{"id":"https://openalex.org/W4412698917","doi":"https://doi.org/10.1049/ise2/5100339","title":"Analyzing Cryptocurrency Security Risks: A Comprehensive Survey of Saudi Arabian Perspectives","display_name":"Analyzing Cryptocurrency Security Risks: A Comprehensive Survey of Saudi Arabian Perspectives","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412698917","doi":"https://doi.org/10.1049/ise2/5100339"},"language":"en","primary_location":{"id":"doi:10.1049/ise2/5100339","is_oa":true,"landing_page_url":"https://doi.org/10.1049/ise2/5100339","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ise2/5100339","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ise2/5100339","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026996592","display_name":"Abeer Abdullah Alsadhan","orcid":"https://orcid.org/0000-0002-9391-6389"},"institutions":[{"id":"https://openalex.org/I76571253","display_name":"Imam Abdulrahman Bin Faisal University","ror":"https://ror.org/038cy8j79","country_code":"SA","type":"education","lineage":["https://openalex.org/I76571253"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Abeer Abdullah Alsadhan","raw_affiliation_strings":["Computer Science Department ,  Imam Abdulrahman bin Faisal University ,  Dammam ,  34212 ,  Saudi Arabia ,  iau.edu.sa"],"raw_orcid":"https://orcid.org/0000-0002-9391-6389","affiliations":[{"raw_affiliation_string":"Computer Science Department ,  Imam Abdulrahman bin Faisal University ,  Dammam ,  34212 ,  Saudi Arabia ,  iau.edu.sa","institution_ids":["https://openalex.org/I76571253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5026996592"],"corresponding_institution_ids":["https://openalex.org/I76571253"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":{"value":2000,"currency":"EUR","value_usd":2200},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25416999,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11995","display_name":"FinTech, Crowdfunding, Digital Finance","score":0.9742000102996826,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11711","display_name":"COVID-19 Pandemic Impacts","score":0.9363999962806702,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.8201943635940552},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4871523082256317},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4813438355922699}],"concepts":[{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.8201943635940552},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4871523082256317},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4813438355922699}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1049/ise2/5100339","is_oa":true,"landing_page_url":"https://doi.org/10.1049/ise2/5100339","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ise2/5100339","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2060cc4d42e04c78adf83a1b59b9d96f","is_oa":true,"landing_page_url":"https://doaj.org/article/2060cc4d42e04c78adf83a1b59b9d96f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IET Information Security, Vol 2025 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1049/ise2/5100339","is_oa":true,"landing_page_url":"https://doi.org/10.1049/ise2/5100339","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ise2/5100339","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320328818","display_name":"Imam Abdulrahman Bin Faisal University","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412698917.pdf","grobid_xml":"https://content.openalex.org/works/W4412698917.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W3121502571","https://openalex.org/W3135042403","https://openalex.org/W3215519659","https://openalex.org/W4312456620","https://openalex.org/W4313211253","https://openalex.org/W4320858826","https://openalex.org/W4321366364","https://openalex.org/W4352990845","https://openalex.org/W4379615748","https://openalex.org/W4381609865","https://openalex.org/W4383908548","https://openalex.org/W4384697171","https://openalex.org/W4386470768","https://openalex.org/W4386496390","https://openalex.org/W4390202756","https://openalex.org/W4392135749","https://openalex.org/W4401115203","https://openalex.org/W4401401703","https://openalex.org/W4405140272","https://openalex.org/W4405981430","https://openalex.org/W4406838240","https://openalex.org/W4406928238","https://openalex.org/W4407602877","https://openalex.org/W4408780648","https://openalex.org/W4410332501"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4366411693","https://openalex.org/W3211641817","https://openalex.org/W3164717803","https://openalex.org/W4389915954","https://openalex.org/W3123387860","https://openalex.org/W4291291739","https://openalex.org/W2915579847"],"abstract_inverted_index":{"Purpose:":[0],"This":[1,193],"study":[2],"explores":[3],"cryptocurrency":[4,78,123,150,199],"security":[5,37,110,200],"concerns":[6,29,121],"in":[7,59,189,212,236],"the":[8,32,43,61,65,76,93,157],"context":[9],"of":[10,42,63,107,132,154,159],"Saudi":[11,54,240],"Arabia,":[12],"focusing":[13],"on":[14,36],"a":[15,53,129,140,202],"cross\u2010sectional":[16],"survey":[17,84],"to":[18,46,71,229],"assess":[19],"evolving":[20],"technical":[21,109,187,206],"threats":[22],"and":[23,68,100,117,146,173,186,207,225,232],"public":[24,67,120,144],"risk":[25,134],"perceptions.":[26],"While":[27],"regulatory":[28,101],"are":[30],"acknowledged,":[31],"primary":[33],"emphasis":[34],"is":[35],"risks,":[38],"making":[39],"this":[40],"one":[41],"few":[44],"studies":[45],"specifically":[47],"investigate":[48],"digital":[49,165],"asset":[50],"vulnerabilities":[51,188],"from":[52,92,201],"perspective.":[55],"The":[56,103,125,137,215],"novelty":[57],"lies":[58],"bridging":[60],"views":[62],"both":[64],"general":[66,94],"industry":[69],"professionals":[70],"offer":[72,219],"multidimensional":[73],"insights":[74,197],"into":[75,198],"country\u2019s":[77],"environment.":[79],"Methods:":[80],"A":[81],"large\u2010scale":[82],"online":[83],"was":[85],"conducted":[86],"with":[87],"392":[88],"participants,":[89],"including":[90],"individuals":[91],"public,":[95],"IT":[96],"sector,":[97],"banking":[98],"institutions,":[99],"bodies.":[102],"instrument":[104],"captured":[105],"perceptions":[106],"various":[108],"threats\u2014such":[111],"as":[112],"51%":[113],"attacks,":[114],"phishing,":[115],"timejacking,":[116],"double\u2010spending\u2014alongside":[118],"key":[119],"about":[122],"safety.":[124],"mixed\u2010participant":[126],"approach":[127],"enabled":[128],"balanced":[130],"analysis":[131],"cross\u2010sector":[133],"awareness.":[135],"Results:":[136],"findings":[138,218],"indicate":[139],"significant":[141],"disparity":[142],"between":[143],"understanding":[145],"expert":[147],"awareness":[148],"regarding":[149],"security.":[151],"Notably,":[152],"87.3%":[153],"respondents":[155],"support":[156],"idea":[158],"central":[160],"banks":[161],"issuing":[162],"their":[163],"own":[164],"currencies":[166],"(CBDCs),":[167],"reflecting":[168],"widespread":[169],"demand":[170],"for":[171,222],"safer":[172],"more":[174],"regulated":[175],"alternatives.":[176],"Core":[177],"risks":[178],"identified":[179],"include":[180],"token":[181],"theft,":[182],"manipulative":[183],"trading":[184],"behavior,":[185],"decentralized":[190],"platforms.":[191],"Conclusion:":[192],"research":[194],"contributes":[195],"original":[196],"regional":[203],"lens,":[204],"integrating":[205],"perceptual":[208],"dimensions":[209],"often":[210],"overlooked":[211],"existing":[213],"literature.":[214],"study\u2019s":[216],"multistakeholder":[217],"valuable":[220],"input":[221],"policymakers,":[223],"regulators,":[224],"technology":[226],"developers":[227],"seeking":[228],"build":[230],"secure":[231],"trusted":[233],"crypto":[234],"ecosystems":[235],"emerging":[237],"markets":[238],"like":[239],"Arabia.":[241]},"counts_by_year":[],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
