Resistance to information security due to users' information safety behaviors: Empirical research on the emerging markets

S Apolinário, AC Yoshikuni, CLC Larieira - Computers in Human Behavior, 2023 - Elsevier
Practitioners and academics ask if and how punishment and moral norms affect the
resistance to information systems security in emerging markets. To address this question …

Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia

S Saeed - Sustainability, 2023 - mdpi.com
Information technology is considered as a key enabler to achieve “education for all” as a
sustainable development goal; however, involvement in the education sector has introduced …

A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field

FM Alotaibi, A Al-Dhaqm, WMS Yafooz, YD Al-Otaibi - Applied Sciences, 2023 - mdpi.com
Information security policy (ISP) plays a crucial role in maintaining the availability,
confidentiality, and integrity of sensitive data. However, it is of high complexity and …

The effectiveness of applying the economic and technological dimensions of the kingdom of Saudi Arabia's vision 2030 to achieve the competitive advantage of the …

SH Alhamad, SI Bani Hani, AC Dakhli… - Frontiers in Energy …, 2024 - frontiersin.org
This research focuses on examining the impact of Saudi Arabia's Vision 2030 on the energy
industry, specifically in the Hail region, by exploring the role of technological and economic …

[HTML][HTML] Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach

EM Alrawhani, A Romli, MA Al-Sharafi - Journal of Open Innovation …, 2025 - Elsevier
This research investigated the behavior related to compliance with information security
policy in the Yemeni banking sector by using the protection motivation theory (PMT). While …

Investigating the multifaceted dynamics of cybersecurity practices and their impact on the quality of e-government services: evidence from the KSA

AM Al-Hawamleh - Digital Policy, Regulation and Governance, 2024 - emerald.com
Purpose The Kingdom of Saudi Arabia (KSA) is embracing digital transformation and e-
government services, aiming to improve efficiency, accessibility and citizen-centricity …

Cloud computing usage by governmental organizations in Saudi Arabia based on Vision 2030

M Alarefi - Uncertain Supply Chain Management, 2023 - growingscience.com
Cloud computing (CC) has been used in several industries and domains. However, the use
of CC in governmental organization is still limited. The purpose of this study is to examine …

Factors Influencing Employees on Compliance with Cybersecurity Policies and Their Implications for Protection of Information and Technology Assets in Saudi Arabia

SS Alsemairi - Intelligent Information Management, 2023 - scirp.org
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability
of an organization's information and technology assets against cyber attacks. Organizations …

Les dirigeants de collectivités territoriales françaises confrontés à la gestion opérationnelle des cybermenaces: une approche typologique

R Février, O Lasmoles, M Bidan - Gestion et management public, 2023 - shs.cairn.info
Briantais, M.(2023). Piratage ChatGPT: des hackers détournent l'IA pour créer des
malwares. Commentcamarche. net, 18 janvier 2023. URL: https://www. commentcamarche …

Cracking the Code: A Comprehensive Analysis of Information Security Strategies Among Professionals

A Almuqrin, I Mutambik, JZ Zhang… - … of Organizational and …, 2024 - igi-global.com
With the expanding reach of the Internet of Things, information security threats are
increasing, including from the very professionals tasked with defending against these …