Tag Archives: Cybersecurity

Effects of People’s Mental Models of Cybersecurity on their Security Behaviour (Published)

This research investigates the effects of people’s mental modal of cybersecurity on their security behaviour. Data were collected using survey design and the questions were measured on a Likert five point-scale. The questionnaires were distributed to mainly IT staff, management staff and other staff that uses computers in the discharge of their duties. The data were analysed using percentages, frequencies and statistical methods of regression and ANOVA while Cronbach Alpha reliability coefficient technique was adopted to test the validity of the questions used to collect primary data. The result reveals that people’s prior knowledge of cybersecurity issues has no effect on people’s mental models for improved cybersecurity behaviour, but lack of trained staff (cyber talents), lack of supportive infrastructures, time constraints, exclusion of cybersecurity in non-computing courses, poor knowledge of fundamental computing areas, lack of mentors with hands-on experience, lack of cyber training or challenge programme, and inadequate books on cyber security were admitted by the participants as some of the major factors that inhibit their knowledge and engagement in cybersecurity education. These barriers if not checked could limit the level of cybersecurity awareness among undergraduate students.

Keywords: Cybersecurity, Mental Models., cyberspace, security behaviour

Utilization of Security Techniques for Cyber Warfare: KSA (Published)

Cyber warfare is considered mysterious targets of unknown sources that move through information and communication networks worldwide and use electronic weapons targeting information technology. They are directed against vital installations or invaded by agents of the intelligence services.  Cybersecurity is one of the most significant digital technological breakthroughs that the world is now witnessing. It is considered the first weapon specialized in defending computers, electronic systems, and data from malicious attacks, servers, mobile devices, and networks.  As a result, the goal of this research is to determine how Saudi Arabia uses security approaches for cyber warfare. The study adopted the descriptive method which addressed several aspects related to the strategies and security techniques for cyber warfare. The results indicate that the focus on cyber that pays importance to the possible countermeasures and preventive techniques that could be used to counter the risks of attackers, and discusses the encryption and watermark measures organizations can protect data against the illegal leak and hacking.

Citation: Ohoud S. Al-Harthi, Osama S. Faragallah, and Jehad F.  Al-Amri (2021) Utilization of Security Techniques for Cyber Warfare: KSA, European Journal of Computer Science and Information Technology, Vol.9, No.4, pp.54-72,



Keywords: Cybersecurity, Encryption, cyber warfare, watermark

New Normal Chief Marketing Officer (CMO): Branding Cybersecurity as a Return on Trust Beyond Pandemic? (Published)

The Covid-19 pandemic has changed the business world and Cyberattacks are becoming diversified and sophisticated. With widespread digitally remote-work phenomena and lack of an organization-wide comprehensive Cyber risk strategy, the data protection, trust, and brand reputation are at risk. The purpose of the study is to explore Cybersecurity as a Return on Trust and part of the Chief Marketing Officer (CMO) responsibility as corporations confront the New Normal (NN) opportunities. And does this research offer insight by addressing three main questions? (1) How to address cyber risks from a marketing perspective? (2) How to scale customer trust and best engage with customers without sacrificing sensitive information? (3) How to maximize the role of empathy in an economic downturn while maintaining a brand reputation? This study examined the CMO’s new normal strategy for an extraordinary audience reaches with creativity to re-introduce the brand’s value for all the stakeholders. The results of the study revealed stand-out brand delivery and maintenance of striking motivated employees for competitive advantage requires empathy and innovative marketing plans, shifting channel strategies, budget, and resources while passionately connecting with customers. Findings offer guidance to the CMO’s in cyber risk mitigation for robust business value, customer satisfaction, and the strengthening interconnections with public health, economy, and government. The study concludes that the new normal CMO act as a hub of collaboration to help advance brand delivery preparedness for future disasters by actively responding to customers’ voices and changing behavior for a sustainable future. Key implications for academics, practitioners, and policymakers are discussed.

Keywords: Branding, Chief Marketing Officer, Cybersecurity, Empathy, Trust, new normal

Levels of Corporate Approach to Cybersecurıty in Medıum and Large Enterprıses in Gazıantep (Published)

In this study, the levels of corporate approach to cybersecurity in the context of reducing the risk of cybersecurity have been investigated using survey method in medium and large enterprises in Gaziantep. In this context, as a result of the analysis of the data obtained from 63 enterprises, it has been found out that the enterprises within the scope of the research have a low level of corporate approach to cybersecurity. Also, it has been determined that there are differences in the level of corporate approaches to cybersecurity according to the demographic characteristics of the enterprises covered by the research.

Keywords: Corporate Approach, Cybersecurity, Gazıantep, Medıum and Large Enterprıses