Main Article Content

Sarah Sabah Khorsheed [email protected]
Othman K. Mahmood [email protected]


Abstract

This research aims to verify the availability of ISO27001 and its role in enhancing the hooked strategy in Internet service companies in some Iraqi cities. After reviewing the research literature, the concepts were written, the model was built, and the hypotheses were formulated based on the dimensions of ISO27001 and the hooked strategy. Based on the nature of the research and the objectives it seeks to achieve, the descriptive analytical approach was used. A questionnaire form was designed to collect data from the sample with a comprehensive inventory of the research community represented by managers, numbering approximately (80) managers in all companies operating in the field of providing Internet services in some Iraqi cities, according to the companies' data during the research. The scales were developed, and 80 questionnaire forms were distributed to the research sample via (Google Form) and via hard copy forms according to the representation of the research population. (55) forms were returned, 2 forms were excluded, and (53) forms remained valid for analysis in Internet service companies in some Iraqi cities. Several methods were used, including judges and Cronbach's alpha to ensure validity and reliability, factor analysis, simple correlation, and structural equation modeling using AMOS-26 and SPSS-26 programs. The results showed a positive correlation and impact between the variables. In light of the research results, a number of recommendations were presented regarding the need for administrators and leaders to focus on their application of ISO27001 in order to enhance the hooked strategy and its dimensions. Recommendations were also presented for companies, corporations, and other departments, as well as proposals for future studies in this field.

Downloads

Download data is not yet available.

Article Details

How to Cite
Sarah Sabah Khorsheed, & Othman K. Mahmood. (2025). The availability of the ISO 27001 standard and its role in enhancing the Hooked strategy: an analytical study of the views of a sample of managers in internet service companies in some Iraqi cities. Tikrit Journal of Administrative and Economic Sciences, 21(70 part 1), 279–304. https://doi.org/10.25130/tjaes.21.70.1.15
Section
Articles

References

اولا: المصادر العربية:

الخويلدي، علي ناصر. (2021). قطاع الاتصالات والانترنت في العراق: المشاكل والحلول. إصدار مركز البيدر للدراسات والتخطيط.http://www.baidarcenter.org

زينل، بشرى علي، وفتاح، سحر جلال. (2018). دور أمن المعلومات على ثقة الزبون: دراسة استطلاعية لآراء عينة من العاملين في شركات كورك وآسيا سيل ونوروز تيليكوم للاتصالات، أربيل. في وقائع المؤتمر الرابع للكلية التقنية الإدارية - بغداد بجامعة التقنية الوسطى تحت شعار "لأبداع الإداري لتحقيق الرؤية المستقبلية لمنظمات الأعمال" (المجلد الثاني، ص. 481–499). رقم الإيداع (642).

ثانياً. المصادر الاجنبية:

Aguirre, G. C., Hyman, M. R., & Jones, J. L. (2020). DEDICATED MARKETING ETHICS COURSE: DESIGN AND TEST. Marketing Education Review, 177–194. https://doi.org/10.1080/10528008.2020.1787845

Ahmad, M. R., Osman, M., Abdullah, A., & Sharif, K. Y. (2024). Evolution of Information Security Awareness towards Maturity: A Systematic Review. 14(5).

Alotaibi, F. M., Al-Dhaqm, A., Yafooz, W. M. S., & Al-Otaibi, Y. D. (2023). A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field. Applied Sciences (Switzerland), 13(17). https://doi.org/10.3390/app13179703

Alraddadi, A. S. (2023). Developing an Abstraction Framework for Managing and Controlling Saudi Banks’ Cybersecurity Threats Based on the NIST Cybersecurity Framework and ISO/IEC 27001. Journal of Software Engineering and Applications, 16(12), 695–713. https://doi.org/10.4236/jsea.2023.1612036

Cindy, R. P., & Ronda, M. (2024). The Influence Of Digital Influencer Marketing Communication On Instagram On Awareness, Interest, Search, Action And Share Beli Kreatif Sumatera Selatan. International Journal Of Humanities Education And Social Sciences (IJHESS), 3(2808–1765), 1820–1836. https://ijhess.com/index.php/ijhess/

Dancey, Christine P., Reidy, John., (2007) “Statistics Without Maths for Psychology” Pearson/Prentice Hall, UK, London.

Ewuga, S. K., Egieya, Z. E., Omotosho, A., & Adegbite, A. O. (2024). ISO 27001 in Banking: an Evaluation of Its Implementation and Effectiveness in Enhancing Information Security. Finance & Accounting Research Journal, 5(12), 405–425. https://doi.org/10.51594/farj.v5i12.684

Eyal, N. (2021). How to be indistractable : How to Control Your Attention and Choose Your Life. In https://psyche.co/guides/to-become-indistractable-recognise-that-it-starts-within-you?gad_source=1&gclid=Cj0KCQjwjNS3BhChARIsAOxBM6oWOWAw9FrADWMqzYvSncuUDUf5GVgAY55HMmhZAmugekS-C7Ojt54aAtD3EALw_wcB.

Eyal, N., & Hoover, R. (2014). Hooked : how to build habit-forming products: Vol. 1.2 (1st ed.). Portfolio/Penguin, New York, New York, 2014.

Eyal, N., & Hoover, R. (2016). Hooked How to Build Habit-Forming Products. Portfolio / Penguin, a member of Penguin Group (USA) LLC, 2014.

Eyal, N., & Hoover, R. (2019). Hooked: how to build habit-forming products (Revised and updated). Portfolio/Penguin, [New York, NY], 2019. https://search.worldcat.org/title/1126336681

Furtado, S. F., Reutterer, T., & Schröder, N. (2022). The carrot and the stick in online reviews: determinants of un-/helpfulness voting choices. Journal of Business Economics, 92(4), 565–590. https://doi.org/10.1007/s11573-021-01044-x

George, D. and Mallery, P. (2010) SPSS for Windows Step by Step: A Simple Guide and Reference 17.0 Update. 10th Edition, Pearson, Boston.

Jevelin, J., & Faza, A. (2023). Evaluation the Information Security Management System: A Path Towards ISO 27001 Certification. Journal of Information Systems and Informatics, 5(4), 1240–1256. https://doi.org/10.51519/journalisi.v5i4.572

Kamal, M., Muhamad, M., Sudianto, Y., Fauzan, M. A., Anggito, Y., Yasin, W., & Hermawan, H. (2024). Information Technology Security Audit at the YDSF National Zakat Institution Using the ISO 27001 Framework. Jurnal Sisfokom (Sistem Informasi Dan Komputer), 13(1), 98–103. https://doi.org/10.32736/sisfokom.v13i1.1987

Kitsios, F., Chatzidimitriou, E., & Kamariotou, M. (2023). The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector. Sustainability (Switzerland), 15(7). https://doi.org/10.3390/su15075828

Koswara, R., & Alifin, F. I. (2024). A User-oriented UI/UX Application Design Using The Integration of Quality Function Deployment (QFD) and Design Thinking Methods. MOTIVECTION : Journal of Mechanical, Electrical and Industrial Engineering, 6(1), 85–100. https://doi.org/10.46574/motivection.v6i1.308

Lestari, D. W., & Ambarwati, R. (2024). Social Network Analysis: Understanding User Behavior in Threads. Kontigensi : Jurnal Ilmiah Manajemen, 12(1), 115–124. https://doi.org/10.56457/jimk.v12i1.505

Lukyanchikova, E., Askarbekuly, N., Aslam, H., & Mazzara, M. (2023). A Case Study on Applications of the Hook Model in Software Products. Software, 2(2), 292–309. https://doi.org/10.3390/software2020014

Mujica, A. L., Crowell, C. R., Villano, M. A., & Uddin, K. M. (2022). ADDICTION BY DESIGN: Some Dimensions and Challenges of Excessive Social Media Use. Medical Research Archives, 10, 1–29. https://esmed.org/MRA/mra/

Olaniyi, O. O., Omogoroye, O. O., Olaniyi, F. G., Alao, A. I., & Oladoyinbo, T. O. (2024). View of CyberFusion Protocols_ Strategic Integration of Enterprise Risk Management, ISO 27001, and Mobile Forensics for Advanced Digital Security in the Modern Business Ecosystem. Journal of Engineering Research and Reports, 26(2024-Volume 26 [Issue 6]), 31-49. https://doi.org/10.9734/jerr/2024/v26i61160

Pallant, J., (2010). SPSS survival manual: A step by step guide to data analysis using the SPSS program. 4th Edition, McGraw Hill, New York.

Pranavi, M. (2024). The Impact of Microinteractions on User Engagement in Mobile Applications. https://doi.org/10.13140/RG.2.2.27224.71687

Pulana, A. D., & Perez, R. D. (2022). Motivational Strategies of Teachers in Relation To Learners’ Academic Performance. International Journal of Multidisciplinary Research and Analysis, 05(01), 225–235. https://doi.org/10.47191/ijmra/v5-i1-28

Rafli, M., Akhwat Nusantara, N. C., Putri, E. R., Sari, I. P., Zamzami, N., & Muharroman, A. I. (2024). Information Security Behavior and Compliance with ISO 27001 in IT Companies. Journal of Digital Business and Innovation Management, 3(1), 62–76. https://doi.org/10.26740/jdbim.v3i1.59163

Rozi, N. R. F., Wirabudi, A. A., & Rozano, S. A. (2024). Chance Evaluation and Improvement of Get to Control Data Security Administration Based On ISO/IEC 27001 at Telkom University Jakarta Campus. International Journal of Science Education and Cultural Studies, 3(2), 1–26. https://doi.org/10.58291/ijsecs.v3i2.246

SAHRAOUI, I., Bensedira, A., & Bouheroud, F. (2020). Spread Application of Information Security Management System ISO27001 in Business Organizations_ Evaluation Study f. Journal of Scientific Horizons, Volume: 12 (2), 429–452.

Sarmento, S. M., & Horta, N. (2021). Springer Briefs in Applied Sciences and Technology  Computational Intelligence A Machine Learning based Pairs Trading Investment Strategy. http://www.springer.com/series/10618

Tombeng, M., & Mambu, J. Y. (2024). Designing the UI/UX for a Shoe Repair Application Using the Design Thinking Method. International Journal of Engineering, Science and Information Technology, 4(3), 106–117. https://doi.org/10.52088/ijesty.v4i3.538

Verplanken, B., & Sui, J. (2019). Habit and identity: Behavioral, cognitive, affective, and motivational facets of an integrated self. Frontiers in Psychology, 10(JULY). https://doi.org/10.3389/fpsyg.2019.01504

Wu, Z., Zang, C., Wu, C.-H., Deng, Z., Shao, X., & Liu, W. (2021). Improving Customer Value Index and Consumption Forecasts Using a Weighted RFM Model and Machine Learning Algorithms. Journal of Global Information Management, 30(3), 1–23. https://doi.org/10.4018/jgim.20220701.oa1

Zhang, Y., Zhou, H., & Qin, J. (2022). Research on the effect of uncertain rewards on impulsive purchase intention of blind box products. Frontiers in Behavioral Neuroscience, 16. https://doi.org/10.3389/fnbeh.2022.946337