CFP last date
20 May 2024
Reseach Article

Adherence to ICT Security and Privacy Policies in Saudi Arabia

by Khalid Almarhabi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 4
Year of Publication: 2016
Authors: Khalid Almarhabi
10.5120/ijca2016910974

Khalid Almarhabi . Adherence to ICT Security and Privacy Policies in Saudi Arabia. International Journal of Computer Applications. 147, 4 ( Aug 2016), 13-18. DOI=10.5120/ijca2016910974

@article{ 10.5120/ijca2016910974,
author = { Khalid Almarhabi },
title = { Adherence to ICT Security and Privacy Policies in Saudi Arabia },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 4 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number4/25640-2016910974/ },
doi = { 10.5120/ijca2016910974 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:59.772804+05:30
%A Khalid Almarhabi
%T Adherence to ICT Security and Privacy Policies in Saudi Arabia
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 4
%P 13-18
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There is general agreement that 2015/2016 has been the period when major successful attacks on both private and public sector information systems have reached intolerable levels and response at the governmental and private sectors has become imperative. This study outlines how public enterprises can adopt effective, relevant and efficient security and privacy policies to meet citizens’, legal, and government expectations and to comply with appropriate cybersecurity standards. This paper provides those involved in planning, designing, managing and implementing security and privacy policies with guidance for security issues relevant to their national situation. This study undertook a qualitative analysis of policies and strategy documents published in the selected countries to investigate and contrasts the various methodologies utilized to adhere to security and privacy policies. The situation in Saudi Arabia was analyzed in comparison to Australia and the United Kingdom. The primary result shows that public enterprises in Saudi Arabia needs to increase their efforts to adhere to security and privacy policies by ensuring the policies’ readiness to be put into action, and they need to establish appropriate rewards and sanctions principles.

References
  1. Patel, A., Network performance without compromising security. Network Security, 2015. 2015(1): p. 9-12.
  2. Kaspersky Website. Kaspersky security bulletin 2014. 2014; Available from: http://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/files/2014/12/Kaspersky-Security-Bulletin-2014.-Overall-statistics-for-2014.pdf.
  3. Mcafee Website. Estimating the global cost of cybercrime. 2014; Available from: http://www.mcafee.com/au/resources/reports/rp-economic-impact-cybercrime2.pdf.
  4. Alsulaiman, L.A. and W.A. Alrodhan, Information privacy status in Saudi Arabia. Computer and Information Science, 2014. 7(3): p. p102.
  5. Ministry Of Communications and Information Technology, Developing national information security strategy for the kingdom of Saudi Arabia, Editor. 2011.
  6. Longman Dictionary. Policy definition,. Available from: http://www.ldoceonline.com/dictionary/policy.
  7. The United Nations Educational Scientific and Cultural Organization. What is privacy. in The right to privacy. 1970. Paris.
  8. Appenzeller, T., The End of Cheap Oil. 2004, National Geographic Society: Washington. p. 80.
  9. Westin, A.F., Privacy and freedom. 1967.
  10. Brandeis, L. and S. Warren, The right to privacy. 2014: RL Van Bruggen.
  11. Ministry of Interior, The basic principles of information security, Ministry of Interior in Saudi Arabia, Editor. 2001. p. 7.
  12. Al-senaidy, A.M., T. Ahmad, and M.M. Shafi, Privacy and security concerns in SNS: a Saudi Arabian users point of view. International Journal of Computer Applications, 2012. 49(14).
  13. Virkki, J. and R. Aggarwal, Privacy of wearable electronics in the healthcare and childcare sectors: a survey of personal perspectives from Finland and the United Kingdom. Journal of Information Security, 2014. 2014.
  14. King, T., L. Brankovic, and P. Gillard, Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. International Journal of Medical Informatics, 2012. 81(4): p. 279-289.
  15. Alqathbar, K. and A. Alsubah, Information security status in kingdom of Saudi Arabia. Information Studies, 2012. 14: p. 195.
  16. The United Nations, United Nations e-government survey. 2014: New York. p. 15 - 33.
  17. Kearns, I., Public value and e-government. 2004: Institute for Public Policy Research.
  18. Jorgensen, T.B. and B. Bozeman, Public values an inventory. Administration and Society, 2007. 39(3): p. 354-381.
  19. Karunasena, K., An investigation of the public value of e-government in Sri Lanka. 2012, RMIT University Melbourne, Australia.
  20. Karunasena, K. and H. Deng, A revised framework for evaluating the public value of e-government. 2011.
  21. Wood, C.C. and D. Lineman, Information security policies made easy version 11. 2009: Information Shield, Inc.
  22. Office of Australian Information Commission, Privacy act 1988. 2013. p. 1.
  23. Pahnila, S., M. Siponen, and A. Mahmood. Employees' behavior towards IS security policy compliance. in 40th Annual Hawaii International Conference on System Sciences. 2007. IEEE.
  24. Australian Capital Territory Chief Minister’s Department, ACT government evaluation policy and guidelines, Australian Capital Territory Chief Minister’s Department, Editor. 2010: Canberra.
  25. Her Majesty's Treasury, The magenta book: Guidance for evaluation. 2011.
  26. Hallsworth, M., S. Parker, and J. Rutter, Policy making in the real world. London: Institute for Government, 2011.
  27. Bulgurcu, B., H. Cavusoglu, and I. Benbasat, Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 2010. 34(3): p. 523-548.
  28. Her Majesty's Revenue and Customs. Guidance let property campaign: your guide to making a disclosure. 2013; Available from: https://www.gov.uk/government/publications/let-property-campaign-your-guide-to-making-a-disclosure/let-property-campaign-your-guide-to-making-a-disclosure.
  29. Bureau of Experts at the Council of Ministers, Anti-cyber crime law, Official Translation Department, Editor. 2007. p. 4.
  30. Bada, M., et al., Computer Emergency Response Teams (CERTs) an overview. 2014.
  31. The FIRST Steering Committee. FIRST vision and mission statement. 2003; Available from: http://www.first.org/about/mission.
  32. Berke, P., et al., What makes plan implementation successful? An evaluation of local plans and implementation practices in New Zealand. Environment and Planning B Planning and Design, 2006. 33(4): p. 581.
  33. De Borchgrave, A., Transnational crime the new empire of evil. Strategy & Leadership, 1996. 24(6): p. 27-31.
  34. Altameem, T.A., The critical factors of e-government adoption: an empirical study in the Saudi Arabia public sectors. 2007.
  35. ALArifi, A., H. Tootell, and P. Hyland. A study of information security awareness and practices in Saudi Arabia. International Conference in Communications and Information Technology (ICCIT), 2012. IEEE.
  36. El-Haddadeh, R., et al., E-government implementation challenges: a case study. 2010.
  37. Puhakainen, P. and M. Siponen, Improving employees' compliance through information systems security training: an action research study. Mis Quarterly, 2010. 34(4): p. 757-778.
  38. Yoo, J., Comparison of information security controls by leadership of top management. Journal of Society for e-Business Studies, 2014. 19(1).
  39. The Department of Premier and Cabinet, Digital information security policy. 2012. p. 5.
  40. The International Organization for Standardization, ISO/IEC 27002: Information technology -- Security techniques -- Code of practice for information security controls. 2013.
  41. Bureau of Experts at the Council of Ministers, Government tenders and procurement law minister of finance, Editor. 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Adhering Security Privacy.