Most organisations now impose information security policies (ISPs) or 'conditions of use' agreements upon their employees. The need to ensure that employees are informed and aware of their obligations toward information security is apparent. Less apparent is the correlation between the provision of such policies and their compliance. In this paper, we report our research into the factors that determine the efficacy of information security policies (ISPs). Policies should comprise rules or principles that users can easily understand and follow. Presently, there is no ready mechanism for estimating the likely efficacy of such policies across an organisation. One factor that has a plausible impact upon the comprehensibility of policies is their readability. The present study investigates the effectiveness of applying readability metrics as an indicator of policy comprehensibility. Results from a preliminary study reveal variations in the comprehension test results attributable to the difficulty of the examined policies. The pilot study shows some correlation between the software readability formula results and human comprehension test results and supports our view that readability has an impact upon understanding ISPs. These findings have important implications for users’ compliance with information security policies and suggest that the application of suitably selected readability metrics may allow policy designers to evaluate their draft policies for ease of comprehension prior to policy release. Indeed, there may be grounds for a readability compliance test that future ISPs must satisfy
The question-answering system (QAS) aims to produce a response to a query using information from a text corpus. Arabic is a complex language. However, it has more than 450 million native speakers across the globe. The Saudi Arabian government encourages organizations to automate their routine activities to provide adequate services to their stakeholders. The performance of current Arabic QASs is limited to the specific domain. An effective QAS retrieves relevant responses from structured and unstructured data based on the user query. Many QAS studies categorized QASs according to factors, including user queries, dataset characteristics, and the nature of the responses. A more comprehensive examination of QASs is required to improve the QAS development according to the present QAS requirements. The current literature presents the features and classifications of the Arabic QAS. There is a lack of studies to report the techniques of Arabic QAS development. Thus, this study suggests a systematic literature review of strategies for developing Arabic QAS. A total of 617 articles were collected, and 40 papers were included in the proposed review. The outcome reveals the importance of the dataset and the deep learning techniques used to improve the performance of the QAS. The existing systems depend on supervised learning methods that lower QAS performance. In addition, the recent development of machine learning techniques encourages researchers to develop unsupervised QAS.
Cloud computing technology is a new computing paradigm phenomenon that has recently received a significant attention by several research studies. However, the previous works have concentrated on the adoption of this technology and limited studies focused on the factors influencing the intention to use it. Therefore, the proposed study developed a model to figure out these factors. This study used an online questionnaire to collect data. A total of 712 responses were received. Structural equation modelling was employed by using SmartPLS 3 software to analyse the collected data. The findings of this study indicate that awareness, user readiness, and satisfaction are important factors related to the use of cloud computing, while privacy seems to have no significant influence on the use of this technology. Thus, this study recommends users to attend courses and workshops to garner knowledge and understanding of cloud computing and hence become appropriately qualified to use it. Moreover, such courses and workshops will provide users with methods and techniques to protect their privacy, which should be given priority attention.
Closed-circuit television (CCTV) surveillance cameras are widely used in public and private areas around the world. It is primarily used for tracking individuals and preventing criminal activities. It is necessary to balance the benefits of video surveillance and the risks it poses to individuals' right to privacy. The existing studies raised privacy issues of installing CCTV in public places. However, there is a lack of studies investigating users’ awareness of information security and privacy limitations in installing CCTV in private places. Thus, in this study, the author evaluated users' information security awareness of the value of CCTV and other forms of video surveillance. In-person interviews were conducted in Riyadh province, Kingdom of Saudi Arabia. A total of 77 individuals responded to the interview. A qualitative analysis was conducted to evaluate the participants’ perception of CCTV usage. The outcome of the analysis revealed four themes: Privacy invasion, privacy awareness, dilemmas in implementing security, and preventive measures. The findings revealed that the participants required strict privacy policies for installing CCTV video monitoring systems in private areas. In addition, they understood that CCTV is effectively reducing the fear of crime. The research contributes to understanding users' general awareness of information security and offers the necessary steps to protect the user's privacy in a CCTV surveillance environment. In addition, a data-sharing framework is recommended to share the data in a secure environment. Furthermore, researchers can utilize the study findings in conducting further similar investigative studies.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.