Information security model using decision tree for Jordanian public sector Online publication date: Wed, 04-Jul-2018
by Omar Suleiman Arabeyyat
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 10, No. 3, 2018
Abstract: The rapid evolution of technology has created new services and introduced changes to the traditional style of delivery. Organisations are trying to adapt e-services to reduce cost and enhance the quality of their e-services. The Jordanian Government has introduced an e-government model, but a major obstacle has interrupted their introduction, specifically, with its information security system (ISS). While the development of the model happened in a rapid manner, the government's implementation and management of the laws and regulations did not happen in the same speed. Hence, this study investigates and builds a security model for (ISS) for the Jordanian public sector and investigates the effect of the implementation of King Abdullah II model for excellence on public sector to build security culture and awareness, the study uses a decision tree iterative dichotomiser 3 (ID3) classifier. The study concludes that following best practice and security policy are the main factors that drive the performance of the security model.
Online publication date: Wed, 04-Jul-2018
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com