{"title":"信息技术风险对信息系统安全的影响:也门电信公司的实地研究","authors":"Mohammed Alrubaidi, Nabil Hassan Abdo Al-Hemyari","doi":"10.20428/JSS.27.1.5","DOIUrl":null,"url":null,"abstract":"This study aimed to assess the impact of information technology risks on security of information systems by following an analytical method based on the structural equation modeling (SEM). The study population was seven telecommunication companies in Yemen. A questionnaire was distributed to 356 participants, but only 218 forms were valid for analysis. The data was analyzed by the partial least squares (PLS). The study findings revealed that information technology risks had a negative impact on the security of information systems. The study recommended that the security of information systems should be strengthened so as to maintain the confidentiality of information, its availability and safety from risks, and to cope with speedy developments in information and communication technology.","PeriodicalId":53082,"journal":{"name":"mjl@ ldrst ljtm`y@","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Impact of Information Technology Risks on Information Systems Security: A Field Study of Telecommunication Companies in Yemen\",\"authors\":\"Mohammed Alrubaidi, Nabil Hassan Abdo Al-Hemyari\",\"doi\":\"10.20428/JSS.27.1.5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study aimed to assess the impact of information technology risks on security of information systems by following an analytical method based on the structural equation modeling (SEM). The study population was seven telecommunication companies in Yemen. A questionnaire was distributed to 356 participants, but only 218 forms were valid for analysis. The data was analyzed by the partial least squares (PLS). The study findings revealed that information technology risks had a negative impact on the security of information systems. The study recommended that the security of information systems should be strengthened so as to maintain the confidentiality of information, its availability and safety from risks, and to cope with speedy developments in information and communication technology.\",\"PeriodicalId\":53082,\"journal\":{\"name\":\"mjl@ ldrst ljtm`y@\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"mjl@ ldrst ljtm`y@\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.20428/JSS.27.1.5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"mjl@ ldrst ljtm`y@","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20428/JSS.27.1.5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Impact of Information Technology Risks on Information Systems Security: A Field Study of Telecommunication Companies in Yemen
This study aimed to assess the impact of information technology risks on security of information systems by following an analytical method based on the structural equation modeling (SEM). The study population was seven telecommunication companies in Yemen. A questionnaire was distributed to 356 participants, but only 218 forms were valid for analysis. The data was analyzed by the partial least squares (PLS). The study findings revealed that information technology risks had a negative impact on the security of information systems. The study recommended that the security of information systems should be strengthened so as to maintain the confidentiality of information, its availability and safety from risks, and to cope with speedy developments in information and communication technology.