11,441 research outputs found

    Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats

    Get PDF
    This study focuses on the issue of information security policy for e-government in Saudi Arabia. It evaluates the three fundamental pillars that determine data security such as effectiveness, vulnerabilities, and threats. The paper is seeking to reveal the risks of information security policy for e-government in Saudi Arabia as well as to examine the vulnerabilities and the effectiveness of the system. The methodology applied inductive approach where both qualitative and quantitative research method were used. A survey by use of questionnaires and an interview was conducted

    Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions

    Get PDF
    The Internet of Things (IoT) ability to monitor our every move raises many privacy concerns. This paper reports on a study to assess current awareness of privacy implications of IoT devices amongst Saudi Arabians. We found that even when users are aware of the potential for privacy invasion, their need for the convenience these devices afford leads them to discount this potential and to ignore any concerns they might initially have had. We then conclude by making some predictions about the direction the IoT field will take in the next 5-7 years, in terms of privacy invasion, protection and awareness

    China’s foreign oil policy: genesis, deployment and selected effects

    Get PDF
    China is a rising global power with a growing role and impact on the world’s energy markets as well as on the Earth’s climate system. China pursues its development in an essentially non-confrontational manner, a vision encapsulated by the notion of peaceful rise which is viewed positively in the world’s major capitals. Nevertheless, China’s rapid growth represents a genuine global challenge and raises many questions. How is China dealing with its growing need for imported crude oil? What is the impact of China’s rise on the global oil market, notably in terms of oil price developments? Are Chinese actions on oil markets different from those of other major importers? What opportunities and risks arise as a result of china’s growing role on the global oil market from the viewpoint of other global players? In this report we seek to offer some answers to those questions with a review of China’s developing energy policy, of the actions and revealed preferences of its national oil companies, and of broader economic and geopolitical analyses of the impact of China’s growing oil consumption on other global players.Crude oil, energy security, oil security, China, foreign oil policy

    An overview on cyber security awareness in Muslim countries

    Get PDF
    Various cases of security breaches and attacks has been experienced globally, and high-level cases of cyber-attacks that threaten security has been documented. Attacks from various hacking groups have been conducted on organizations like the LuzSec, Stuxnet and many others that caused various levels of damages. Recent years have even seen groups that are anonymous in nature, targeting businesses that are highly profiled and other organizations. Some attacks have been conducted with much ease, thereby exposing the existing weaker systems of handling cybercrimes and some breaches have brought along very highly costs incurred on security. Countries have become very vulnerable in particular with the escalating levels of economy and the essential needs of improving infrastructure, in which has made them rely on technology and computer networks. Cyber threats can be categorized into two, and briefly they’ve been explained. This paper evaluates some instances of cyber-attacks in some of the Muslim countries like The Kingdom of Saudi Arabia (KSA), and the United Arab Emirates (UAE), the potential impacts and the possible recommendations that is implemented by governments, can help in raising awareness on cyber-attack issues

    Factors That Predict the Adoption of Online Shopping in Saudi Arabia

    Get PDF
    Despite the increased numbers of online consumers, e-commerce growth is slow in the Kingdom of Saudi Arabia. In this correlational study, the technology acceptance model (TAM) was used as a theoretical framework to examine whether perceived ease of use of e-commerce platforms and perceived usefulness of e-commerce platforms could predict consumers\u27 intention to adopt shopping online. A pre-existing TAM survey instrument was used to collect data from consumers (N = 95) who live in a City and have shopped at least once online. The regression analysis confirmed a positive statistically significant relationship between perceived ease of use of e-commerce platforms and consumers\u27 intent to adopt online shopping. The results showed that perceived ease of use of e-commerce platforms and perceived usefulness of e-commerce platforms were statistically significant in predicting consumers\u27 intent to adopt online shopping, with F(2, 92) = 241.630, p \u3c .001, R2 = .840, and adjusted R2 = .837, and accounted for 84% of the variance in consumers\u27 intent to adopt online shopping. The correlation between perceived ease of use and consumers\u27 intent to adopt online shopping was (PEOU) r= .916, p \u3c .001 and the correlation significance between perceived usefulness and consumers\u27 intent to adopt online shopping was (PU) r= .591, p \u3c .001. Using study results, retailers may be able to develop improved strategies to increase profitability via online shopping. The implications for positive social change include the potential for improved quality of life for consumers in Saudi Arabia

    Electronic Application for Palestine Embassy in Malaysia

    Get PDF
    In a twentieth century, we have observed a large-scale growth of internet-based services in our every sphere of life. Information technology has been a necessary element using by the government as a necessary communication way for delivering services to its citizen. E-services delivery is progressing in developing countries, but the erudition is still in immaturity level. In addition, the citizens’ needs are increasing and they want easy and secure way to reach the government information, services and transactions that will lead to building the trust between government and citizens. This project focuses on investigating the existing techniques and to come out with a proper solution to make electronic-Embassy more participation and empowerment, then developing A web-application to allow users to benefit from embassy services any time anywhere. In addition, focus in automate the most common consular transactions that using from residents that are registration and authenticate documents transactions
    • …
    corecore