{"id":"https://openalex.org/W2588230023","doi":"https://doi.org/10.1109/icitst.2016.7856687","title":"A survey of cyber-security awareness in Saudi Arabia","display_name":"A survey of cyber-security awareness in Saudi Arabia","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2588230023","doi":"https://doi.org/10.1109/icitst.2016.7856687","mag":"2588230023"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2016.7856687","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.ecu.edu.au/ecuworkspost2013/2983","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110524629","display_name":"Faisal Alotaibi","orcid":null},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Faisal Alotaibi","raw_affiliation_strings":["Communications and Network Research, Plymouth University, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Communications and Network Research, Plymouth University, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033160778","display_name":"Steven Furnell","orcid":"https://orcid.org/0000-0003-0984-7542"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]},{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]},{"id":"https://openalex.org/I99712911","display_name":"Nelson Mandela University","ror":"https://ror.org/03r1jm528","country_code":"ZA","type":"education","lineage":["https://openalex.org/I99712911"]}],"countries":["AU","GB","ZA"],"is_corresponding":false,"raw_author_name":"Steven Furnell","raw_affiliation_strings":["Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa","Communications and Network Research, Plymouth University, Plymouth, UK","Security Research Institute, Edith Cowan University, Perth, Western Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Research in Information and Cyber Security, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa","institution_ids":["https://openalex.org/I99712911"]},{"raw_affiliation_string":"Communications and Network Research, Plymouth University, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]},{"raw_affiliation_string":"Security Research Institute, Edith Cowan University, Perth, Western Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032961897","display_name":"Ingo Stengel","orcid":null},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ingo Stengel","raw_affiliation_strings":["University of Plymouth, Plymouth, Devon, GB"],"affiliations":[{"raw_affiliation_string":"University of Plymouth, Plymouth, Devon, GB","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021254494","display_name":"Maria Papadaki","orcid":"https://orcid.org/0000-0003-0817-2651"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maria Papadaki","raw_affiliation_strings":["Communications and Network Research, Plymouth University, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Communications and Network Research, Plymouth University, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110524629"],"corresponding_institution_ids":["https://openalex.org/I897542642"],"apc_list":null,"apc_paid":null,"fwci":4.1572,"has_fulltext":false,"cited_by_count":52,"citation_normalized_percentile":{"value":0.94899655,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"2016","issue":null,"first_page":"154","last_page":"158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.836297869682312},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.71787428855896},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5795654058456421},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.5724042057991028},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5616503953933716},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5092712640762329},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4786306917667389},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.47851860523223877},{"id":"https://openalex.org/keywords/information-and-communications-technology","display_name":"Information and Communications Technology","score":0.47314226627349854},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4642520546913147},{"id":"https://openalex.org/keywords/globe","display_name":"Globe","score":0.46109047532081604},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.4327073097229004},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3164181709289551},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17509493231773376},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07822448015213013}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.836297869682312},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.71787428855896},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5795654058456421},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5724042057991028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5616503953933716},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5092712640762329},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4786306917667389},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.47851860523223877},{"id":"https://openalex.org/C67363961","wikidata":"https://www.wikidata.org/wiki/Q5268834","display_name":"Information and Communications Technology","level":2,"score":0.47314226627349854},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4642520546913147},{"id":"https://openalex.org/C2775899829","wikidata":"https://www.wikidata.org/wiki/Q3109007","display_name":"Globe","level":2,"score":0.46109047532081604},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.4327073097229004},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3164181709289551},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17509493231773376},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07822448015213013},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icitst.2016.7856687","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-3980","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/2983","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},{"id":"mag:2752636881","is_oa":false,"landing_page_url":"http://jglobal.jst.go.jp/en/public/201702243102735431","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-3980","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/2983","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"},"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1980741066","https://openalex.org/W2068131725","https://openalex.org/W2152190235"],"related_works":["https://openalex.org/W185442532","https://openalex.org/W2966027630","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W2908868772","https://openalex.org/W4304943319","https://openalex.org/W2166222264","https://openalex.org/W2544387082","https://openalex.org/W2968709340","https://openalex.org/W2099222119"],"abstract_inverted_index":{"Rapid":[0],"development":[1],"has":[2,80],"been":[3],"observed":[4],"in":[5,31,51,63,83,112,125,146,180,199,228,278,299,302],"the":[6,12,15,18,23,37,42,46,59,64,68,75,92,100,110,113,118,123,154,165,174,185,200,205,215,229,259,271,279,300],"deployment":[7],"of":[8,14,26,28,39,58,70,122,160,164,176],"communication":[9,71],"technologies":[10,30,72,79,87,105],"and":[11,48,77,173,178,235,262,270],"use":[13,27],"Internet":[16,43,76,249],"across":[17,184],"globe.":[19],"Information":[20],"exchange":[21],"is":[22,56,187,213,220,264,286],"main":[24],"aspect":[25],"such":[29,73],"everyday":[32],"life.":[33],"Crimes":[34],"associated":[35,102,167],"with":[36,103,168],"misuse":[38],"information":[40,140,182,237],"on":[41,45,214,238,254],"are":[44,49,88],"increase":[47,224],"resulting":[50],"various":[52],"losses.":[53],"Saudi":[54,126,147],"Arabia":[55,127],"one":[57],"fastest":[60],"developing":[61],"countries":[62],"Middle":[65],"East,":[66],"where":[67],"uptake":[69],"as":[74],"mobile":[78],"risen":[81],"sharply":[82],"recent":[84],"years.":[85],"These":[86],"relatively":[89],"new":[90,108],"to":[91,96,109,138,142,194,223,290,294,304],"region":[93,201,230,301],"when":[94],"compared":[95],"developed":[97],"countries.":[98],"Therefore,":[99],"crimes":[101],"these":[104],"may":[106],"be":[107],"people":[111,124],"region.":[114,280],"This":[115],"paper":[116],"investigates":[117],"cyber":[119,143,170,196,225,255,296],"security":[120,144,171,197,226,256,272,297],"awareness":[121,145,163,198,227,298],"within":[128],"different":[129],"contexts.":[130],"A":[131],"quantitative":[132],"online":[133,236],"based":[134,192],"survey":[135],"was":[136,202],"conducted":[137],"gather":[139],"related":[141],"Arabia.":[148],"The":[149,207,281],"study":[150,282],"found":[151,283],"that,":[152,210],"although":[153,211],"participants":[155],"had":[156],"a":[157,292],"good":[158],"knowledge":[159],"IT,":[161],"their":[162],"threats":[166],"cybercrime,":[169],"practices,":[172],"role":[175],"government":[177,239],"organisations":[179,277],"ensuring":[181],"safety":[183],"Internet,":[186],"very":[188],"limited.":[189],"An":[190],"application":[191],"model":[193,293],"create":[195,295],"preferred":[203],"by":[204,276],"majority.":[206],"results":[208,244],"indicated":[209,247],"cybercrime":[212],"rise,":[216],"no":[217],"specific":[218],"approach":[219],"being":[221,274],"followed":[222],"except":[231],"for":[232],"CERT":[233],"regulations":[234],"websites.":[240],"Additionally,":[241],"Chi-Square":[242],"test":[243],"(t(627)=3.85,":[245],"p=0.013)":[246],"that":[248,284],"skills":[250],"have":[251],"an":[252,265,287],"effect":[253],"practices":[257],"from":[258],"users'":[260],"end":[261],"there":[263,285],"association":[266],"between":[267],"skill":[268],"level":[269],"measures":[273],"implemented":[275],"immediate":[288],"need":[289],"develop":[291],"order":[303],"combat":[305],"cybercrime.":[306]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
