, E., Kaplan, M. D., Yurt, A. O., & Cem Kaplan, Y. (2007). A new framework for service supply chains. The Service Industries Journal, 27(2), 105–124. Available online: https://www.tandfonline.com/doi/abs/10.1080/02642060601122629 (accessed on 1 September 2024). [CrossRef]
- Beamon, B. M., & Balcik, B. (2008). Performance measurement in humanitarian relief chains. International Journal of Public Sector Management, 21(1), 4–25. Available online: https://www.emerald.com/insight/content/doi/10.1108/09513550810846087/full/html (accessed on 1 September 2024). [CrossRef]
- Byrne, B. M. (2016). Structural equation modeling with AMOS: Basic concepts, applications, and programming. Routledge. Available online: https://www.taylorfrancis.com/books/mono/10.4324/9781315757421/structural-equation-modeling-amos-barbara-byrne (accessed on 1 August 2024).
- Cele, N. N., & Kwenda, S. (2024). Do cybersecurity threats and risks have an impact on the adoption of digital banking? A systematic literature review. Journal of Financial Crime. ahead-of-print. [Google Scholar] [CrossRef]
- Cenamor, J., Sjödin, D. R., & Parida, V. (2017). Adopting a platform approach in servitization: Leveraging the value of digitalization. International Journal of Production Economics, 192, 54–65. [Google Scholar] [CrossRef]
- Chang, H. H., Wong, K. H., & Chiu, W. S. (2019). The effects of business systems leveraging on supply chain performance: Process innovation and uncertainty as moderators. Information & Management, 56(6), 103140. [Google Scholar] [CrossRef]
- Chowdhury, M. M. H., Quaddus, M., & Agarwal, R. (2019). Supply chain resilience for performance: Role of relational practices and network complexities. Supply Chain Management: An International Journal, 24(5), 659–676. [Google Scholar] [CrossRef]
- Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13–21. [Google Scholar] [CrossRef]
- Dam, S. M., & Dam, T. C. (2021). Relationships between service quality, brand image, customer satisfaction, and customer loyalty. The Journal of Asian Finance, Economics and Business, 8(3), 585–593. [Google Scholar]
- Daud, N. M., Mamud, N. I., & Aziz, S. A. (2011). Customer’s perception towards information security in Internet banking system in Malaysia. Australian Journal of Basic and Applied Sciences, 5(9), 101–112. Available online: https://www.atlantis-press.com/article/125925996.pdf (accessed on 1 August 2024).
- Del Giorgio Solfa, F. (2022). Impacts of cyber security and supply chain risk on digital operations. Available online: https://www.aacademica.org/del.giorgio.solfa/495 (accessed on 1 September 2024).
- De Vass, T., Shee, H., & Miah, S. J. (2018). The effect of “Internet of Things” on supply chain integration and performance: An organisational capability perspective. Australasian Journal of Information Systems, 22. [Google Scholar] [CrossRef]
- Dubey, R., Altay, N., Gunasekaran, A., Blome, C., Papadopoulos, T., & Childe, S. J. (2018). Supply chain agility, adaptability and alignment: Empirical evidence from the Indian auto components industry. International Journal of Operations & Production Management, 38(1), 129–148. [Google Scholar] [CrossRef]
- Ellis, S., Morris, H. D., & Santagate, J. (2015). IoT-enabled analytic applications revolutionize supply chain planning and execution. International Data Corporation (IDC) White Paper, 13. Available online: https://www.savi.com/wp-content/uploads/IDC-IoT-enabled-analytics-applications_final.pdf (accessed on 1 September 2024).
- Fernando, Y., Tseng, M. L., Wahyuni-Td, I. S., de Sousa Jabbour, A. B. L., Chiappetta Jabbour, C. J., & Foropon, C. (2023). Cyber supply chain risk management and performance in industry 4.0 era: Information system security practices in Malaysia. Journal of Industrial and Production Engineering, 40(2), 102–116. Available online: https://www.tandfonline.com/doi/abs/10.1080/21681015.2022.2116495 (accessed on 1 August 2024). [CrossRef]
- Ferraiuolo, A., Behjati, R., Santoro, T., & Laurie, B. (2022, November 7). Policy transparency: Authorization logic meets general transparency to prove software supply chain integrity. 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (pp. 3–13), Los Angeles, CA, USA. [Google Scholar] [CrossRef]
- Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. Available online: https://www.jstor.org/stable/3151312 (accessed on 1 September 2024). [CrossRef]
- Goldsby, T. J., & Stank, T. P. (2000). World class logistics performance and environmentally responsible logistics practices. Journal of Business Logistics, 21(2), 187–208. [Google Scholar]
- Gunasekaran, A., Patel, C., & McGaughey, R. E. (2004). A framework for supply chain performance measurement. International Journal of Production Economics, 87(3), 333–347. Available online: https://www.sciencedirect.com/science/article/pii/S0925527303002561 (accessed on 1 August 2024). [CrossRef]
- Hair, J. F., Jr., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2021). A primer on partial least squares structural equation modeling (PLS-SEM). Sage Publications. Available online: https://uk.sagepub.com/en-gb/eur/a-primer-on-partial-least-squares-structural-equation-modeling-pls-sem/book270548 (accessed on 1 September 2024).
- Hammour, R. A., Gharaibeh, Y. A., Qasaimeh, M., & Al-Qassas, R. S. (2019, December 2–5). The status of information security systems in banking sector from social engineering perspective. Second International Conference on Data Science, E-Learning and Information Systems (pp. 1–7), Dubai, United Arab EmiratesAvailable online: https://dl.acm.org/doi/abs/10.1145/3368691.3368705 (accessed on 1 August 2024).
- Hanaysha, J. R., & Alzoubi, H. M. (2022). The effect of digital supply chain on organizational performance: An empirical study in Malaysia manufacturing industry. Uncertain Supply Chain Management, 10(2), 495–510. [Google Scholar] [CrossRef]
- Haupert, V., Maier, D., & Müller, T. (2017, November 16–17). Paying the price for disruption: How a FinTech allowed account takeover. The 1st Reversing and Offensive-oriented Trends Symposium (pp. 1–10), Vienna, AustriaAvailable online: https://cris.fau.de/publications/111220384/ (accessed on 1 September 2024).
- Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115–135. [Google Scholar] [CrossRef]
- Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems, 18(2), 106–125. Available online: https://www.tandfonline.com/doi/full/10.1057/ejis.2009.6 (accessed on 1 August 2024). [CrossRef]
- Humayed, A., Lin, J., Li, F., & Luo, B. (2017). Cyber-physical systems security—A survey. IEEE Internet of Things Journal, 4(6), 1802–1831. [Google Scholar] [CrossRef]
- Huxtable, J., & Schaefer, D. (2016). On servitization of the manufacturing industry in the UK. Procedia Cirp, 52, 46–51. [Google Scholar] [CrossRef]
- ITU. (2023). Global cybersecurity index 2023. International Telecommunications Union. Available online: https://www.itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx (accessed on 1 September 2024).
- Kant, R., & Jaiswal, D. (2017). The impact of perceived service quality dimensions on customer satisfaction: An empirical study on public sector banks in India. International Journal of Bank Marketing, 35(3), 411–430. [Google Scholar] [CrossRef]
- Katzan, H., Jr. (2012). Cybersecurity service model. Journal of Service Science, 5(2), 71–78. Available online: https://clutejournals.com/index.php/JSS/article/view/7576 (accessed on 1 September 2024).
- Khidzir, N. Z., Daud, K. A. M., Ismail, A. R., Ghani, M. S. A. A., & Ibrahim, M. A. H. (2018). Information security requirement: The relationship between cybersecurity risk confidentiality, integrity, and availability in digital social media. In Regional conference on science, technology and social sciences (RCSTSS 2016) (pp. 229–237). Springer. Available online: https://link.springer.com/chapter/10.1007/978-981-13-0074-5_21 (accessed on 1 August 2024).
- Kim, M. G. (2017). A cautionary note on the use of Cook’s distance. Communications for Statistical Applications and Methods, 24(3), 317–324. Available online: http://www.csam.or.kr/journal/view.html?doi=10.5351/CSAM.2017.24.3.317 (accessed on 1 September 2024). [CrossRef]
- Merriam-Webster. (2024). Cybersecurity. In Merriam-Webster.com dictionary. Available online: https://www.merriam-webster.com/dictionary/cybersecurity (accessed on 14 June 2023).
- Mullet, V., Sondi, P., & Ramat, E. (2021). A review of cybersecurity guidelines for manufacturing factories in industry 4.0. IEEE Access, 9, 23235–23263. [Google Scholar] [CrossRef]
- Novaes Neto, N., Madnick, S., de Paula, M. G., & Malara Borges, N. (2020). A case study of the capital one data breach. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3542567 (accessed on 1 December 2024).
- Oke, A., Burke, G., & Myers, A. (2007). Innovation types and performance in growing UK SMEs. International Journal of Operations & Production Management, 27(7), 735–753. [Google Scholar] [CrossRef]
- Omariba, Z., Masese, N., & Wanyembi, G. (2012). Security and privacy of electronic banking. International Journal of Computer Science Issues, 9(4), 432–446. Available online: https://search.proquest.com/openview/bf34de943ee98122bbca465d21d24366/1?pq-origsite=gscholar&cbl=55228 (accessed on 1 August 2024).
- Pandey, S., Singh, R. K., Gunasekaran, A., & Kaushik, A. (2020). Cyber security risks in globalized supply chains: A conceptual framework. Journal of Global Operations and Strategic Sourcing, 13(1), 103–128. Available online: https://www.emerald.com/insight/content/doi/10.1108/JGOSS-05-2019-0042/full/html (accessed on 1 September 2024). [CrossRef]
- Puhakainen, P., & Siponen, M. (2010). Improving employees’ compliance through information systems security training: An action research study. MIS Quarterly, 34(4), 757–778. [Google Scholar] [CrossRef]
- Ramanujapuram, A., & Akkihal, A. (2014, December 5–6). Improving the performance of rural supply chains using mobile phones: Reducing information asymmetry to improve stock availability in low-resource environments. The Fifth ACM Symposium on Computing for Development (pp. 11–20), San Jose, CA, USAAvailable online: https://dl.acm.org/doi/10.1145/2674377.2674382 (accessed on 1 September 2024).
- Rouse, M. (2022). CIA triad of information security. Techopedia blog. Available online: https://www.techopedia.com/definition/25830/cia-triad-of-information-security (accessed on 1 September 2024).
- Rozhkov, E. V. (2022). Opportunity to change the future or “institutional trap”. Becтник Yнивepcитeтa, 114–121. Available online: https://vestnik.guu.ru/jour/issue/download/80/80#page=114 (accessed on 1 September 2024). [CrossRef]
- Saeed, M. M., & Donkoh, E. (2024). Mobile banking services and financial inclusion among customers of commercial banks: Evidence from an emerging economy. Business Strategy & Development, 7(4), e70035. [Google Scholar] [CrossRef]
- Samonas, S., & Coss, D. L. (2014). The CIA strikes back: Redefining confidentiality, integrity and availability in security. Journal of Information Systems Security, 10(3), 21–45. Available online: https://www.jissec.org/Contents/V10/N3/V10N3-Samonas.html (accessed on 1 August 2024).
- Sarratiagham, A. (2008). Perceived information security and consumer trust in electronic commerce transactions: A survey of Internet banking adoption in Malaysia. Journal of the Asian Academy of Applied Business, 4(1), 15–27. Available online: https://jurcon.ums.edu.my/ojums/index.php/JAAAB/article/view/1272/818 (accessed on 1 September 2024).
- Sawangwong, A., & Chaopaisarn, P. (2023). The impact of applying knowledge in the technological pillars of Industry 4.0 on supply chain performance. Kybernetes, 52(3), 1094–1126. [Google Scholar] [CrossRef]
- Seno, S. A. H., Bidmeshk, O. G., & Ghaffari, K. (2015, April 16). Information security diagnosis in electronic banking: A case study of Tejarat Bank’s branches of Isfahan. 2015 9th International Conference on e-Commerce in Developing Countries: With Focus on e-Business (ECDC) (pp. 1–8), Isfahan, Iran. [Google Scholar] [CrossRef]
- Shukor, A. A. A., Newaz, M. S., Rahman, M. K., & Taha, A. Z. (2021). Supply chain integration and its impact on supply chain agility and organizational flexibility in manufacturing firms. International Journal of Emerging Markets, 16(8), 1721–1744. [Google Scholar] [CrossRef]
- Singh, R. K., Kumar, P., & Chand, M. (2019). Evaluation of supply chain index in context to industry 4.0 environment. Benchmarking: An International Journal, 28(5), 1622–1637. [Google Scholar] [CrossRef]
- Sleimi, M. (2020). Effects of risk management practices on banks’ performance: An empirical study of the Jordanian banks. Management Science Letters, 10(2), 489–496. Available online: http://growingscience.com/beta/msl/3437-effects-of-risk-management-practices-on-banks-performance-an-empirical-study-of-the-jordanian-banks.html (accessed on 1 September 2024). [CrossRef]
- Sobb, T., Turnbull, B., & Moustafa, N. (2020). Supply chain 4.0: A survey of cyber security challenges, solutions and future directions. Electronics, 9(11), 1864. Available online: https://www.mdpi.com/2079-9292/9/11/1864 (accessed on 1 August 2024). [CrossRef]
- Tawfik, O. I., Al Tahat, S., Jasim, A. L., & Abd Almonem, O. (2021). Intellectual impact of cyber governance in the correct application of cloud accounting in Jordanian commercial banks-from the point of view of Jordanian auditors. Journal of Management Information and Decision Sciences, 24(5), 1–14. Available online: https://www.abacademies.org/articles/intellectual-impact-of-cyber-governance-in-the-correct-application-of-cloud-accounting-in-jordanian-commercial-banks--from-the-poi-10903.html (accessed on 1 September 2024).
- Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2000). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478. [Google Scholar] [CrossRef]
- Wang, X., Wang, B., Wu, Y., Ning, Z., Guo, S., & Yu, F. R. (2024). A survey on trustworthy edge intelligence: From security and reliability to transparency and sustainability. IEEE Communications Surveys & Tutorials. [Google Scholar] [CrossRef]
- Wu, H., Cao, J., Yang, Y., Tung, C. L., Jiang, S., Tang, B., Liu, Y., Wang, X., & Deng, Y. (2019, July 29–August 1). Data management in supply chain using blockchain: Challenges and a case study. 2019 28th International Conference on Computer Communication and Networks (ICCCN) (pp. 1–8), Valencia, Spain. [Google Scholar] [CrossRef]
- Wu, H., Liu, J., & Liang, B. (2024). AI-driven supply chain transformation in Industry 5.0: Enhancing resilience and sustainability. Journal of the Knowledge Economy. [Google Scholar] [CrossRef]
- Yan, Y., Wei, C., Guo, X., Lu, X., Zheng, X., Liu, Q., Zhou, C., Song, X., Zhao, B., Zhang, H., & Jiang, G. (2020, June 14–19). Confidentiality support over financial grade consortium blockchain. 2020 ACM SIGMOD International Conference on Management of Data (pp. 2227–2240), Portland, OR, USA. [Google Scholar] [CrossRef]
- Yip, N. S. M. S. (2015). The effect of cyber supply chain security towards lean and agile supply chain performance in healthcare industry: The mediating effect of organizational capabilities [Doctoral dissertation, Universiti Sains Malaysia]. Available online: http://eprints.usm.my/29998/1/Syazwani.pdf (accessed on 1 September 2024).
# | Practical Application in Jordanian Context | Key Dimensions | |
---|---|---|---|
1. | ITU (2023) | Improving safeguards for financial banking systems and customer data integrity and security. | Availability; integrity, which may include authenticity and non-repudiation; confidentiality |
2. | Alzoubi et al. (2022) | Protecting banking systems from risks such as phishing and malware and confirming data access control. | Confidentiality, integrity, and availability |
3. | Yan et al. (2020) | Reducing the unsanctioned penetration into national financial systems. | Confidentiality |
4. | Al-Alawi et al. (2020) | Protecting against cyber breaking in organizations and ensuring service continuity. | Confidentiality, integrity, and availability |
5. | Merriam-Webster (2024) | Safeguarding sensitive systems against unsanctioned online access. | Confidentiality, integrity, and availability |
6. | Craigen et al. (2014) | Putting cybersecurity mechanisms in place to make banking infrastructure resilient. | Confidentiality, integrity, and availability |
Count | % | |
---|---|---|
Age | ||
Less than 25 years old | 20 | 9.1% |
From 25 years old to 35 years old | 138 | 62.73% |
From 36 years old to 45 years old | 43 | 19.54% |
Over 45 years old | 19 | 8.63% |
Gender | ||
Male | 107 | 48.6% |
Female | 113 | 51.4% |
Academic qualification | ||
High school diploma or less than an intermediate diploma | 2 | 0.9% |
Intermediate diploma | 9 | 4.1% |
Bachelor | 139 | 63.2% |
Postgraduate | 70 | 31.8% |
Count | % | |
---|---|---|
Job position | ||
Head of the department | 7 | 17.5% |
Assistant head of the department | 3 | 7.5% |
Branch manager | 20 | 50.0% |
Assistant director | 6 | 15.0% |
Director of operations | 1 | 2.5% |
Office administrator | 2 | 5.0% |
Cashier | 1 | 2.5% |
Age | ||
Less than 25 years old | -- | -- |
From 25 years old to 35 years old | 10 | 25.0% |
From 36 years old to 45 years old | 30 | 75.0% |
Over 45 years old | -- | -- |
Gender | ||
Male | 38 | 95.0% |
Female | 2 | 5.0% |
Academic qualification | ||
High school diploma or less than an intermediate diploma | -- | -- |
Intermediate diploma | -- | -- |
Bachelor | 28 | 70.0% |
Postgraduate | 12 | 30.0% |
Years of experience | ||
Less than five years | -- | -- |
From 5 to 10 years | 11 | 27.5% |
From 11 to 15 years | 27 | 67.5% |
More than 15 years | 2 | 5.0% |
Construct | Item | FL | t-Value | Cronbach Alpha | CR | AVE |
---|---|---|---|---|---|---|
Confidentiality | C1 | 0.808 | 25.822 *** | 0.868 | 0.902 | 0.608 |
C2 | 0.847 | 31.043 *** | ||||
C3 | 0.803 | 20.564 *** | ||||
C4 | 0.826 | 29.534 *** | ||||
C5 | 0.577 | 8.439 *** | ||||
C6 | 0.786 | 24.765 *** | ||||
Integrity | I1 | 0.789 | 26.002 *** | 0.870 | 0.906 | 0.658 |
I2 | 0.811 | 15.614 *** | ||||
I3 | 0.770 | 14.147 *** | ||||
I4 | 0.825 | 30.261 *** | ||||
I5 | 0.857 | 38.746 *** | ||||
Availability | A1 | 0.832 | 33.033 *** | 0.814 | 0.865 | 0.522 |
A2 | 0.822 | 42.669 *** | ||||
A3 | 0.691 | 18.311 *** | ||||
A4 | 0.568 | 10.415 *** | ||||
A5 | 0.626 | 11.792 *** | ||||
A6 | 0.754 | 17.913 *** | ||||
Flexibility | F1 | 0.780 | 30.069 *** | 0.885 | 0.913 | 0.636 |
F2 | 0.702 | 14.835 *** | ||||
F3 | 0.833 | 36.103 *** | ||||
F4 | 0.830 | 34.945 *** | ||||
F5 | 0.796 | 23.314 *** | ||||
F6 | 0.837 | 36.117 *** | ||||
Service quality | SQ1 | 0.849 | 16.678 *** | 0.941 | 0.953 | 0.771 |
SQ2 | 0.872 | 42.629 *** | ||||
SQ3 | 0.869 | 46.682 *** | ||||
SQ4 | 0.903 | 47.515 *** | ||||
SQ5 | 0.902 | 32.915 *** | ||||
SQ6 | 0.874 | 53.258 *** | ||||
Customer satisfaction | CS1 | 0.882 | 45.297 *** | 0.918 | 0.939 | 0.756 |
CS2 | 0.910 | 59.661 *** | ||||
CS3 | 0.897 | 49.618 *** | ||||
CS4 | 0.907 | 63.967 *** | ||||
CS5 | 0.741 | 20.062 *** |
Construct | Availability | Confidentiality | Customer Satisfaction | Flexibility | Integrity | Service Quality |
---|---|---|---|---|---|---|
Availability | 0.722 | |||||
Confidentiality | 0.672 | 0.780 | ||||
Customer satisfaction | 0.632 | 0.574 | 0.870 | |||
Flexibility | 0.707 | 0.646 | 0.724 | 0.798 | ||
Integrity | 0.752 | 0.672 | 0.620 | 0.656 | 0.811 | |
Service quality | 0.686 | 0.617 | 0.835 | 0.791 | 0.678 | 0.878 |
Construct | Availability | Confidentiality | Customer Satisfaction | Flexibility | Integrity | Service Quality |
---|---|---|---|---|---|---|
Availability | ||||||
Confidentiality | 0.761 | |||||
Customer satisfaction | 0.712 | 0.638 | ||||
Flexibility | 0.817 | 0.728 | 0.800 | |||
Integrity | 0.875 | 0.767 | 0.691 | 0.746 | ||
Service quality | 0.773 | 0.678 | 0.897 | 0.864 | 0.746 |
Count | % | |
---|---|---|
Use electronic services (internet banking, digital wallet, bank app, etc.) | ||
No | 6 | 2.7% |
Yes | 208 | 94.5% |
Not sure/do not know | 5 | 2.3% |
Did not respond | 1 | 0.5% |
Cybersecurity threats, risks, and related issues before | ||
No | 188 | 85.5% |
Yes | 13 | 5.9% |
Not sure/do not know | 19 | 8.6% |
Levels of priority of cybersecurity practices at your bank | ||
Low | 12 | 5.5% |
Moderate | 102 | 46.4% |
High | 89 | 40.5% |
Very high | 16 | 7.3% |
Did not respond | 1 | 0.3% |
Discuss the topic of cybersecurity with the bank before | ||
No | 191 | 86.8% |
Yes | 24 | 10.9% |
Not sure/do not know | 5 | 2.3% |
Have a security incident, attack, or data breach due to a malicious or negligent employee | ||
No | 150 | 68.2% |
Yes | 8 | 3.6% |
Not sure/do not know | 62 | 28.2% |
Levels of awareness of employees about banks’ security risks | ||
Very knowledgeable | 53 | 24.1% |
Somewhat knowledgeable | 122 | 55.4% |
Not knowledgeable/not sure/do not know | 45 | 20.5% |
Count | % | |
---|---|---|
Level of priority of cybersecurity practices at your bank | ||
High | 40 | 100% |
Often discuss the topic of cybersecurity issues with executive leadership | ||
Monthly | 10 | 25% |
Each period | 30 | 75% |
Have a security incident, attack, or data breach due to a malicious or negligent employee | ||
No | 38 | 95% |
Not sure/do not know | 2 | 5% |
Levels of awareness of employees about banks’ security risks | ||
Very knowledgeable | 24 | 60% |
Knowledgeable | 16 | 40% |
No. | Construct | Total Sample (n = 260) | |||
---|---|---|---|---|---|
Mean | Std. | Rank | Order | ||
1 | Cybersecurity policy (manager sample only) | 4.74 | 0.47 | High | // |
2 | Confidentiality | 4.60 | 0.53 | High | 1 |
3 | Integrity | 4.46 | 0.50 | High | 2 |
4 | Availability | 4.35 | 0.48 | High | 3 |
Total cybersecurity practices (cybersecurity policy excluded) | 4.47 | High |
No. | Construct | Total Sample (n = 260) | |||
---|---|---|---|---|---|
Mean | Std. | Rank | Order | ||
1 | Flexibility | 4.36 | 0.53 | High | 3 |
2 | Service quality | 4.41 | 0.59 | High | 1 |
3 | Customer satisfaction | 4.37 | 0.59 | High | 2 |
Total SCP | 4.38 | High |
H | Path | Beta | t-Value | p-Value | Result |
---|---|---|---|---|---|
H1 | Cybersecurity practices—SCP | 0.777 | 27.919 | 0.000 * | Supported |
H1.1 | Confidentiality—SCP | 0.225 | 3.489 | 0.000 * | Supported |
H1.2 | Integrity—SCP | 0.275 | 3.617 | 0.000 * | Supported |
H1.3 | Availability—SCP | 0.370 | 5.426 | 0.000 * | Supported |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Al-Khatib, S.F.; Ibrahim, Y.Y.; Alnadi, M. Cybersecurity Practices and Supply Chain Performance: The Case of Jordanian Banks. Adm. Sci. 2025, 15, 1. https://doi.org/10.3390/admsci15010001
Al-Khatib SF, Ibrahim YY, Alnadi M. Cybersecurity Practices and Supply Chain Performance: The Case of Jordanian Banks. Administrative Sciences. 2025; 15(1):1. https://doi.org/10.3390/admsci15010001
Chicago/Turabian StyleAl-Khatib, Saleh Fahed, Yara Yousef Ibrahim, and Mohammad Alnadi. 2025. "Cybersecurity Practices and Supply Chain Performance: The Case of Jordanian Banks" Administrative Sciences 15, no. 1: 1. https://doi.org/10.3390/admsci15010001
APA StyleAl-Khatib, S. F., Ibrahim, Y. Y., & Alnadi, M. (2025). Cybersecurity Practices and Supply Chain Performance: The Case of Jordanian Banks. Administrative Sciences, 15(1), 1. https://doi.org/10.3390/admsci15010001