Information Assurance in Saudi Organizations – An Empirical Study
This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent gro...
Saved in:
Published in | Security Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 18 - 28 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Berlin / Heidelberg
2010
Springer Berlin Heidelberg |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 1865-0937 |
DOI | 10.1007/978-3-642-17610-4_3 |
Cover
Abstract | This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent ground realities. The survey covered technical aspects of information security, risk management and information assurance management. The results provide deep insights in to the existing level of information assurance in various sectors that can be helpful in better understanding the intricate details of the prevalent information security in the Kingdom. Also, the results can be very useful for information assurance policy makers in the government as well as private sector organizations. There are few empirical studies on information assurance governance available in literature, especially about the Middle East and Saudi Arabia, therefore, the results are invaluable for information security researchers in improving the understanding of information assurance in this region and the Kingdom. |
---|---|
AbstractList | This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent ground realities. The survey covered technical aspects of information security, risk management and information assurance management. The results provide deep insights in to the existing level of information assurance in various sectors that can be helpful in better understanding the intricate details of the prevalent information security in the Kingdom. Also, the results can be very useful for information assurance policy makers in the government as well as private sector organizations. There are few empirical studies on information assurance governance available in literature, especially about the Middle East and Saudi Arabia, therefore, the results are invaluable for information security researchers in improving the understanding of information assurance in this region and the Kingdom. |
Author | Nabi, Syed Irfan Mirza, Abdulrahman A. Alghathbar, Khaled |
Author_xml | – sequence: 1 givenname: Syed Irfan surname: Nabi fullname: Nabi, Syed Irfan email: syedirfan@ksu.edu.sa organization: Faculty of Computer Sciences, Institute of Business Administration, Karachi, Pakistan – sequence: 2 givenname: Abdulrahman A. surname: Mirza fullname: Mirza, Abdulrahman A. email: amirza@ksu.edu.sa organization: Department of Information Systems, College of Computer and Information Science, King Saud University, Saudi Arabia – sequence: 3 givenname: Khaled surname: Alghathbar fullname: Alghathbar, Khaled email: kalghathbar@ksu.edu.sa organization: Department of Information Systems, College of Computer and Information Science, King Saud University, Saudi Arabia |
BookMark | eNo9kE1OwzAQRg0URFt6Aja5QGAcx-N4WVUFKlXqorC2nMQpgdYJdrKAFXfghpwE90dYI1n6nr7R6I3IwDbWEHJL4Y4CiHspspjFmCYxFUghThU7I5OQspAdovScDGmGPAbJxAUZnQBIMfgHibwiQwxcyCyT12Ti_RuEl6YoUAzJbGGrxu10Vzc2mnrfO20LE9U2Wuu-rKOV22hbfx24j36_f6Kpjea7tnZ1obfRuuvLzxtyWemtN5PTPyYvD_Pn2VO8XD0uZtNl3FLOWVzmvCgzZCglYxXNC1OBqcJtyERW5KABeIEctU6R5VRChTQBjpCA5LJENib0uNe3rrYb41TeNO9eUVB7Yyq4UUwFCeqgRwVjoZMcO61rPnrjO2X2pcLYzult8arbzjivGCBSQVUSJmN_7ElqfQ |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2010 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 |
DBID | FFUUA |
DOI | 10.1007/978-3-642-17610-4_3 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783642176104 3642176100 |
EISSN | 1865-0937 |
Editor | Fang, Wai-Chi Kang, Heau-jo Arnett, Kirk P Khurram Khan, Muhammad Ślęzak, Dominik |
Editor_xml | – sequence: 1 fullname: Fang, Wai-Chi – sequence: 2 fullname: Ślęzak, Dominik – sequence: 3 fullname: Kang, Heau-jo – sequence: 4 fullname: Arnett, Kirk P – sequence: 5 fullname: Khurram Khan, Muhammad |
EndPage | 28 |
ExternalDocumentID | EBC3066171_21_28 |
GroupedDBID | -T. 089 0D6 0DA 20A 38. 4UP 4V3 9-X A4J AABBV ABBVZ ABMKK ABMNI ACDPG ACZTO ADVHH AEJLV AEKFX AEOKE AETDV AEZAY AHSMR ALMA_UNASSIGNED_HOLDINGS AZZ BBABE CZZ FFUUA I4C IEZ JJU MA. MYL SBO SNUHX TBMHI TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 29F RSU |
ID | FETCH-LOGICAL-p1553-db5cd86369933f1bcef0ef6936378cb0a005c656aa463b190f612056020959d63 |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 |
IngestDate | Tue Jul 29 19:59:24 EDT 2025 Wed May 28 23:38:58 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum | QA75.5-76.95 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1553-db5cd86369933f1bcef0ef6936378cb0a005c656aa463b190f612056020959d63 |
OCLC | 693779889 |
PQID | EBC3066171_21_28 |
PageCount | 11 |
ParticipantIDs | springer_books_10_1007_978_3_642_17610_4_3 proquest_ebookcentralchapters_3066171_21_28 |
PublicationCentury | 2000 |
PublicationDate | 2010 |
PublicationDateYYYYMMDD | 2010-01-01 |
PublicationDate_xml | – year: 2010 text: 2010 |
PublicationDecade | 2010 |
PublicationPlace | Germany |
PublicationPlace_xml | – name: Germany – name: Berlin, Heidelberg |
PublicationSeriesTitle | Communications in Computer and Information Science |
PublicationSubtitle | International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings |
PublicationTitle | Security Technology, Disaster Recovery and Business Continuity |
PublicationYear | 2010 |
Publisher | Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
SSID | ssj0000446767 ssj0000580895 ssib054953581 |
Score | 1.3561349 |
Snippet | This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 18 |
SubjectTerms | empirical study governance Information Assurance policy |
Title | Information Assurance in Saudi Organizations – An Empirical Study |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066171&ppg=28 http://link.springer.com/10.1007/978-3-642-17610-4_3 |
Volume | 122 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELWgLMAAFBDf8sBEFdTWxklHqIoQQix8qJsVO7GUgYBoO8DEf-Af8ku4cxw3KV2KVEVV1KTWPedyPt97R8hp0omSiBsWhBG2MDMwjWMR64CzbqRZWyVwGVZb3IubJ347vBiWHbIdu2SszvXnXF7Jf1CFc4ArsmQXQNbfFE7Ad8AXjoAwHGeC33qateBwuM5zley4dSDZKEbxAwwIsTyz0Ffy9e2oRpXlk2z8UZ0sjpRk5wIANnm3RIIMHv14kmR1wmarrI9gmFEcvLxlhcrIgxeqdUkEW4tWTSKUScSW09hCxfR5OluW88FhFSPaRe9o70MLcvEff1wtwYALUY4S_pxLNn39lFvujiNeF78eXPVhTQNRVkd24RMtk-Uw4g2ycjm4vXv2yTTclQ4F9l_0wwsLdaXpcL3kVKEqPDOe2gJjZk_chhqPm2Qd6ScUeSEwxC2ylOZNslE236DOFzfJWkVJcpv0KwhSjyDNcmoRpDUE6c_XN73MqceOWux2yNP14LF_E7j-GMEbdnsKEoXKDoIJiDGZ6SidmnZqRI8JFkZatWPwsBri9TjmgimI_AyEsxDwwgqhd9FLBNsljfw1T_cIVUIo9M1pVytuhIohqksM59oYWAMYtU9apXmk3cV3pcO6MMZI1lDaJ2elBSX-eCRLcWywvGQSLC-t5SVY_mChWx-S1en8PSKN8fskPYawcKxO3KT4BZ3_XmE |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+Technology%2C+Disaster+Recovery+and+Business+Continuity&rft.atitle=Information+Assurance+in+Saudi+Organizations+%E2%80%93+An+Empirical+Study&rft.date=2010-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642176098&rft.volume=122&rft_id=info:doi/10.1007%2F978-3-642-17610-4_3&rft.externalDBID=28&rft.externalDocID=EBC3066171_21_28 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066171-l.jpg |