RETRACTED: Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia

被引:20
作者
Alrubaiq, Abdullah [1 ]
Alharbi, Talal [1 ]
机构
[1] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Technol, Al Majmaah 11952, Saudi Arabia
来源
JOURNAL OF CYBERSECURITY AND PRIVACY | 2021年 / 1卷 / 02期
关键词
cybersecurity; information systems; information system infrastructure; e-government; ADOPTION; TRUST;
D O I
10.3390/jcp1020017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of information systems has escalated significantly within the last decade as research unveils new concepts. The general orientation to provide solutions to complex problems continues to inspire innovation and new advancements. Cybersecurity is emerging as a critical factor for consideration within the resultant paradigm as information systems become significantly integrated. This paper provides an in-depth analysis of cybersecurity within the context of information systems. The paper examines some of the most consequential aspects of cybersecurity from the perspective of an e-government project in Saudi Arabia. A holistic system is proposed within the research framework to incorporate various scientific guidelines. The general orientation of this research is predicated on the aspiration to design and implement a complex and robust framework within which an e-government system can thrive within the Saudi Arabian context. A consideration of the physical environment within which the project will operate is also made, focusing on security. An evaluation of the cybersecurity environment in Saudi Arabia is reflective of significant advancements that have occurred in information system domains within the past few years.
引用
收藏
页数:17
相关论文
共 27 条
[1]   Current State of Cloud Computing Adoption - An Empirical Study in Major Public Sector Organizations of Saudi Arabia (KSA) [J].
Al-Ruithe, Majid ;
Benkhelifa, Elhadj ;
Hameed, Khawar .
14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 :378-385
[2]  
Alannsary M., 2019, EPiC Series in Computing, V58, P387, DOI [10.29007/848q, DOI 10.29007/848Q]
[3]  
Alassim M., 2017, Int. J. Inf. Commun. Eng, V11, P1
[4]  
Albrahim R, 2018, INT J ADV COMPUT SC, V9, P357
[5]   Analysing the scientific evolution of e-Government using a science mapping approach [J].
Alcaide Munoz, Laura ;
Pedro Rodriguez-Bolivar, Manuel ;
Jesus Cobo, Manuel ;
Herrera-Viedma, Enrique .
GOVERNMENT INFORMATION QUARTERLY, 2017, 34 (03) :545-555
[6]  
Alharbi N., 2019, Int. J. Innov. Econ. Dev, V5, P7, DOI [10.18775/ijied.1849-7551-7020.2015.54.2001, DOI 10.18775/IJIED.1849-7551-7020.2015.54.2001]
[7]   The impact of security and its antecedents in behaviour intention of using e-government services [J].
Alharbi, Nawaf ;
Papadaki, Maria ;
Dowland, Paul .
BEHAVIOUR & INFORMATION TECHNOLOGY, 2017, 36 (06) :620-636
[8]  
Aljarallah Sulaiman, 2018, Proceedings of the 18th European Conference on Digital Government (ECDG 2018), P8
[9]  
Alkhlewi Amal, 2015, 2nd International Workshop on Emerging Software as a Service and Analytics (ESaaSA 2015). Proceedings, P69
[10]  
Almrezeq N, 2019, 5TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2019), P188, DOI [10.1109/INFOMAN.2019.8714719, 10.1109/infoman.2019.8714719]