Abstract
While cyber security has become a prominent concept of emerging information governance, the Kingdom of Saudi Arabia has been dealing with severe threats to individual and organizational IT systems for a long time. These risks have recently permeated into educational institutions, thereby undermining the confidentiality of information as well as the delivery of education. Recent research has identified various causes and possible solutions to the problem. However, most scholars have considered a reductionist approach, in which the ability of computer configurations to prevent unwanted intrusions is evaluated by breaking them down to their constituent parts. This method is inadequate at studying complex adaptive systems. Therefore, the proposed project is designed to utilize a holistic stance to assess the cybersecurity management and policies in Saudi Arabian universities. Qualitative research, entailing a thorough critical review of ten public universities, will be utilized to investigate the subject matter. The subsequent recommendations can be adopted to enhance the security of IT systems, not only in institutional settings but also in any other environment in which such structures are used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dehlawi Z, Abokhodair N (2013) Saudi Arabia’s response to cyber conflict: a case study of the Shamoon malware incident. In: Paper presented at the 2013 IEEE international conference on intelligence and security informatics. employee’s behavior. Paper presented at the international conference on research and practical issues of enterprise information systems
Reid R, Van Niekerk J (2014) From information security to cyber security cultures. In: Paper presented at the 2014 information security for South Africa
Cheung RS, Cohen JP, Lo HZ, Elia F (2011) Challenge based learning in cybersecurity education. Paper presented at the proceedings of the international conference on security and management (SAM)
Ramim M, Levy Y (2006) Securing e-learning systems: a case of insider cyber attacks and novice IT management in a small university. J Cases Inf Technol 8(4):24–34
Rezgui Y, Marks A (2008) Information security awareness in higher education: an exploratory study. Comput Secur 27(7–8):241–253
De Bruijn H, Janssen M (2017) Building cybersecurity awareness: the need for evidence-based framing strategies. Gov Inf Q 34(1):1–7
Pandey RK, Misra M, (2016) Cyber security threats—Smart grid infrastructure
Craigen D, Diakun-Thibault N, Purse R (2014) Defining cybersecurity. Technol Innov Manage Rev 4(10)
Slusky L, Partow-Navid P (2012) Students information security practices and awareness. J Inf Privacy Secur 8(4):3–26
Benson V, McAlaney J, Frumkin LA (2019) Emerging threats for the human element and countermeasures in current cyber security landscape. In: Cyber law, privacy, and security
Alzahrani A, Alomar K (2016) Information security issues and threats in Saudi Arabia: a research survey. Int J Comput Sci Issues (IJCSI) 13(6):129
Yeniyurt S, Wu F, Kim D, Cavusgil ST (2019) Information technology resources, innovativeness, and supply chain capabilities as drivers of business performance: a retrospective and future research directions. Ind Mark Manage 79:46–52
Ullah F, Naeem H, Jabbar S, Khalid S, Latif MA, Al-Turjman F, Mostarda L (2019) Cyber security threats detection in internet of things using deep learning approach. IEEE Access 7:124379–124389
Marcum CD, Higgins GE (2019). Cybercrime. In: Handbook on crime and deviance. Springer, pp 459–475
Tweneboah-Koduah S, Skouby KE, Tadayoni R (2017) Cyber security threats to IoT applications and service domains. Wirel Pers Commun 95(1):169–185
Lamba A, Singh S, Balvinder S, Dutta N, Rela S, (2017) Analyzing and fixing cyber security threats for supply chain management. Int J Technol Res Eng 4(5)
Pandey RK, Misra M (2016). Cyber security threats—Smart grid infrastructure. In: 2016 National power systems conference (NPSC). IEEE, pp 1–6
Syed AM, Ahmad S, Alaraifi A, Rafi W (2020) Identification of operational risks impeding the implementation of eLearning in higher education system. Educ Inf Technol 1–17
Li L, Xu L, He W, Chen Y, Chen H (2016). Cyber security awareness and its impact on employee’s behavior. In: International conference on research and practical issues of enterprise information systems. Springer, Cham, pp 103–111
Walker-Roberts S, Hammoudeh M, Aldabbas O, Aydin M, Dehghantanha A (2020) Threats on the horizon: understanding security threats in the era of cyber-physical systems. J Supercomput 76(4):2643–2664
Puthal D, Mohanty SP, Nanda P, Choppali U (2017) Building security perimeters to protect network systems against cyber threats [future directions]. IEEE Consumer Electron Mag 6(4):24–27
Mohajan HK (2018) Qualitative research methodology in social sciences and related subjects. J Econ Dev Environ People 7(1):23–48
Basias N, Pollalis Y (2018) Quantitative and qualitative research in business & technology: Justifying a suitable research methodology. Rev Integr Bus Econ Res 7:91–105
Snyder H (2019) Literature review as a research methodology: an overview and guidelines. J Bus Res 104:333–339
Wiek A, Lang DJ (2016) Transformational sustainability research methodology
Humphries B (2017) Re-thinking social research: anti-discriminatory approaches in research methodology. Taylor & Francis
Ulmer JB (2017) Posthumanism as research methodology: inquiry in the anthropocene. Int J Qual Stud Educ 30(9):832–848
Al-Mhiqani MN, Ahmad R, Yassin W, Hassan A, Abidin ZZ, Ali NS, Abdulkareem KH (2018) Cyber-security incidents: a review cases in cyber-physical systems. Int J Adv Comput Sci Appl 1:499–508
Global Cybersecurity Index (GCI)—ITU: Committed to ... (n.d.). Retrieved 23 Jan 2018 from https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix A: List of Universities
Appendix A: List of Universities
-
1.
King Abdulaziz University https://www.kau.edu.sa/Home.aspx
-
2.
King fahd university of petroleum and minerals http://www.kfupm.edu.sa/ar/Default.aspx
-
3.
King Faisal University https://www.kfu.edu.sa/sites/Home/
-
4.
King Khalid University https://www.kku.edu.sa/
-
5.
King Saud University https://www.ksu.edu.sa/en/
-
6.
Qassim University https://www.qu.edu.sa/
-
7.
TaibahUniversity https://www.taibahu.edu.sa/Pages/AR/Home.aspx
-
8.
Taif University https://www.tu.edu.sa/
-
9.
University of Hail http://www.uoh.edu.sa/Pages/default.aspx
-
10.
Jazan University https://www.jazanu.edu.sa/
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Masmali, H.H., Miah, S.J. (2023). Emergent Insight of the Cyber Security Management for Saudi Arabian Universities: A Content Analysis. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Seventh International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 448. Springer, Singapore. https://doi.org/10.1007/978-981-19-1610-6_14
Download citation
DOI: https://doi.org/10.1007/978-981-19-1610-6_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1609-0
Online ISBN: 978-981-19-1610-6
eBook Packages: EngineeringEngineering (R0)