Skip to main content

Emergent Insight of the Cyber Security Management for Saudi Arabian Universities: A Content Analysis

  • Conference paper
  • First Online:
Proceedings of Seventh International Congress on Information and Communication Technology

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 448))

Abstract

While cyber security has become a prominent concept of emerging information governance, the Kingdom of Saudi Arabia has been dealing with severe threats to individual and organizational IT systems for a long time. These risks have recently permeated into educational institutions, thereby undermining the confidentiality of information as well as the delivery of education. Recent research has identified various causes and possible solutions to the problem. However, most scholars have considered a reductionist approach, in which the ability of computer configurations to prevent unwanted intrusions is evaluated by breaking them down to their constituent parts. This method is inadequate at studying complex adaptive systems. Therefore, the proposed project is designed to utilize a holistic stance to assess the cybersecurity management and policies in Saudi Arabian universities. Qualitative research, entailing a thorough critical review of ten public universities, will be utilized to investigate the subject matter. The subsequent recommendations can be adopted to enhance the security of IT systems, not only in institutional settings but also in any other environment in which such structures are used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dehlawi Z, Abokhodair N (2013) Saudi Arabia’s response to cyber conflict: a case study of the Shamoon malware incident. In: Paper presented at the 2013 IEEE international conference on intelligence and security informatics. employee’s behavior. Paper presented at the international conference on research and practical issues of enterprise information systems

    Google Scholar 

  2. Reid R, Van Niekerk J (2014) From information security to cyber security cultures. In: Paper presented at the 2014 information security for South Africa

    Google Scholar 

  3. Cheung RS, Cohen JP, Lo HZ, Elia F (2011) Challenge based learning in cybersecurity education. Paper presented at the proceedings of the international conference on security and management (SAM)

    Google Scholar 

  4. Ramim M, Levy Y (2006) Securing e-learning systems: a case of insider cyber attacks and novice IT management in a small university. J Cases Inf Technol 8(4):24–34

    Article  Google Scholar 

  5. Rezgui Y, Marks A (2008) Information security awareness in higher education: an exploratory study. Comput Secur 27(7–8):241–253

    Article  Google Scholar 

  6. De Bruijn H, Janssen M (2017) Building cybersecurity awareness: the need for evidence-based framing strategies. Gov Inf Q 34(1):1–7

    Article  Google Scholar 

  7. Pandey RK, Misra M, (2016) Cyber security threats—Smart grid infrastructure

    Google Scholar 

  8. Craigen D, Diakun-Thibault N, Purse R (2014) Defining cybersecurity. Technol Innov Manage Rev 4(10)

    Google Scholar 

  9. Slusky L, Partow-Navid P (2012) Students information security practices and awareness. J Inf Privacy Secur 8(4):3–26

    Article  Google Scholar 

  10. Benson V, McAlaney J, Frumkin LA (2019) Emerging threats for the human element and countermeasures in current cyber security landscape. In: Cyber law, privacy, and security

    Google Scholar 

  11. Alzahrani A, Alomar K (2016) Information security issues and threats in Saudi Arabia: a research survey. Int J Comput Sci Issues (IJCSI) 13(6):129

    Article  Google Scholar 

  12. Yeniyurt S, Wu F, Kim D, Cavusgil ST (2019) Information technology resources, innovativeness, and supply chain capabilities as drivers of business performance: a retrospective and future research directions. Ind Mark Manage 79:46–52

    Article  Google Scholar 

  13. Ullah F, Naeem H, Jabbar S, Khalid S, Latif MA, Al-Turjman F, Mostarda L (2019) Cyber security threats detection in internet of things using deep learning approach. IEEE Access 7:124379–124389

    Article  Google Scholar 

  14. Marcum CD, Higgins GE (2019). Cybercrime. In: Handbook on crime and deviance. Springer, pp 459–475

    Google Scholar 

  15. Tweneboah-Koduah S, Skouby KE, Tadayoni R (2017) Cyber security threats to IoT applications and service domains. Wirel Pers Commun 95(1):169–185

    Article  Google Scholar 

  16. Lamba A, Singh S, Balvinder S, Dutta N, Rela S, (2017) Analyzing and fixing cyber security threats for supply chain management. Int J Technol Res Eng 4(5)

    Google Scholar 

  17. Pandey RK, Misra M (2016). Cyber security threats—Smart grid infrastructure. In: 2016 National power systems conference (NPSC). IEEE, pp 1–6

    Google Scholar 

  18. Syed AM, Ahmad S, Alaraifi A, Rafi W (2020) Identification of operational risks impeding the implementation of eLearning in higher education system. Educ Inf Technol 1–17

    Google Scholar 

  19. Li L, Xu L, He W, Chen Y, Chen H (2016). Cyber security awareness and its impact on employee’s behavior. In: International conference on research and practical issues of enterprise information systems. Springer, Cham, pp 103–111

    Google Scholar 

  20. Walker-Roberts S, Hammoudeh M, Aldabbas O, Aydin M, Dehghantanha A (2020) Threats on the horizon: understanding security threats in the era of cyber-physical systems. J Supercomput 76(4):2643–2664

    Article  Google Scholar 

  21. Puthal D, Mohanty SP, Nanda P, Choppali U (2017) Building security perimeters to protect network systems against cyber threats [future directions]. IEEE Consumer Electron Mag 6(4):24–27

    Article  Google Scholar 

  22. Mohajan HK (2018) Qualitative research methodology in social sciences and related subjects. J Econ Dev Environ People 7(1):23–48

    Article  Google Scholar 

  23. Basias N, Pollalis Y (2018) Quantitative and qualitative research in business & technology: Justifying a suitable research methodology. Rev Integr Bus Econ Res 7:91–105

    Google Scholar 

  24. Snyder H (2019) Literature review as a research methodology: an overview and guidelines. J Bus Res 104:333–339

    Article  Google Scholar 

  25. Wiek A, Lang DJ (2016) Transformational sustainability research methodology

    Google Scholar 

  26. Humphries B (2017) Re-thinking social research: anti-discriminatory approaches in research methodology. Taylor & Francis

    Google Scholar 

  27. Ulmer JB (2017) Posthumanism as research methodology: inquiry in the anthropocene. Int J Qual Stud Educ 30(9):832–848

    Article  MathSciNet  Google Scholar 

  28. Al-Mhiqani MN, Ahmad R, Yassin W, Hassan A, Abidin ZZ, Ali NS, Abdulkareem KH (2018) Cyber-security incidents: a review cases in cyber-physical systems. Int J Adv Comput Sci Appl 1:499–508

    Google Scholar 

  29. Global Cybersecurity Index (GCI)—ITU: Committed to ... (n.d.). Retrieved 23 Jan 2018 from https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamzah Hadi Masmali .

Editor information

Editors and Affiliations

Appendix A: List of Universities

Appendix A: List of Universities

  1. 1.

    King Abdulaziz University https://www.kau.edu.sa/Home.aspx

  2. 2.

    King fahd university of petroleum and minerals http://www.kfupm.edu.sa/ar/Default.aspx

  3. 3.

    King Faisal University https://www.kfu.edu.sa/sites/Home/

  4. 4.

    King Khalid University https://www.kku.edu.sa/

  5. 5.

    King Saud University https://www.ksu.edu.sa/en/

  6. 6.

    Qassim University https://www.qu.edu.sa/

  7. 7.

    TaibahUniversity https://www.taibahu.edu.sa/Pages/AR/Home.aspx

  8. 8.

    Taif University https://www.tu.edu.sa/

  9. 9.

    University of Hail http://www.uoh.edu.sa/Pages/default.aspx

  10. 10.

    Jazan University https://www.jazanu.edu.sa/

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Masmali, H.H., Miah, S.J. (2023). Emergent Insight of the Cyber Security Management for Saudi Arabian Universities: A Content Analysis. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Seventh International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 448. Springer, Singapore. https://doi.org/10.1007/978-981-19-1610-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-1610-6_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-1609-0

  • Online ISBN: 978-981-19-1610-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics