The Impact of Cybersecurity on Management Information Systems Requirements
Keywords:
Cybersecurity, Human Requirements for Management Information Systems, Financial Requirements for Management Information Systems, Technical Requirements for Management Information SystemsAbstract
This study aimed to analyze the impact of cybersecurity on the requirements of management information systems from the perspective of employees at the University of Tripoli. The study utilized a descriptive analytical approach and relied on a questionnaire as a data collection tool. A total of 52 questionnaires were distributed to a random sample of employees, and all were valid for analysis using SPSS. The results indicated a statistically significant correlation between cybersecurity and the requirements of management information systems, with a strong positive and statistically significant correlation within the university. The study's recommendations include enhancing cybersecurity strategies through sustainable development plans to improve the efficiency of management information systems and addressing current weaknesses. Additionally, the study recommends continuing to strengthen the positive relationship between cybersecurity and the requirements of management information systems by integrating the latest technologies in daily operations to ensure data protection and improve performance.
Keywords: Cybersecurity, Human Requirements for Management Information Systems, Financial Requirements for Management Information Systems, Technical Requirements for Management Information Systems.

Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Economics and Political Sciences

This work is licensed under a Creative Commons Attribution 4.0 International License.
- The researcher must submit a commitment (according to the provided form) confirming that the scientific work submitted for publication in the journal has not been previously published in any form, is not under consideration for publication by any other entity, and is not a summary of any previously published work.
- All scientific work submitted for publication in the journal will be subjected to an approved software program to detect any violations of intellectual property laws (plagiarism) to ensure its academic integrity.
- In case of any violations of intellectual property laws, the scientific work will be permanently rejected for publication in the journal.
- The scientific work must be submitted in three printed copies (A4 size), along with one copy on a CD in Word format under the Windows operating system.
- The editorial board has the right to perform an initial review of the submitted scientific work to assess its suitability for peer review or to reject it.
- The editorial board has the right to request any documents deemed necessary to complete the initial review or peer review process, such as but not limited to: (statistical data analysis forms, questionnaires filled by respondents, reports, etc.).
- The researcher must complete the journal’s submission form, which includes necessary contact information.
- The period for submitting scientific work by researchers is as stated in the announcement for accepting submissions for publication in the journal.
- Submissions for publication can be delivered in person or via the journal's email.
- Priority will be given to applied scientific work (practical research), especially work that addresses current issues relevant to Libya.
- The arrangement of scientific works for publication in the journal will depend on technical considerations determined by the editorial board.
- The views expressed in the scientific work are those of the authors only and do not necessarily represent the views of the journal.
Accepted 2025-04-07
Published 2025-05-27