An Overview of Information and Communication Technology (ICT) in Jordan: Review the Literature of Usage, Benefits and Barriers

DOI: 10.4236/ijids.2013.12002   PDF   HTML     4,638 Downloads   13,995 Views   Citations


This paper presented a background of the extent of the ICT, IT, and EC-B2B in Jordan. It was mentioned that the development of the ICT in Jordan brings benefits to the enterprises and their TPs. In this paper the EC-B2B systems’ readiness in Jordan is defined as the degree of preparation of a nation or community to participate in and benefits from ICT development. The government in Jordan has taken forceful measures towards adoption IT and IS applications and Internet awareness. In 2010, it was reported from the DOS in Jordanthat the percentage of individual Internet usage did not exceed 4.7 percent of the population inJordan[1]. This paper highlighted through subsections on the benefits and risks faced EC-B2B system adoption in Jordan. Based on the recent studies and reports in Jordan, the EC-B2B system adoption was mainly adopted by large enterprises in the supply chain rather than by SMEs. The study concluded that the main two barriers of ICT development and adoption inJordanare organizational readiness including lack of new education methods, and lack of information and knowledge.

Share and Cite:

A. Bakri, "An Overview of Information and Communication Technology (ICT) in Jordan: Review the Literature of Usage, Benefits and Barriers," International Journal of Internet and Distributed Systems, Vol. 1 No. 2, 2013, pp. 9-15. doi: 10.4236/ijids.2013.12002.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Department of Statistics in Jordan (DOS), Census of enterprises, 2011.
[2] N. Black, A. Lockett, H. Winklhofer and C. Ennew, “The Adoption of Internet Financial Services: A Qualitative Study,” International Journal of Retail and Distribution Management, Vol. 29, No. 8, 2000, pp. 390-398. doi:10.1108/09590550110397033
[3] V. Zeithaml, A. Parasuraman and A. Malhotra, “Service Quality Delivery through Web Sites: A critical Review of Extant Knowledge,” Journal of the Academy of Marketing Science, Vol. 30, No.4, 2003, pp. 362-375.
[4] M. Warren and W. Hutchinson, “Cyber-Attacks Against Supply Chain Management Systems: A Sort Note,” International Journal of Physical Distribution & Logistics Management, Vol. 30, No. 7-8, 2002, pp. 710-716. doi:10.1108/09600030010346521
[5] J. Caldow, “The Quest for Electronic Government: A Defining Vision,” Institute for Electronic Government, IBM Corporation, Washington DC, 1999.
[6] UNCTAD, “Building Confidence: E-Commerce and Development Report,” 2012.
[7] J. Westby, “International Guide to Combating Cybercrime,” American Bar Association, USA, 2003.
[8] Ministry of Information and Communication Technologies in Jordan (MICT), “The E-Readiness Assessment of the Hashemite Kingdom of Jordan,” 2011.
[9] R. Schperberg and R. Kenneth, “Cybercrime,” ISACA, Rolling Meadows, 2005.
[10] Economist Intelligence Unit, “The 2006 E Readiness Rankings,” 2012.
[11] R. Gulati, “Business-to-Business E-Commerce: Past, Present, and Future,” 2012.
[12] M. Sahawneh, “E-Commerce: The Jordanian Experience, Industrial Studies Department,” Royal Scientific Society, 2002.
[13] M. Stamp, “Information Security,” John Wiley & Sons, New York, 2005. doi:10.1002/0471744190
[14] C. Steinfield and P. Whitter, “Community level Socio-Economic Impacts of Electronic commerce,” Journal of Computer Mediated Communication, Vol. 5, No. 2, 1999, pp. 714-719.
[15] T. Thanasankit, “E-Commerce and Cultural Values,” Idea Group Inc., New York, 2002. doi:10.4018/978-1-59140-056-1
[16] A. Abu-Samaha and Y. Abdel Samad, “Challenges to the Jordanian Electronic Government Initiative,” Journal of Business Systems, Governance and Ethics, Vol. 2, No. 3, 2007, pp. 101-109.
[17] Ministry of Industry and Trade in Jordan (MIT), 2012.
[18] M. Al-Ibraheem and H. Tahat, “Regulating Electronic Contracting in Jordan,” 21st BILETA Conference; Globalization and Harmonization in Technology Law, Malta, 6-7 April 2006, pp. 6-19.
[19] Organization for Economic Cooperation and Development OECD, “Economic Growth in the OECD Area,” OECD Working Paper, 2000.
[20] M. Greenstein and T. Feinman, “Electronic Commerce; Security, Risk Management and Control,” McGraw-Hill, Boston, 2000.
[21] Ministry of Trade and Industry in Jordan, 2010.
[22] Organization for Economic Cooperation and Development OECD, “E-Commerce: Impacts and Policy Challenges,” Organization for Economic Cooperation and Development (OECD), Vol. 67, No. 193, 2000, pp. 193-202.
[23] Organization for Economic Cooperation and Development OECD, “The Economic and Social Impacts of electronic Commerce,” Preliminary Finding and Research Agenda, 1999.
[24] Organization for Economic Cooperation and Development (OECD), “E-Commerce: Impacts and Policy Challenges,” 2002.
[25] ESCWA, “National profile of the Information Society in Jordan,” United Nation Report, 2007, pp. 1-16.
[26] M. Sahawneh, “E-Commerce and Its Effect on Labor Force” Socio-economic Impact of Persistent Organic Pollutants,” Royal Scientific Society, 2005.
[27] Arab Advisor Press Room, 2012.
[28] Abu-Ghazaleh and C. Consulting, “Market Brief on Telecommunications Sector in Jordan,” 2009.
[29] Business Integration Technology, Inc., “Why Supply Chain Executives Should Care about B2B Integration Technology,” 2012.
[30] Business Integration Technology Inc., 2012.
[31] S. Blythe, “Digital Signature Law of the United Nation. European Union, United Kingdom and United State: Promotion of Growth in E-commerce with Enhanced Security,” Richmond Journal of Law and Technology, Vol. XI, No. 2, 2005, pp. 1-20.
[32] H. Rank and B. Schmitt, “The Challenge of Information Security,” Military Technology, Vol. 29, No. 11, 2005, pp. 8-50.
[33] T. R. Peltier, “Information Security Risk Analysis,” CRC Press, Boca Raton, 2001.Organization for Economic Cooperation and Development OECD, “The Economic and Social Impacts of electronic Commerce,” Preliminary Finding and Research Agenda, 1999.
[34] A. Al-Bakri, “The Adoption of B2B by SME in Amman and the Perceptions of Its Influence on Their Performance and Efficiency,” PhD Thesis (Non-Published Thesis), University of Southern Queensland, Toowoomba, 2009.
[35] D. Kim, S. Cavusgil and R. Calantone, “Information System Innovations and Supply Chain Management: Channel Relationships and Firm Performance,” Journal of the Academy of Marketing Science, Vol. 34, No. 1, 2006, pp. 40-54.
[36] Arab Advisor Group,
[37] W. Titi, “The Impact of Adoption Electronic Commerce in Small to Medium Enterprises Jordanian Companies,” The 1st International Conference on E-Business and E-Learning, Jordan, 24-25 May 2005, pp. 159-178.
[38] E. Abu Zaid, “Attracting E-Commerce. First GCC E-Commerce Conference, UAE,” 2005.
[39] M. El-Nawawy and M. Ismail, “Overcoming Deterrents and Impediments to Electronic Commerce in Light of Globalization,” Proceedings of the 9th Annual Conference of the Internet Society, INET 99, San Jose, 22-25 June 1999, pp. 9-18.
[40] E. M. Heffes, “Refining the Rules of Commerce,” Financial Executive, Vol. 17, No. 3, 2001, pp. 3-18.
[41] E. Kritzingera and E. Smith, “Information Security Management: A Previous Term Information Security Retrieval and Awareness Model for Industry,” Computers & Security, June 2008.
[42] T. Layton, “Guide to Information Security,” CRC Press, Boca Raton, 2006.
[43] C. Easttom, “Computer Security Fundamentals,” Pearson Prentice Hall, Michigan, 2007.
[44] ESCWA, “Development of E-Commerce Sectors in the Arab Region,” World Summit on the Information Society (WSIS), Beirut, 22-25 June 1999, pp. 9-18.
[45] J. Fraser, “The Strategic Challenge of Electronic Commerce,” Supply Chain Management, Vol. 5, No. 1, 2000, p. 7. doi:10.1108/13598540010312936
[46] V. Leopoulos, K. Kirytopoulos and D. Voulgaridou, “the benefits of e-commerce: a case study of the Greek Para-pharmaceutical industry,” National Technical University of Athens, Athens, 2006.
[47] M. Gerber and R. Solms, “Information Security Requirements—Interpreting the Legal Aspects,” Computers & Security, Vol. 27, No. 5-6, 2008, pp. 124-135. doi:10.1016/j.cose.2008.07.009
[48] K. Hausken, “Information Sharing among Firms and Cyber-Attacks,” Journal of Accounting and Public Policy, Vol. 26, No. 6, 2007, pp. 639-688. doi:10.1016/j.jaccpubpol.2007.10.001
[49] Y. Rezgui and A. Marks, “Information Security Awareness in Higher Education: An Exploratory Study,” Computers and Security, Vol. 27, No. 7, 2007, pp. 241-253.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.