EMPLOYEES AWARENESS OF CYBER SECURITY IN SAUDI UNIVERSITIES: A PAPER REVIEW
Keywords:
Employees Awareness, Cyber Security, Saudi Universities, AIAbstract
Awareness in respect to cyber security is necessary because it helps to have use of AI and other technological tools. Key purpose of the present paper is to have learning on awareness in respect to cyber security in Saudi university and Model security in AI. A secondary source use has been considered in the paper and based on different sources the information is presented.
It is identified in the paper that key threats in context to information security can be human threats, technological threats, organizational threats and environmental threats. Universities in Saudi Arabia are concerned regarding cyber security and different efforts are performed such as network and system security development is considered. Collaboration with government agencies is also taken into account. Challenges are also identified like imbalance in class, vulnerability of attacks, etc. AI use is also affected in context to Universities in Saudi Arabia due to identified challenges.
References
P. Carey, Data protection: a practical guide to UK and EU law.Oxford University Press, Inc., 2018.
Rantos, K., Fysarakis, K., Manafavis, C. (2012). How effective is your security awareness program? An evaluation methodology, Information Security Journal: A Global Perspective, 21(6), 328-345.
IBM - United States (2022). Available at: https://www.ibm.com/downloads/cas/3R8N1DZJ
Campbell, S. (2017) Cybersecurity in higher education: Problems and solutions: Toptal, ToptalToptal Insights Blog. Toptal. Available at: https://www.toptal.com/insights/innovation/cybersecurity-in-higher-education
M. H. Alsulami et al., “Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia,” Information, vol. 12, no. 5, p. 208, May 2021, doi: 10.3390/info12050208.
Shea, S., Gillis, A.S. and Clark, C. (2023) What is cybersecurity? everything you need to know: TechTarget, Security. TechTarget. Available at: https://www.techtarget.com/searchsecurity/definition/cybersecurity
The benefits of Cyber Security Awareness Training Within Universities (2022) Open Access Government. Available at: https://www.openaccessgovernment.org/the-benefits-of-cyber-security-awareness-training-within-universities/139452/
AbdulazizAlzubaidi, Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia, Heliyon, Volume 7, Issue 1, 2021, e06016, ISSN 2405-8440, https://doi.org/10.1016/j.heliyon.2021.e06016. (https://www.sciencedirect.com/science/article/pii/S2405844021001213)
Rosencrance, L. (2023) Top 10 types of information security threats for IT teams: TechTarget, Security. TechTarget. Available at: https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-information-security-threats-for-IT-teams
Brans, P. (2022) Saudi Arabian organisations choose to outsource to improve cyber security posture: Computer Weekly, ComputerWeekly.com. ComputerWeekly.com. Available at: https://www.computerweekly.com/news/252524612/Saudi-Arabian-organisations-choose-to-outsource-to-improve-cyber-security-posture
Kaspersky (2020) Kaspersky and Saudi Federation for Cyber Security, programming and Drones Link-up on cybersecurity training, Main page. Available at:https://academy.kaspersky.com/news/kaspersky-and-saudi-federation-for-cyber-security-programming-and-drones-link-up-on-cybersecurity-tr/
ALArifi, A.; Tootell, H.; Hyland, P. Information Security Awareness in Saudi Arabia. In Proceedings of the CONF-IRM 2012, Vienna, Austria, 21–23 May 2012.
Alzahrani, A., Johnson, C., &Altamimi, S. (2018). Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation. In 2018 4th International Conference on Information Management (ICIM).
Alzamil, Z. A. (2018). Information security practice in Saudi Arabia: Case study on Saudi organizations. Information & Computer Security, 26(5), 568–583. https://doi.org/ 10.1108/ICS-01-2018-0006
Al_Janabi, S.; Al-Shourbaji, I. A Study of Cyber Security Awareness in Educational Environment in the Middle East. J. Inf. Knowl. Manag. 2016, 15, 1650007.
Aloul, F.A. The Need for Effective Information Security Awareness. J. Adv. Inf. Technol. 2012, 3, 176–183.
Ahmad, Z., Ong, T. S., Liew, T. H., &Norhashim, M. (2019). Security monitoring and information security assurance behavior among employees: An empirical analysis. Information & Computer Security.
J. Jang-Jaccard and S. Nepal, "A survey of emerging threats in cybersecurity," Journal of Computer and System Sciences, vol. 80, no. 5, pp. 973-993, 2014.
A. N. Singh, A. Picot, J. Kranz, M. Gupta, and A. Ojha, "Information security management (ISM) practices: Lessons from select cases from India and Germany," Global Journal ofFlexible Systems Management, vol. 14, no. 4, pp. 225-239, 2013.
M. Alshaikh, "Information security management practices in organizations," 2018.
A. Wiley, A. McCormac, and D. Calic, "More than the individual: Examining the relationship between culture and Information Security Awareness," Computers & Security, vol. 88, p. 101640, 2020
D. Ki-Aries and S. Faily, "Persona-centered information security awareness," Computers & Security, vol. 70, pp. 663-674, 2017/09/01/ 2017.
M. Evans, L. A. Maglaras, Y. He, and H. Janicke, "Human behaviour as an aspect of cybersecurity assurance," Security and Communication Networks, vol. 9, no. 17, pp. 4667-4679, 2016.
R. Alavi, S. Islam, H. Jahankhani, and A. Al-Nemrat, "Analyzing human factors for an effective information securitymanagement system," International Journal of Secure Software Engineering (IJSSE), vol. 4, no. 1, pp. 50-74, 2013.
N. Badie and A. H. Lashkari, "A new evaluation criteria for effective security awareness in computer risk management based on AHP," Journal of Basic and Applied Scientific Research, vol. 2, no. 9, pp. 9331-9347, 2012.
Alhayani, B., Mohammed, H. J., Chaloob, I. Z., & Ahmed, J. S. (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings, 531.
Azam, N., Michala, L., Ansari, S., & Truong, N. B. (2022). Data Privacy Threat Modelling for Autonomous Systems: A Survey from the GDPR's Perspective. IEEE Transactions on Big Data.
Berente, N., Gu, B., Recker, J., &Santhanam, R. (2021). Managing artificial intelligence. MIS quarterly, 45(3).
Checkpoint, (2023) Cyber Attacks on AIhttps://blog.checkpoint.com/2022/01/10/check-point-research-cyber-attacks-increased-50-year-over-year/
Chen, L., Chen, P., & Lin, Z. (2020). Artificial intelligence in education: A review. Ieee Access, 8, 75264-75278.
Fang, H., Qi, A., & Wang, X. (2020). Fast authentication and progressive authorization in large-scale IoT: How to leverage ai for security enhancement. IEEE Network, 34(3), 24-29.
Ghillani, D. (2022). Deep Learning and Artificial Intelligence Framework to Improve the Cyber Security. Authorea Preprints.
Hao, M., Li, H., Luo, X., Xu, G., Yang, H., & Liu, S. (2019). Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Transactions on Industrial Informatics, 16(10), 6532-6542.
Letaief, K. B., Shi, Y., Lu, J., & Lu, J. (2021). Edge artificial intelligence for 6G: Vision, enabling technologies, and applications. IEEE Journal on Selected Areas in Communications, 40(1), 5-36.
Manheim, K., & Kaplan, L. (2019). Artificial intelligence: Risks to privacy and democracy. Yale JL & Tech., 21, 106.
Sarker, I. H., Furhad, M. H., &Nowrozy, R. (2021). Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2, 1-18.
Xu, Z., Xiang, D., & He, J. (2021). Data Privacy Protection in News Crowdfunding in the Era of Artificial Intelligence. Journal of Global Information Management (JGIM), 30(7), 1-17.
Zhang, C., & Lu, Y. (2021). Study on artificial intelligence: The state of the art and future prospects. Journal of Industrial Information Integration, 23, 100224.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Abdulrahman A. Almaliki, Solmaz Safari (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.