DOI QR코드

DOI QR Code

Self-sufficiencies in Cyber Technologies: A requirement study on Saudi Arabia

  • Alhalafi, Nawaf (La Trobe University, Computer Science & Information Technology Department) ;
  • Veeraraghavan, Prakash (La Trobe University, Computer Science & Information Technology Department)
  • Received : 2022.05.05
  • Published : 2022.05.30

Abstract

Speedy development has been witnessed in communication technologies and the adoption of the Internet across the world. Information dissemination is the primary goal of these technologies. One of the rapidly developing nations in the Middle East is Saudi Arabia, where the use of communication technologies, including mobile and Internet, has drastically risen in recent times. These advancements are relatively new to the region when contrasted to developed nations. Thus, offenses arising from the adoption of these technologies may be new to Saudi Arabians. This study examines cyber security awareness among Saudi Arabian citizens in distinct settings. A comparison is made between the cybersecurity policy guidelines adopted in Saudi Arabia and three other nations. This review will explore distinct essential elements and approaches to mitigating cybercrimes in the United States, Singapore, and India. Following an analysis of the current cybersecurity framework in Saudi Arabia, suggestions for improvement are determined from the overall findings. A key objective is enhancing the nationwide focus on efficient safety and security systems. While the participants display a clear knowledge of IT, the surveyed literature shows limited awareness of the risks related to cyber security practices and the role of government in promoting data safety across the Internet. As the findings indicate, proper frameworks regarding cyber security need to be considered to ensure that associated threats are mitigated as Saudi Arabia aspires to become an efficient smart nation.

Keywords

References

  1. Ahmad, Onais M., et al. "Cyber-Physical Systems and Smart Cities in India: Opportunities, Issues, and Challenges." Sensors, vol. 21, no. 22, 2021, pp. 1-25. MDPI, doi: 10.3390/s21227714.
  2. Alhalafi, Nawaf and Prakash Veeraraghavan. "Cybersecurity Policy Framework in Saudi Arabia: Literature Review". Frontiers of Computer Science, vol. 3, no. 736874, pp. 1-8. OPAL, doi: 10.3389/fcomp.2021.7368.
  3. Ali, Wahab. "Online and Remote Learning in Higher Education Institutes: A Necessity in light of COVID-19 Pandemic." Higher Education Studies, vol. 10, 2020, pp. 16-25. ERIC, doi: 10.5539/hes.v10n3p.
  4. Aljabri, Sultan. "Cybersecurity Awareness in Saudi Arabia." International Journal of Research Publication and Reviews, vol. 2, no. 2, 2021, pp. 320-30, www.ijrpr.com/uploads/V2ISSUE2/IJRPR201.pdf. Accessed 15 Dec. 2021.
  5. Al-Janabi, Samaher and Ibrahim Al-Shourbaji. "A Study of Cybersecurity Awareness in Educational Environment in the Middle East." Journal of Information & Knowledge Management, vol. 15, no. 1, 2016, pp. 1-30. World Scientific, doi: 10.1142/S0219649216500076
  6. Almarhabi, Khalid. "Adherence to ICT Security and Privacy Policies in Saudi Arabia." International Journal of Computer Applications, vol. 147, no. 4, August 2016, pp. 13-18. ResearcgGate, doi: 10.5120/ijca2016910974.
  7. Almomani, Iman et al. "Cybersecurity Maturity Assessment Framework for Higher Education Institutions in Saudi Arabia." PeerJ Computer Science, vol. 7, e703, 9 Sep. 2021, pp. 10-26. PeerJ, doi:10.7717/peerj-cs.703
  8. Alotaibi, Raed, et al. "Factors Influencing Users' Intentions to Use Mobile Government Applications in Saudi Arabia: TAM Applicability." International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 7, 2017, pp. 200-11. Griffith Research Online, doi: 10.14569/IJACSA.2017.080727.
  9. Alrubaiq, Abdullah and Talal Alhrabi. "Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia." Journal of Cybersecurity and Privacy, vol. 1, 2021, pp. 302-18. MDPI, doi: 10.3390/jcp1020017.
  10. Alshehri, Mohammed and Drew, Steve. "Challenges of e-Government Services Adoption in Saudi Arabia from an e-Ready Citizen Perspective". World Academy of Science, Engineering and Technology, vol. 42, 2010, pp. 1039-45
  11. Alsulami, Majid H., Alharbi, Fawaz D., Almutairi, Hamdan M., Almutairi, Bandar S., Alotaibi, Mohammed M., Alanzi, Majdi E., Alotaibi, Khaled G., and Sultan S. Alharthi. "Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia". Information, vol. 12, no. 5, 2021, pp. 1-13.
  12. Alzahrani, Ahmed and Alomar, Khalid. "Information security issues and threats in Saudi Arabia: A Research Survey." International Journal of Computer Science Issues, vol. 13, no. 6, 2016, p. 129. https://doi.org/10.20943/01201606.129135
  13. Alzubaidi, Abdulaziz. "Measuring the Level of Cyber-Security Awareness for Cybercrime in Saudi Arabia". Heliyon, vol. 7, e06016, 2021, pp. 1-13. ScienceDirect, 10.1016/j.heliyon. 2021.e06016.
  14. Carlton, Melissa and Levy, Yair. "Cybersecurity Skills: Foundational Theory and the Cornerstone of Advanced Persistent Threats (APTS) Mitigation." Online Journal of Applied Knowledge Management, vol. 5, no. 2, 2017, pp. 16-28. https://doi.org/10.36965/ojakm.2017.5(2)16-28
  15. Chaudhry, Irfan. "#Hashtags for Change: Can Twitter Promote Social Progress in Saudi Arabia". International Journal of Communication, vol. 8, 2014, pp. 943-961.
  16. Faqih, Khaled. "An Empirical Analysis of Factors Predicting the Behavioural Intention to Adopt Internet Shopping Technology among Non-Shoppers in a Developing Country Context: Does Gender Matter?" Journal of Retailing and Consumer Services, vol. 30, 2016, pp. 140-64. ScienceDirect, doi: 10.1016/j.jretconser.2016.01.016.
  17. GOV.SA. "Digital Transformation." January 18, 2022, www.my.gov.sa/wps/portal/snp/aboutksa/digitaltransformation
  18. Hathaway, Melissa, Spidalieri, Francesca, and Alsowailm, Fahad. "Kingdom of Saudi Arabia: Cyber readiness at a Glance." Potomac Institute for Policy Studies, September 2017, www.belfercenter.org/sites/default/files/files/publication/cri2.0-ksa.pdf
  19. International Telecommunication Union. ICT Facts and Figures 2016, 2016, www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2016.pdf. Accessed 14 Dec. 2021.
  20. Ipsos. "Addressing Cybersecurity Skill Shortages in the GCC Region." March 2021, www.ipsos.com/sites/default/files/ct/news/documents/2021-09/Addressing%20Cybersecurity%20Skill%20Shortages%20in%20the%20GCC%20Region.pdf
  21. Kshetri, Nir. "Cybercrime and Cybersecurity in India: Causes, Consequences and Implications for the Future." Crime, Law and Social Change, vol. 66, no. 3, 2016, pp. 313-38. SpringerLink, doi: 10.1007/s10611-016-9629-3.
  22. Little, Arthur D. "Digital KSA: Assessment and Way Forward for the Digital Economy." Ministry of Communications and Information Technology (MCIT), August 2021, www.adlittle.nl/sites/default/files/reports/ADL_Digital_KSA.pdf
  23. Mawgoud, Ahmed A., & Taha, Mohamed H., Khalifa, Nour E., and Loey, Mohamed. "Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures." In book: Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019 (pp.912-921), 2020, doi: 10.1007/978-3-030-31129-2_83
  24. Ng, Reuben. "Cloud Computing in Singapore: Key Drivers and Recommendations for a Smart Nation." Politics and Governance, vol. 6, no. 4, 2018, pp. 39-47. Cogitatio Press, doi: 10.17645/pag.v6i4.1757.
  25. Parmar, Sushma D. "Cybersecurity in India: An Evolving Concern for National Security." www.academicapress.com/journal/v1-1/Parmar_Cybersecurity-in-India.pdf
  26. Sagar, Ramani, et al. "Applications in Security and Evasions in Machine Learning: A Survey." Electronics, vol. 9, no. 1, 2020, pp. 1-42. MDPI, doi: 10.3390/electronics9010097
  27. Talib, Amir M., et al. "Ontology-Based Cyber Security Policy Implementation in Saudi Arabia." Journal of Information Security, vol. 9, 2018, pp. 315-33. Scientific Research, doi: 10.4236/jis.2018.94021.
  28. Zayid, Elrasheed I. M. and Nadir Abdelrahman A. F. "A study on cybercrime awareness test in Saudi Arabia - Alnamas region." 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (2017): 199-202.