A study of information security awareness and practices in Saudi Arabia

Abdulaziz Alarifi, Holly Tootell, Peter Hyland

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

19 Citations (Scopus)

Abstract

Although the Web, cell phone 'apps' and cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. While awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by the Malaysian Cyber Security Organization and KPMG. The survey attracted 633 respondents and the results confirmed that ISA in Saudi Arabia is quite low. Several of the areas of weakness in ISA appear to be related to the level of censorship or the patriarchical and tribal nature of Saudi culture.

Original languageEnglish
Title of host publication2012 International Conference on Communications and Information Technology, ICCIT 2012
Pages6-12
Number of pages7
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event2012 International Conference on Communications and Information Technology, ICCIT 2012 - Hammamet, Tunisia
Duration: 26 Jun 201228 Jun 2012

Publication series

NameInternational Conference on Communications and Information Technology - Proceedings
ISSN (Print)1792-4316

Conference

Conference2012 International Conference on Communications and Information Technology, ICCIT 2012
Country/TerritoryTunisia
CityHammamet
Period26/06/1228/06/12

Fingerprint

Dive into the research topics of 'A study of information security awareness and practices in Saudi Arabia'. Together they form a unique fingerprint.

Cite this