Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia

被引:36
作者
Alzubaidi, Abdulaziz [1 ]
机构
[1] Umm Alqura Univ, Dept Comp Sci, Al Qunfudah 28821, Saudi Arabia
关键词
Cybersecurity; Cybercrime; Threat; Saudi Arabia; Awareness; Malware; USERS;
D O I
10.1016/j.heliyon.2021.e06016
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The revolution in the Information Technology (IT) field has led to a significant increase in the number of people connected to and utilizing the Internet. However, it has also introduced severe security risks: valuable information such as passwords, financial accounts, and other confidential data are considered attractive targets for attackers. Cyber-attacks against this infrastructure can not only lead to data leakage but can also have significant financial implications and even lead to loss of life. Consequently, to defend against such attacks, and considering humans have a key role in these technologies, it is important to increase cyber-security awareness. This paper focuses on measuring the current level of cyber-security awareness in Saudi Arabia, in terms of cyber-security practices, level of awareness, and incident reporting, by means of an online questionnaire with 1230 participants. The questionnaire results showed that 31.7% used public Wi-Fi to access the Internet,51% used their personal information to create their passwords, 32.5% did not have any idea about phishing attacks, 21.7% had been victim of cybercrimes while only 29.2% of them reported the crime, which reflects their levels of awareness. The paper concludes by offering recommendations based on analysis of the results topromote the level of awareness.
引用
收藏
页数:13
相关论文
共 34 条
[1]   User preference of cyber security awareness delivery methods [J].
Abawajy, Jemal .
BEHAVIOUR & INFORMATION TECHNOLOGY, 2014, 33 (03) :236-247
[2]  
Ahmed N, 2017, IEEE REG 10 HUMANIT, P788, DOI 10.1109/R10-HTC.2017.8289074
[3]  
Alarifi A., 2012, 2012 International Conference on Communications and Information Technology (ICCIT), P6, DOI 10.1109/ICCITechnol.2012.6285845
[4]  
Albaroodi H. A., 2019, INT C ADV CYB SEC, P305
[5]   Web Users' Knowledge and Their Behavior towards Security Threats and Vulnerabilities [J].
Aldossary, Alia A. ;
Zeki, Akram M. .
2015 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2015, :256-260
[6]  
Alotaibi F, 2016, INT CONF INTERNET, P154, DOI 10.1109/ICITST.2016.7856687
[7]  
AlSagri Hatoon S., 2015, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). Proceedings, P1, DOI 10.1109/CyberSA.2015.7166111
[8]  
Alzahrani A., 2016, International Journal of Computer Science Issues, V13, P129, DOI DOI 10.20943/01201606.129135
[9]   Information Security Awareness at Saudi Arabians' Organizations: An Information Technology Employee's Perspective [J].
Alzamil, Zakarya A. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2012, 6 (03) :38-55
[10]   Authentication of Smartphone Users Using Behavioral Biometrics [J].
Alzubaidi, Abdulaziz ;
Kalita, Jugal .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1998-2026