11,441 research outputs found
Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats
This study focuses on the issue of information security policy for e-government in Saudi Arabia. It evaluates the three fundamental pillars that determine data security such as effectiveness, vulnerabilities, and threats. The paper is seeking to reveal the risks of information security policy for e-government in Saudi Arabia as well as to examine the vulnerabilities and the effectiveness of the system.
The methodology applied inductive approach where both qualitative and quantitative research method were used. A survey by use of questionnaires and an interview was conducted
Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions
The Internet of Things (IoT) ability to monitor our every move raises many privacy concerns. This paper reports on a study to assess current awareness of privacy implications of IoT devices amongst Saudi Arabians. We found that even when users are aware of the potential for privacy invasion, their need for the convenience these devices afford leads them to discount this potential and to ignore any concerns they might initially have had. We then conclude by making some predictions about the direction the IoT field will take in the next 5-7 years, in terms of privacy invasion, protection and awareness
Chinaâs foreign oil policy: genesis, deployment and selected effects
China is a rising global power with a growing role and impact on the worldâs energy markets as well as on the Earthâs climate system. China pursues its development in an essentially non-confrontational manner, a vision encapsulated by the notion of peaceful rise which is viewed positively in the worldâs major capitals. Nevertheless, Chinaâs rapid growth represents a genuine global challenge and raises many questions. How is China dealing with its growing need for imported crude oil? What is the impact of Chinaâs rise on the global oil market, notably in terms of oil price developments? Are Chinese actions on oil markets different from those of other major importers? What opportunities and risks arise as a result of chinaâs growing role on the global oil market from the viewpoint of other global players? In this report we seek to offer some answers to those questions with a review of Chinaâs developing energy policy, of the actions and revealed preferences of its national oil companies, and of broader economic and geopolitical analyses of the impact of Chinaâs growing oil consumption on other global players.Crude oil, energy security, oil security, China, foreign oil policy
An overview on cyber security awareness in Muslim countries
Various cases of security breaches and attacks has been experienced globally, and high-level cases of cyber-attacks that threaten security has been documented. Attacks from various hacking groups have been conducted on organizations like the LuzSec, Stuxnet and many others that caused various levels of damages. Recent years have even seen groups that are anonymous in nature, targeting businesses that are highly profiled and other organizations. Some attacks have been conducted with much ease, thereby exposing the existing weaker systems of handling cybercrimes and some breaches have brought along very highly costs incurred on security. Countries have become very vulnerable in particular with the escalating levels of economy and the essential needs of improving infrastructure, in which has made them rely on technology and computer networks. Cyber threats can be categorized into two, and briefly theyâve been explained. This paper evaluates some instances of cyber-attacks in some of the Muslim countries like The Kingdom of Saudi Arabia (KSA), and the United Arab Emirates (UAE), the potential impacts and the possible recommendations that is implemented by governments, can help in raising awareness on cyber-attack issues
Factors That Predict the Adoption of Online Shopping in Saudi Arabia
Despite the increased numbers of online consumers, e-commerce growth is slow in the Kingdom of Saudi Arabia. In this correlational study, the technology acceptance model (TAM) was used as a theoretical framework to examine whether perceived ease of use of e-commerce platforms and perceived usefulness of e-commerce platforms could predict consumers\u27 intention to adopt shopping online. A pre-existing TAM survey instrument was used to collect data from consumers (N = 95) who live in a City and have shopped at least once online. The regression analysis confirmed a positive statistically significant relationship between perceived ease of use of e-commerce platforms and consumers\u27 intent to adopt online shopping. The results showed that perceived ease of use of e-commerce platforms and perceived usefulness of e-commerce platforms were statistically significant in predicting consumers\u27 intent to adopt online shopping, with F(2, 92) = 241.630, p \u3c .001, R2 = .840, and adjusted R2 = .837, and accounted for 84% of the variance in consumers\u27 intent to adopt online shopping. The correlation between perceived ease of use and consumers\u27 intent to adopt online shopping was (PEOU) r= .916, p \u3c .001 and the correlation significance between perceived usefulness and consumers\u27 intent to adopt online shopping was (PU) r= .591, p \u3c .001. Using study results, retailers may be able to develop improved strategies to increase profitability via online shopping. The implications for positive social change include the potential for improved quality of life for consumers in Saudi Arabia
Recommended from our members
Perceptions of online fraud and the impact on the countermeasures for the control of online fraud in Saudi Arabian financial institutions
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonThis study addresses the impact of countermeasures in the control and prevention of online fraud in Saudi Arabia and the influence of the environmental context. Combatting online fraud is facilitated when the public is fully educated and is aware of its types and of the prevention methods available. People are reliant on the Internet; the possibility of being breached by hackers and fraudsters is growing, especially as socialising, online shopping and banking are carried out through personal computers or mobile devices. Online fraud has been described as an epidemic that has spread to most online activities. Its prevalence has been noted to be in regions where there is high adoption of e-commerce, and, along with it, large online financial transactions. The argument is therefore the measures taken are either are inadequate or have failed to effectively address all the issues because of the organisational and environmental context of the country. This research aims to examine online fraud perceptions and the countermeasures designed and used by financial institutions in Saudi Arabia to control and prevent online fraud in its environmental context, to examine the effectiveness/impact of the countermeasures and to examine the factors that may affect/influence the impact of the countermeasures. The qualitative method approach was chosen to ensure balanced coverage of the subject matter. The nature of the research requires a broader, in-depth, examination of the experiences of the participants from their own perspective. Meanwhile levels of awareness are low, because of lack of knowledge and training, a lack of government sensitisation and the religious inclinations of the population. The findings also confirm the efforts of organisations to put in place countermeasures using various technological means, coupled with procedural controls and checks. The measures create obstacles to most customers, who find it cumbersome to engage in online activities because of those procedures and checks. The findings also show two types of regulations: government and organisational rules, with different foci and purposes, which are mostly centred on the monitoring of Internet operations and operational guidelines. The enforcement of rules in the light of prosecuting offenders has also been minimal and passive. The countermeasures of most banks/organisations mostly focus on prevention and detection. However, the findings suggest that the activities in each component and their interrelationships have a collective impact on combatting online fraud. The success of any effort or approach to combat fraudulent activities therefore depends on the activities of the four countermeasure components
Electronic Application for Palestine Embassy in Malaysia
In a twentieth century, we have observed a large-scale growth of internet-based services in our every sphere of life. Information technology has been a necessary element using by the government as a necessary communication way for delivering services to its citizen. E-services delivery is progressing in developing countries, but the erudition is still in immaturity level. In addition, the citizensâ needs are increasing and they want easy and secure way to reach the government information, services and transactions that will lead to building the trust between government and citizens. This project focuses on investigating the existing techniques and to come out with a proper solution to make electronic-Embassy more participation and empowerment, then developing A web-application to allow users to benefit from embassy services any time anywhere. In addition, focus in automate the most common consular transactions that using from residents that are registration and authenticate documents transactions
- âŚ