Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.5.29

Self-sufficiencies in Cyber Technologies: A requirement study on Saudi Arabia  

Alhalafi, Nawaf (La Trobe University, Computer Science & Information Technology Department)
Veeraraghavan, Prakash (La Trobe University, Computer Science & Information Technology Department)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.5, 2022 , pp. 204-214 More about this Journal
Abstract
Speedy development has been witnessed in communication technologies and the adoption of the Internet across the world. Information dissemination is the primary goal of these technologies. One of the rapidly developing nations in the Middle East is Saudi Arabia, where the use of communication technologies, including mobile and Internet, has drastically risen in recent times. These advancements are relatively new to the region when contrasted to developed nations. Thus, offenses arising from the adoption of these technologies may be new to Saudi Arabians. This study examines cyber security awareness among Saudi Arabian citizens in distinct settings. A comparison is made between the cybersecurity policy guidelines adopted in Saudi Arabia and three other nations. This review will explore distinct essential elements and approaches to mitigating cybercrimes in the United States, Singapore, and India. Following an analysis of the current cybersecurity framework in Saudi Arabia, suggestions for improvement are determined from the overall findings. A key objective is enhancing the nationwide focus on efficient safety and security systems. While the participants display a clear knowledge of IT, the surveyed literature shows limited awareness of the risks related to cyber security practices and the role of government in promoting data safety across the Internet. As the findings indicate, proper frameworks regarding cyber security need to be considered to ensure that associated threats are mitigated as Saudi Arabia aspires to become an efficient smart nation.
Keywords
cybersecurity; cybercrime; cyberattacks; security frameworks; information technology (IT); e-government; smart city; e-learning;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ahmad, Onais M., et al. "Cyber-Physical Systems and Smart Cities in India: Opportunities, Issues, and Challenges." Sensors, vol. 21, no. 22, 2021, pp. 1-25. MDPI, doi: 10.3390/s21227714.   DOI
2 Alhalafi, Nawaf and Prakash Veeraraghavan. "Cybersecurity Policy Framework in Saudi Arabia: Literature Review". Frontiers of Computer Science, vol. 3, no. 736874, pp. 1-8. OPAL, doi: 10.3389/fcomp.2021.7368.   DOI
3 Alsulami, Majid H., Alharbi, Fawaz D., Almutairi, Hamdan M., Almutairi, Bandar S., Alotaibi, Mohammed M., Alanzi, Majdi E., Alotaibi, Khaled G., and Sultan S. Alharthi. "Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia". Information, vol. 12, no. 5, 2021, pp. 1-13.
4 Alzahrani, Ahmed and Alomar, Khalid. "Information security issues and threats in Saudi Arabia: A Research Survey." International Journal of Computer Science Issues, vol. 13, no. 6, 2016, p. 129.   DOI
5 Alzubaidi, Abdulaziz. "Measuring the Level of Cyber-Security Awareness for Cybercrime in Saudi Arabia". Heliyon, vol. 7, e06016, 2021, pp. 1-13. ScienceDirect, 10.1016/j.heliyon. 2021.e06016.   DOI
6 Chaudhry, Irfan. "#Hashtags for Change: Can Twitter Promote Social Progress in Saudi Arabia". International Journal of Communication, vol. 8, 2014, pp. 943-961.
7 Faqih, Khaled. "An Empirical Analysis of Factors Predicting the Behavioural Intention to Adopt Internet Shopping Technology among Non-Shoppers in a Developing Country Context: Does Gender Matter?" Journal of Retailing and Consumer Services, vol. 30, 2016, pp. 140-64. ScienceDirect, doi: 10.1016/j.jretconser.2016.01.016.   DOI
8 GOV.SA. "Digital Transformation." January 18, 2022, www.my.gov.sa/wps/portal/snp/aboutksa/digitaltransformation
9 Aljabri, Sultan. "Cybersecurity Awareness in Saudi Arabia." International Journal of Research Publication and Reviews, vol. 2, no. 2, 2021, pp. 320-30, www.ijrpr.com/uploads/V2ISSUE2/IJRPR201.pdf. Accessed 15 Dec. 2021.
10 Ali, Wahab. "Online and Remote Learning in Higher Education Institutes: A Necessity in light of COVID-19 Pandemic." Higher Education Studies, vol. 10, 2020, pp. 16-25. ERIC, doi: 10.5539/hes.v10n3p.   DOI
11 Al-Janabi, Samaher and Ibrahim Al-Shourbaji. "A Study of Cybersecurity Awareness in Educational Environment in the Middle East." Journal of Information & Knowledge Management, vol. 15, no. 1, 2016, pp. 1-30. World Scientific, doi: 10.1142/S0219649216500076   DOI
12 Almarhabi, Khalid. "Adherence to ICT Security and Privacy Policies in Saudi Arabia." International Journal of Computer Applications, vol. 147, no. 4, August 2016, pp. 13-18. ResearcgGate, doi: 10.5120/ijca2016910974.   DOI
13 Almomani, Iman et al. "Cybersecurity Maturity Assessment Framework for Higher Education Institutions in Saudi Arabia." PeerJ Computer Science, vol. 7, e703, 9 Sep. 2021, pp. 10-26. PeerJ, doi:10.7717/peerj-cs.703   DOI
14 Alrubaiq, Abdullah and Talal Alhrabi. "Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia." Journal of Cybersecurity and Privacy, vol. 1, 2021, pp. 302-18. MDPI, doi: 10.3390/jcp1020017.   DOI
15 Alshehri, Mohammed and Drew, Steve. "Challenges of e-Government Services Adoption in Saudi Arabia from an e-Ready Citizen Perspective". World Academy of Science, Engineering and Technology, vol. 42, 2010, pp. 1039-45
16 Hathaway, Melissa, Spidalieri, Francesca, and Alsowailm, Fahad. "Kingdom of Saudi Arabia: Cyber readiness at a Glance." Potomac Institute for Policy Studies, September 2017, www.belfercenter.org/sites/default/files/files/publication/cri2.0-ksa.pdf
17 Ipsos. "Addressing Cybersecurity Skill Shortages in the GCC Region." March 2021, www.ipsos.com/sites/default/files/ct/news/documents/2021-09/Addressing%20Cybersecurity%20Skill%20Shortages%20in%20the%20GCC%20Region.pdf
18 Little, Arthur D. "Digital KSA: Assessment and Way Forward for the Digital Economy." Ministry of Communications and Information Technology (MCIT), August 2021, www.adlittle.nl/sites/default/files/reports/ADL_Digital_KSA.pdf
19 Mawgoud, Ahmed A., & Taha, Mohamed H., Khalifa, Nour E., and Loey, Mohamed. "Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures." In book: Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019 (pp.912-921), 2020, doi: 10.1007/978-3-030-31129-2_83   DOI
20 Ng, Reuben. "Cloud Computing in Singapore: Key Drivers and Recommendations for a Smart Nation." Politics and Governance, vol. 6, no. 4, 2018, pp. 39-47. Cogitatio Press, doi: 10.17645/pag.v6i4.1757.   DOI
21 Kshetri, Nir. "Cybercrime and Cybersecurity in India: Causes, Consequences and Implications for the Future." Crime, Law and Social Change, vol. 66, no. 3, 2016, pp. 313-38. SpringerLink, doi: 10.1007/s10611-016-9629-3.   DOI
22 Alotaibi, Raed, et al. "Factors Influencing Users' Intentions to Use Mobile Government Applications in Saudi Arabia: TAM Applicability." International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 7, 2017, pp. 200-11. Griffith Research Online, doi: 10.14569/IJACSA.2017.080727.   DOI
23 International Telecommunication Union. ICT Facts and Figures 2016, 2016, www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2016.pdf. Accessed 14 Dec. 2021.
24 Carlton, Melissa and Levy, Yair. "Cybersecurity Skills: Foundational Theory and the Cornerstone of Advanced Persistent Threats (APTS) Mitigation." Online Journal of Applied Knowledge Management, vol. 5, no. 2, 2017, pp. 16-28.   DOI
25 Parmar, Sushma D. "Cybersecurity in India: An Evolving Concern for National Security." www.academicapress.com/journal/v1-1/Parmar_Cybersecurity-in-India.pdf
26 Sagar, Ramani, et al. "Applications in Security and Evasions in Machine Learning: A Survey." Electronics, vol. 9, no. 1, 2020, pp. 1-42. MDPI, doi: 10.3390/electronics9010097   DOI
27 Talib, Amir M., et al. "Ontology-Based Cyber Security Policy Implementation in Saudi Arabia." Journal of Information Security, vol. 9, 2018, pp. 315-33. Scientific Research, doi: 10.4236/jis.2018.94021.   DOI
28 Zayid, Elrasheed I. M. and Nadir Abdelrahman A. F. "A study on cybercrime awareness test in Saudi Arabia - Alnamas region." 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (2017): 199-202.