2021
DOI: 10.3390/jcp1020017
|View full text |Cite
|
Sign up to set email alerts
|

Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia

Abstract: The evolution of information systems has escalated significantly within the last decade as research unveils new concepts. The general orientation to provide solutions to complex problems continues to inspire innovation and new advancements. Cybersecurity is emerging as a critical factor for consideration within the resultant paradigm as information systems become significantly integrated. This paper provides an in-depth analysis of cybersecurity within the context of information systems. The paper examines som… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Globally, an organizational culture that prioritizes security is essential to safeguarding e-government services. Employees are encouraged by this culture to understand the value of cybersecurity and their part in preserving these services (Alhawamleh, 2012;Alrubaiq and Alharbi, 2021). It lessens the effect of security breaches on e-government services by encouraging open communication and the reporting of security issues without fear of consequences (Tegethoff et al, 2023).…”
Section: Role Of Cybersecurity Practices In E-government Service Prot...mentioning
confidence: 99%
See 2 more Smart Citations
“…Globally, an organizational culture that prioritizes security is essential to safeguarding e-government services. Employees are encouraged by this culture to understand the value of cybersecurity and their part in preserving these services (Alhawamleh, 2012;Alrubaiq and Alharbi, 2021). It lessens the effect of security breaches on e-government services by encouraging open communication and the reporting of security issues without fear of consequences (Tegethoff et al, 2023).…”
Section: Role Of Cybersecurity Practices In E-government Service Prot...mentioning
confidence: 99%
“…Their research indicates that welldesigned and up-to-date technological systems provide a solid foundation for implementing effective cybersecurity measures, thereby reducing vulnerabilities and potential breaches. Moreover, the studies of Alrubaiq and Alharbi (2021) and Mao and Zhu (2023) delves into the specific technologies that enhance cybersecurity in e-government settings. Their findings highlight the significance of advanced encryption protocols, intrusion detection systems and secure communication channels, all of which are integral components of a resilient technological infrastructure.…”
Section: Role Of Cybersecurity Practices In E-government Service Prot...mentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, data protection and user privacy must also be a focus to avoid potential risks related to information security. This problem is a general challenge that can arise in adopting a digitalization approach (Alharbi et al, 2021;Alrubaiq, 2021). This trend is also based on the efforts made by the government through coordination.…”
Section: Source: Researcher Documentation 2023mentioning
confidence: 99%
“…The authors' contribution to this work, ascribed as follow: Elrasheed Ismal Mohommoud ZAYID and Abdulmalik A. HUMAYED conducted the theoretical and designed development; Abdulmalik A. HUMAYED and Yagoub Abbker ADAM analyzed the data; Yagoub Abbker ADAM coordinating the review of this manuscript and approving it for publication by Abdulmalik A. HUMAYED and submitted by the Corresponding author (ORCID: https://orcid.org/0000-information, convenience such as online shopping and banking, cost-effectiveness for many services, entertainment, gamification, collaboration, and innovation [3]. However, cyberspace is challenged by malicious cyber security risks and potential threats that could jeopardize digital data availability, confidentiality, and integrity [4][5][6][7]. These dangers can come from various sources, including purposeful or unintentional actions by staff members or other insiders and malevolent actors like hackers, cybercriminals, and state-sponsored attackers.…”
Section: Introductionmentioning
confidence: 99%