The term “cyber” refers to anything related to computers or computer networks, including the Internet, whereas “security” refers to protection from potential harm caused by others by limiting their freedom to act. As the digital landscape continues to evolve, the importance of cybersecurity continues to grow, making it an essential aspect of modern life.
2.1. Cybersecurity Practices
Cybersecurity safeguards electronic communication networks and virtual reality (cyberspace) from unauthorized access, use, disclosure, disruption, modification, or destruction. This definition involves a combination of technical, administrative, and physical measures to prevent cyberattacks and to protect sensitive information. As the digital landscape continues to evolve, the importance of cybersecurity will continue to grow. With increasing reliance on technology and the Internet, cybersecurity has become essential to modern life, especially in the banking and financial sectors.
Table 1 summarizes the definitions of cybersecurity and its main dimensions.
Cybersecurity is defined as the protection of software, tools, and equipment to protect the privacy and integrity of information from various threats. With the rise of the 4.0 and 5.0 industrial revolutions, cybersecurity has become crucial for individuals, families, businesses, governments, and educational institutions. Therefore, it is essential to protect against online fraud. Cybersecurity breaches range from minor to significant consequences, such as data theft, DDoS attacks, data manipulation, and even control system takeover, resulting in physical harm. Cybersecurity is essential for securing financial information that can impact personal financial status. The widespread use of computer systems, networks, and mobile devices has increased cybersecurity risks. Cybersecurity protects personal information, intellectual property, systems, and data from unauthorized access and damage. Information security and cybersecurity share the common goal of ensuring data confidentiality, integrity, and availability. Confidentiality is a crucial aspect of cybersecurity, and it involves ensuring that only authorized individuals can access data. User IDs, passwords, policy-based security, and access control lists (ACLs) are examples of the methods used to maintain confidentiality. However, these methods are vulnerable to cyberattacks if the underlying system is insecure.
Cybersecurity/confidentiality: Confidentiality ensures that only trusted individuals can access information, which is essential for maintaining the trustworthiness of information. Confidentiality is crucial in the digital age, as it ensures that data are protected and only accessible to trusted individuals (
Al-Sarhan & Al-Mashaqbeh, 2020). According to
Khidzir et al. (
2018), confidentiality involves restrictions on using and storing various data types.
Samonas and Coss (
2014) defined confidentiality as the ability to trust or rely on information. To protect against unauthorized access and disclosure, organizations must implement measures such as secure communication channels, access controls, and data encryption. Confidentiality protects sensitive information such as financial and personal data, intellectual property, and unauthorized access. Confidentiality is a critical component of information security, ensuring that access to information is limited to those who specifically need it. According to
Mullet et al. (
2021), threats to confidentiality include accessing or stealing sensitive data. Studies such as
Sarratiagham (
2008) highlight the importance of confidentiality in establishing trust in online systems such as Internet banking, where an unauthorized person can read and take advantage of information stored on the computer. The intruder only observes the patterns of information use. From these patterns, the intruder can infer information. This category also includes the unauthorized use of a proprietary program (
Samonas & Coss, 2014). Finally,
Omariba et al. (
2012) argue that managers should perform regular security audits and assessments to identify, address, and prevent any vulnerabilities in the supply chain from any attack or risk. Based on these definitions, six items have been used to measure confidentiality (
Al-Sarhan & Al-Mashaqbeh, 2020).
Cybersecurity/integrity: According to
Omariba et al. (
2012), “integrity” refers to the dependability of information resources. It guarantees that information is accurate, authentic, and comprehensive
Margaret Rouse (
2022) and
Al-Sarhan and Al-Mashaqbeh (
2020) explained that integrity ensures data is modified only by authorized individuals, and techniques like data encryption, hashing, and confidential computing guarantee trustworthiness. Companies should implement digital signatures and regular monitoring procedures to prevent unauthorized modifications.
Mullet et al. (
2021) defined integrity as the non-destruction, modification, or loss of data without consent. MITM attacks that target integrity are a common type of assault. Integrity guarantees accurate and consistent data and information with the ability to detect unauthorized alterations, verify system actions, and ensure reliable information.
Sarratiagham (
2008) reports that integrity is crucial for customer security and trust in e-banking systems; unauthorized information modification sabotages information or systems in which an unauthorized individual can change stored information. In such circumstances, hackers do not always notice that the information has been altered (
Samonas & Coss, 2014). Based on these definitions, five items have been used to measure integrity (
Rouse, 2022;
Al-Sarhan & Al-Mashaqbeh, 2020).
Cybersecurity/availability: Every piece of information has a specific value or objective depending on the end goal and must be accessible to authorized individuals when needed. Availability is the ability to send and receive transactions without interruption when required (
Al-Sarhan & Al-Mashaqbeh, 2020). This occurs when authorized organizations can access data resources as needed, use them frequently, or restart use under exceptional conditions. Ensuring availability involves preventing denial-of-service attacks, a critical component of information security that affects consumer perceptions of online banking. Availability refers to unlawful denial of use, where an unauthorized individual can prevent an authorized user from accessing or modifying information, even if they cannot do so themselves (
Samonas & Coss, 2014).
Omariba et al. (
2012) defined availability as the accessibility of information resources. An information system that is inaccessible when needed can be as detrimental as no system at all, especially if it is the sole means of handling a particular issue. To ensure availability, the communication routes used to access information must adhere to information security regulations and be operationally sound (
Kim, 2017). Therefore, availability refers to the ability to access data and resources at any time, which means that data must be easily accessible to authorized individuals when needed. Based on these studies, six items have been used to measure the “Availability” (
Al-Sarhan & Al-Mashaqbeh, 2020).
Cybersecurity studies: As the name implies, cybersecurity is a defense of cyberspace, an Internet-connected system. In technology, constant evolution has played a vital role in transforming traditional corporate tasks into highly creative and efficient operations. With companies increasingly relying on information and communication technology in their everyday operations, a flourishing economy has been hit hard by cybercrime. Cyberattacks on physical systems are growing due to networking and Internet technology advancements. These attacks can impact other SC partner systems for several reasons, such as software errors and vulnerabilities found in any SC partner through the exchange of information. As the number of electronic systems increases, most commercial and vital operations on Earth have been transferred to the virtual world created by humans through the invention of computers, communication networks, information, and electronic memory. This virtual world, called cyberspace, is a fast, versatile, and pervasive domain with open boundaries and assaults. The increasing demand for new procedures and strategies to maintain informatics resources has resulted in a need for cybersecurity.
The significance of cybersecurity is highlighted by the concept of cyber-physical systems and the protection of shared confidential information. As
Humayed et al. (
2017) defined, cyber-physical systems involve integrating physical components, network systems, embedded computers, software, and sensors for information sharing. The potential for data breaches and cyberattacks is high for technology-driven firms, making information security a critical aspect of national security in many countries. Governments are implementing comprehensive policies to ensure cybersecurity and cybersecurity measures aim to detect and respond to cyberattacks. Cybersecurity risks can also impact the quality of products and services, affecting customer satisfaction and supply chain flexibility. Cybersecurity protects IT hardware, software, and stored data from theft or damage (
Huxtable & Schaefer, 2016).
Yip (
2015) emphasized the importance of cyber supply chain security in enhancing cybersecurity within supply chain networks. This involves the implementation of firewalls to prevent intruders from stealing sensitive data and addressing malware, cyberterrorism, advanced persistent threats, and data theft. As technology advances, new forms of cybercrime emerge, making it challenging to address them under the existing laws and regulations (
Al-Alawi et al., 2020). Cybersecurity has become a priority for any organization as an integral part of its strategy, design, and operations. As a result, cybersecurity plays a significant role in enhancing companies’ competitiveness within the context of Industry 4.0. (
Pandey et al., 2020).
2.2. Supply Chain Performance
Performance measurement is crucial for organizations to determine the success or failure of their operations, including productivity and profitability.
Baltacioglu et al. (
2007) found that service supply chain performance is positively determined by three domains of service supply chain innovation capabilities: flexibility, responsiveness, and customer services. Supply chain management (SCM) plays a significant role in managing the flow of information, finances, and assets across supply networks to achieve partner and business goals. Many organizations have focused on improving their supply chain management’s effectiveness and overall performance.
Digitalization has significantly contributed to supply chain management by enhancing firms’ flexibility, confidence, accuracy, and efficiency. Digitalization in the supply chain has improved supply chain performance and overall organizational performance. The manufacturing industry has transformed to automation due to technologies such as IoT and cloud computing, but this has also introduced new risks, including safety. Cyberattacks on supply chains can result in interrupted or corrupted operations, loss of information, and damage to the organization’s reputation. These attacks consist of internal and external risks depending on the source and location of the information that flows through the supply chain, both upstream and downstream (
Pandey et al., 2020).
Supply chain performance (SCP) refers to a company’s ability to meet customer needs quickly, efficiently, and at low cost. SCP is the benefits received from the effectiveness and flexibility of supply chain operations in a changing environment, and it is measured by how well a company satisfies its customers’ expectations of product availability while keeping costs low. Another definition of performance is a firm’s operational success, primarily assessed by flexibility, quality, and delivery. The SCP denotes the supply chain network’s capacity to supply and deliver items and services over time.
A company must consider efficient information exchange to achieve supply chain performance (SCP) while minimizing expenses (
Rozhkov, 2022). Supply chain performance assesses the efficiency and effectiveness of a company’s supply chain in meeting customer requirements and achieving corporate goals (
Almufleh & Alkhatib, 2023;
Chang et al., 2019). Factors like flexibility, service quality, and customer satisfaction affect supply chain success. Flexibility refers to the ability to adapt to changes in demand or supply, such as unexpected fluctuations in client orders or supply chain capabilities (
Chowdhury et al., 2019). Organizations utilize Industry 4.0 and Industry 5.0 technologies to enhance operational efficiency, supply chain coordination, responsiveness, quality, and customer experience (
Wu et al., 2024). Service quality pertains to the level of service provided to clients, including delivery speed, order accuracy, and customer communication. On-time delivery, precise tracking and reporting, and good customer support are examples of service quality in the supply chain. Customer satisfaction reflects how content and pleased customers are with a company’s products and services.
Flexibility is essential in supply chain competition because it allows organizations to meet client needs and adapt to changing market conditions. Good supply chain integration enhances flexibility and enables quick adaptation to market change. Managing and minimizing supply chain risk involves the development of agile and flexible supply networks. Cybersecurity flexibility in a service supply chain involves quickly implementing security measures and modifying the supply chain process to ensure service security. Companies should invest in robust scalable security infrastructure and a competent and trained cybersecurity workforce. IoT technology applications can increase visibility in the supply chain and streamline the information flow in real-time, whereas IT is critical for practical supply chain management intelligence (
Ellis et al., 2015). Flexibility is the organization’s ability to modify its supply mix, fulfill unanticipated demand, and adjust delivery and supply timetables based on the scenario (
Beamon & Balcik, 2008).
In terms of service quality,
Cenamor et al. (
2017) emphasized the potential of data and digital technologies to enhance the service quality of the supply chain. A service provider must prioritize cybersecurity throughout the supply chain to ensure service quality. Effective cybersecurity measures involve securing sensitive data and resources, safeguarding systems, and networks, and ensuring authorized access. Additionally, service providers must deliver services consistently and reliably to maintain service quality. Ensuring cybersecurity and service quality requires technical expertise, process management, and effective communication and collaboration across the supply chain.
Customer satisfaction (CS) measures customer perception and compares expected performance to customer expectations. According to
Kant and Jaiswal (
2017), customer satisfaction is a critical component of marketing success, as a satisfied customer base is crucial for achieving competitiveness. Companies rely on service innovation to improve services, which involves developing the services provided to customers. Therefore, companies should ask customers about their satisfaction with the service through periodic surveys. Customer satisfaction in a service supply chain refers to how satisfied consumers are with a company’s service offerings and supply chain operations. To increase customer satisfaction, companies should focus on five critical areas: service delivery that is efficient and timely, service quality, communication, value for money, and cybersecurity. Customers want service providers to take initiative-taking measures to prevent cyberthreats and respond quickly in the case of an attack. Effective communication about security threats and preventive measures is crucial for customer satisfaction through secure data storage, encryption, and strict data protection policies. Transparency about security breaches and remedial actions helps build trust. Customers expect comprehensive cybersecurity coverage, such as protection against malware, ransomware, and phishing attempts.
Gunasekaran et al. (
2004) state that customer satisfaction is a top priority in world-class supply chains. Modern supply chains should promptly address customer queries and provide excellent post-transaction customer service. Timely responses and valuable feedback from after-transaction activities contribute to supply chain improvement.
2.4. Research Model and Hypotheses
The use of information and communication technology is not to spread risks that hinder business, and these gaps need to be presented in the literature. This research focuses on electronic services in Jordanian commercial banks and how cybersecurity practices (confidentiality, integrity, and availability) enhance flexibility and service quality and affect customer satisfaction. Therefore, the following model (
Figure 1) has been suggested to clarify and describe the relationship between cybersecurity practices as an independent variable and supply chain performance as a dependent variable.
First, cybersecurity and SCP:
Al-Alawi et al. (
2020) found that the conclusions significantly impacted our understanding of cybersecurity and its effects on financial institutions.
Singh et al.’s (
2019) study sought to improve performance by identifying cybersecurity threats and attacks in a globalized supply chain (SC) based on the information flow across the SC upstream and downstream. The study concluded that implementing thorough network inspection, process monitoring, risk assessment, and third-party product evaluation can help reduce cybersecurity risks. Standard cybersecurity measures are necessary to address these challenges.
Tawfik et al.’s (
2021) study on Jordanian banks found that the cybersecurity program significantly impacted the proper use of cloud accounting, cybersecurity governance requirements, cyber risk assessment and management, and cybersecurity information management. The findings demonstrated that the banks’ security procedures would be ineffective without knowledge and training. As a result, the primary hypothesis is:
H1. Cybersecurity practices significantly impact the SCP of the Jordanian banking sector.
Based on this hypothesis, the following sub-hypotheses can be developed based on cybersecurity practices:
Second, cybersecurity practices and SCP: Confidentiality ensures that only trusted individuals can view or access information and maintain the confidentiality of the data. Confidentiality involves restrictions on the storage and use of several types of data. Confidentiality is a strong predictor of perceived information security, and a relationship exists between confidentiality and information security. A study by
Seno et al. (
2015) found that increasing the security level of online banking systems requires a focus on confidentiality.
Daud et al. (
2011) conducted a study on how customers perceive information security and confidentiality, confirming that confidentiality and privacy have a favorable and significant impact on information security. Consequently, it is possible to suggest the following sub-hypothesis:
H1.1. Confidentiality significantly impacts the SCP of the Jordanian banking sector.
Third, cybersecurity integrity: Integrity refers to the accuracy and correctness of data and the prevention of unauthorized modification, destruction, or loss. According to
Mullet et al. (
2021), secure transfer, sharing, storage, and data processing maintain integrity well.
Sarratiagham (
2008) found that integrity is crucial to online banking systems.
Seno et al. (
2015) conducted a study to analyze the effects of integrity on the security level of Isfahan Tejarat Bank’s online banking. The study used structural equation modeling (SEM) and a paired sample T-test to show that conclusions with integrity have a positive and significant impact on information security.
Alhassan and Adjei-Quaye (
2017) also found that integrity positively affects information security in their research on the connection between integrity and customer perceptions of information security. Database referential integrity differs from data integrity, which prohibits modification without approved access.
H1.2. Integrity significantly impacts the SCP of the Jordanian banking sector.
Fourth, cybersecurity availability: It allows an authorized user access to associated assets and information when needed. According to
Wu et al. (
2019), availability is apparent when data resources can be accessed as needed by authorized entities, utilized often, or restarted in unexpected situations.
Daud et al. (
2011) examined how customers perceive information security and availability. The availability of information is a significant aspect that influences the perceived security of information that is transacted online via the Web, leading to the following proposal:
H1.3. Availability significantly impacts the SCP of the Jordanian banking sector.