Accès libre

An Argument for Cybersecurity in Saudi Arabia

   | 12 mars 2022
À propos de cet article

Citez

Albanese, C., & Lepido, D. (2018). Middle East Servers Targeted in Cyberattack Against Saipem. Available at: https://www.bloomberg.com/news/articles/2018-12-10/middle-east-servers-targeted-in-cyberattack-against-saipem, accessed on 21 December 2018. Search in Google Scholar

Al-Batati, S., & Gladstone, R. (2018). Saudis claim to intercept 7 missiles fired at cities from Yemen. The New York Times. Available at: https://www.nytimes.com/2018/03/25/world/middleeast/saudi-arabia-yemen-missile-houthi.html, accessed on 11 December 2021. Search in Google Scholar

Al Jazeera. (2021). Saudi forces intercept three ballistic missiles, blame Houthis. Houthis News Al Jazeera. Available at: https://www.aljazeera.com/news/2021/9/5/saudi-forces-intercept-three-ballistic-missiles-blame-houthis, accessed on 17 August 2021. Search in Google Scholar

Bronk, C., & Tikk-Ringas, E. (2013). The cyber attack on Saudi Aramco. Survival, Vol. 55, Issue 2, 81-96.10.1080/00396338.2013.784468 Search in Google Scholar

Cisco. (2018). Cyber security threat and protection report 2018 – Cisco Middle East and Africa. Available at: https://www.cisco.com/c/m/en_qa/campaigns/security/cyber-threats-and-protection-2018-report/index.html, accessed on 08 August 2018. Search in Google Scholar

Dawson, M. (2018). Applying a holistic cybersecurity framework for global IT organizations. Business Information Review, Vol, 35, Issue 2, 60-67.10.1177/0266382118773624 Search in Google Scholar

Haza, R. (2018). Crazy in love: Half of UAE online daters have experienced cyber attacks. Available at: https://www.thenational.ae/uae/crazy-in-love-half-of-uae-online-daters-have-experienced-cyber-attacks-1.704550, accessed on 14 October 2018. Search in Google Scholar

Ivanova, I. (2018). Saudi Arabia is America’s No. 1 weapons customer. Available at: https://www.cbsnews.com/news/saudi-arabia-is-the-top-buyer-of-u-s-weapons/, accessed on 20 December 2018. Search in Google Scholar

Jewkes, S. (2018). Saipem says Shamoon variant crippled hundreds of computers. Available at: https://www.reuters.com/article/us-cyber-shamoon/saipem-says-shamoon-variant-crippled-hundreds-of-computers-idUSKBN1OB2FA, accessed on 17 December 2018. Search in Google Scholar

Madrigal, A.C. (2018). When Is a Meme a Foreign-Influence Operation? Available at: https://www.theatlantic.com/technology/archive/2018/12/how-russian-operatives-targeted-black-americans/578437/, accessed on 20 December 2018. Search in Google Scholar

Miller, B., & Rowe, D. (2012, October). A survey SCADA of and critical infrastructure incidents. Proceedings of the 1st Annual conference on Research in information technology (pp. 51-56), ACM.10.1145/2380790.2380805 Search in Google Scholar

Ministry of Cabinet Affairs and the Future. (n.d.). His Excellency Omar bin Sultan Al Olama. Available at: https://www.mocaf.gov.ae/en/about/our-leadership/his-excellency-omar-bin-sultan-al-olama, accessed on 20 December 2018. Search in Google Scholar

Ottis, R. (2008). Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. Proceedings of the 7th European Conference on Information Warfare (p. 163). Search in Google Scholar

Swaine, J. (2018). Russian propagandists targeted African Americans to influence 2016 US election. Available at: https://www.theguardian.com/us-news/2018/dec/17/russian-propagandists-targeted-african-americans-2016-election, accessed on 20 December 2018. Search in Google Scholar

Zarour, M., Alenezi, M., Dawson, M., & Alsmadi, I. (2020). Toward Effective Cybersecurity Education in Saudi Arabia. 17th International Conference on Information Technology – New Generations (ITNG 2020) (pp. 79-85). Cham: Springer. Search in Google Scholar