The history of incremental internet users in Saudi Arabia defined the basis of threats posed to the country and the region. After setting up the aim, objectives, and research questions, I moved to start finding the issue and how it impacts the national economy of Saudi Arabia. Covered several cybersecurity frameworks and practices globally. The benefits and challenges of the cybersecurity framework and its impacts on the IoT and blockchain industry are apparent. Agent-based modeling simulation technique is also used in this report alongside the CIMF framework's importance, which is an essential aspect of cybersecurity
This thesis is a case study on counterterrorism methods. Specifically, it examines Saudi Arabia's mu...
As ICT and cyberspace become sources of impressive innovation, the reliance of organizations, govern...
This research attempted to mitigate the gap in literature concerning a one serious problem in Saudi ...
The evolution of information systems has escalated significantly within the last decade as research ...
The revolution of computing and networks could revolutionise terrorism in the same way that it has b...
Abstract: Cyberspace has become the new frontier for countries to demonstrate power. Nations that ha...
In 2012, the official King Saud University’s website was hacked and database of 812 usersexpos...
Saudi Arabia has been a victim of cyberattacks over the years, with an increasing number of attacks ...
Cyber diplomacy is crucial in the current tech-driven environment in which diplomacy operates. It pl...
The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regul...
The world we are in today is all about Information Technology (IT) because we are in the age of Inf...
The supplementary dataset presented in this paper was used to measure the level of cybersecurity awa...
Cloud computing technologies can play an essential role in public organisations and companies while ...
In the age of the Internet, cybersecurity poses major challenges to the sovereignty of both developi...
Abstract: This field research deals with the role of cyber security in achieving the future visions ...
This thesis is a case study on counterterrorism methods. Specifically, it examines Saudi Arabia's mu...
As ICT and cyberspace become sources of impressive innovation, the reliance of organizations, govern...
This research attempted to mitigate the gap in literature concerning a one serious problem in Saudi ...
The evolution of information systems has escalated significantly within the last decade as research ...
The revolution of computing and networks could revolutionise terrorism in the same way that it has b...
Abstract: Cyberspace has become the new frontier for countries to demonstrate power. Nations that ha...
In 2012, the official King Saud University’s website was hacked and database of 812 usersexpos...
Saudi Arabia has been a victim of cyberattacks over the years, with an increasing number of attacks ...
Cyber diplomacy is crucial in the current tech-driven environment in which diplomacy operates. It pl...
The Saudi Arabia government has proposed different frameworks such as the CITC’s Cybersecurity Regul...
The world we are in today is all about Information Technology (IT) because we are in the age of Inf...
The supplementary dataset presented in this paper was used to measure the level of cybersecurity awa...
Cloud computing technologies can play an essential role in public organisations and companies while ...
In the age of the Internet, cybersecurity poses major challenges to the sovereignty of both developi...
Abstract: This field research deals with the role of cyber security in achieving the future visions ...
This thesis is a case study on counterterrorism methods. Specifically, it examines Saudi Arabia's mu...
As ICT and cyberspace become sources of impressive innovation, the reliance of organizations, govern...
This research attempted to mitigate the gap in literature concerning a one serious problem in Saudi ...