A SYSTEMATIC LITERATURE REVIEW ON THE CYBERSECURITY GAPS IN SAUDI CURRICULUM THAT AFFECT THE BANKING SECTOR.

Authors

  • Dr Renu Mishra
  • Antoine H. Hanna

Keywords:

Cybersecurity, Awareness, Banking Sector, Higher Education, Curriculum, Vision2030, Systems Security, Artificial Intelligence, Systematic Literature Review

Abstract

The accessibility of top-notch cybersecurity education directly impacts knowledge of potential hazards from cyberattacks, which could raise awareness among bank employees and account holders when utilising bank applications and portals. This paper outlines a systematic literature review (SLR) of peer-reviewed conference and journal articles published from 2005 to 2022. It focuses on the role of Saudi Arabia's Vision 2030 in enhancing the educational system, the high demand for cybersecurity experts due to the country's economic transformation, and the role of universities in raising cybersecurity awareness before identifying gaps in existing research. Eighty- seven documents discussing cybersecurity in the Kingdom were found after four digital libraries were checked. The findings show that additional survey research is required to establish a theoretical knowledge of higher education's contribution to addressing cybersecurity issues in the banking industry. The three primary variables of this research (cybersecurity, education, banks) developed in this paper can serve as a guide for researchers and bank managers.

Downloads

Download data is not yet available.

References

Alghazo, J.M., Kazmi, Z. and Latif, G. (2017). Cyber security analysis of internet banking in emerging countries: User and bank perspectives. [online] IEEE Xplore. doi:10.1109

/ICETAS.2017.8277910.

Aljeaid, D., Alzhrani, A., Alrougi, M. and Almalki, O. (2020). Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks. Information, 11(12), p.547. doi:10.3390/info11120547.

Aljohni, W., Elfadil, N., Jarajreh, M. and Gasmelsied, M. (2021). Cybersecurity Awareness Level: The Case of Saudi Arabia University Students. International Journal of Advanced Computer Science and Applications, 12(3). doi:10.14569/ijacsa.2021.0120334.

Aljuryyed, A. (2022). Cybersecurity Issues in the Middle East. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security, pp.62–82. doi:10.4018/978-1- 7998- 8693-8.ch004.

Allmnakrah, A. and Evers, C. (2019). The need for a fundamental shift in the Saudi education

system: Implementing the Saudi Arabian economic vision 2030. Research in education, p.003452371985153. doi:10.1177/0034523719851534.

Alqurashi, R.K. (2020). Cyber Attacks and Impacts: A Case Study in Saudi Arabia. InternationalJournal of Advanced Trends in Computer Science and Engineering, 9(1), pp.217– 224. doi:10.30534/ijatcse/2020/33912020.

Benson, V. (2017). The state of global cybersecurity: Highlights and key findings. [online] Available at: https://www.researchgate.net/publication/318310907_THE_STATE_OF_GLOBAL_CY BER_SECURITY_HIGHLIGHTS_AND_KEY_FINDINGS. [Accessed 3 Dec. 2022].

Cybersecurity Guide. (2021). Cybersecurity in the financial services industry. [online] Availableat: https://cybersecurityguide.org/industries/financial/. [Accessed 4 Dec. 2022].

D. Alshrari, A., Hassan Omer, W.K. and Salmen Aljaaidi, K. (2021). Saudi Arabian 2030 Visionand Entrepreneurial Intention Among University Students. AD-minister, (38), pp.43–62. doi:10.17230/ad-minister.38.2.

Alzubaidi, A. (2021). Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Heliyon, 7(1), p.e06016. doi:10.1016/j.heliyon.2021.e06016.

Bauer, S., Bernroider, E.W.N. and Chudzikowski, K. (2017). Prevention is better than cure!

Designing information security awareness programs to overcome users' non-compliance with information security policies in banks. Computers & Security, 68, pp.145–159. doi:10.1016/j.cose.2017.04.009.

Chaudhry, A.F., Aniol, H. and Shegos, C.J. (2020). [online] Available at: https://www.consultant360.com/article/consultant360/congenital-hypothyroidism-due- thyroid- agenesis. Consultant. doi:10.25270/con.2020.05.00011. [Accessed 3 Nov. 2022].

Dawson, M. (2022). An Argument for Cybersecurity in Saudi Arabia. Land Forces Academy Review, 27(1), pp.78–83. doi:10.2478/raft-2022-0011.

Devi, A. (2021). Saudi Arabia ranks No. 2 globally in its commitment to cybersecurity. [online] Security MEA Available at: https://securitymea.com/2021/06/30/saudi-arabia-ranks-no- 2- globally-in-its-commitment-to-cybersecurity/ [Accessed 10 Dec. 2022].

Elnaim, B.M. and Al-Lami, H.A.S.Wsmi. (2017). The Current State of Phishing Attacks against Saudi Arabia University Students. International Journal of Computer Applications Technology and Research, 6(1), pp.042–050. doi:10.7753/ijcatr0601.1008.

Flowerday, S. and von Solms, R. (2005). Real-time information integrity=system integrity+data integrity+continuous assurances. Computers & Security, 24(8), pp.604–613. doi:10.1016/j.cose.2005.08.004.

Garba, A., Jeribi, F., Al-Shourbaji, I., Alhameed, M., Reegu, F. and Alim, S. (2021). An Approach To Weigh Cybersecurity Awareness Questions In Academic Institutions Based On Principle Component Analysis: A Case Study Of Saudi Arabia. [online] Available at: http://www.ijstr.org/final-print/apr2021/An-Approach-To-Weigh-Cybersecurity- Awareness- Questions-In-Academic-Institutions-Based-On-Principle-Component- Analysis-A-Case-Study- Of-Saudi-Arabia.pdf [Accessed 9 Oct. 2022].

Goo, J., Yim, M.-S. and Kim, D.J. (2014). A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate. IEEE Transactions on Professional Communication, 57(4), pp.286–308. doi:10.1109/tpc.2014.2374011.

Halse, L. (2021). New Law In Saudi Arabia To Require Regional Headquarters For International Companies. Government Contracts, Procurement & PPP - Saudi Arabia.[online] Available at: https://www.mondaq.com/saudiarabia/government-contracts-procurement- ppp/1041884/new-law-in-saudi-arabia-to-require-regional-headquarters-for- international-companies [Accessed 22 May. 2022].

HKA. (2021). The Growth and Development of Saudi Arabia's Cybersecurity Landscape. [online] Available at: https://www.hka.com/the-growth-and-development-of-saudi- arabias- cybersecurity-landscape/. [Accessed 2 Dec. 2022].

Kosárová, D. (2020). Saudi Arabia's Vision 2030. [online] Available at: https://www.researchgate.net/publication/346531524_SAUDI_ARABIA'S_VISION_203 [Accessed 14 July. 2022].

Kumar, N. (2018). The skills gap exacerbates the cybersecurity problem as the Middle East faces threats. [online] Avai;able at https://thearabweekly.com/skills-gap-exacerbates- cybersecurity-problem-middle-east-faces-threats [Accessed 31 May. 2022].

Latifi, S. (2020). 17th International Conference on Information Technology–New Generations (ITNG 2020). [online] Google Books. Springer International Publishing. Available at: https://books.google.dk/books/about/17th_International_Conference_on_Informa.html?id

=saRTzQEACAAJ&hl=en & output=html_ text & redir_ esc=y [Accessed 10 Dec. 2022]. Levite, A.E., Kannry, S. and Hoffman, W. (2018). The Role of the Cyber Insurance Industry.

[online] JSTOR. Available at: http://www.jstor.org/stable/resrep20984.6 [Accessed 10 Dec. 2022].

Lynch, K. (2021). Council Post: Cybersecurity Is A Global Problem, So Where's The Global Response? [online] Forbes. Available at: https://www.forbes.com/sites/forbestechcouncil/2021/05/20/cybersecurity-is-a-global- problem- so-wheres-the-global-response/?sh=3e26bbfb5e41 [Accessed 10 Dec. 2022].

Makhlouf, A. (2021). Saudi Schools' Openness to Change in Light of the 2030 Vision.

AmericanJournal of Educational Research, 9(1), pp.52–60. doi:10.12691/education-9-1-6.

Malek, C.(2019). Saudi Arabia's war against hackers. [online] Available at: https://www.arabnews.com/node/1483661/saudi-arabia. [Accessed 17 Feb. 2022].

Mirghani, T.M. (2020). The Growing Demand for Education in Saudi Arabia: How Effective Is Borrowing Educational Models from the West? Journal of Education and Learning, 9(6),p.59. doi:10.5539/jel.v9n6p59.

Nahas, P. (2022) DIGITALISATION IMPACTS ON INDIVIDUAL AND ORGANISATIONAL BEHAVIORS IN FACTORIES: HOW DO GENERATIONAL APPROACH AND MANAGERIAL SUPPORT MEDIATE THE CHANGE'S SUCCESS? [online] Available

at: http://www.iseor-formations.com/pdf/ACTESCOLMCD2021/NAHAS.pdf [Accessed 10 Dec. 2022].

O'Connell, E.A. (2021). Revitalising Language through Education: Ireland's Use of International Law to Drive Linguistic Preservation. DePaul Journal of Art, Technology and Intellectual Property Law, [online] 31, p.68. Available at: https://heinonline.org/HOL/LandingPage?handle=hein.journals/dael31&div=3&id=&pag e= [Accessed 10 Dec. 2022].

Olech, A. (2021). Cybersecurity in Saudi Arabia. Retrieved July 14, 2022, [online] Available at:https://ine.org.pl/en/cybersecurity-in-saudi-arabia/.[Accessed 14 Jul. 2022].

Quadri, A., & Khan, M. (2019). Cybersecurity challenges of the Kingdom of Saudi Arabia. [online] Available at: https://www.researchgate.net/publication/331009167_CYBERSECURITY_CHALLENG ES_OF_THE_KINGDOM_OF_SAUDI_ARABIA [Accessed 10 Dec. 2022].

Riegger, A.-S., Klein, J.F., Merfeld, K. and Henkel, S. (2021). Technology-enabled personalisation in retail stores: Understanding drivers and barriers. Journal of Business Research, [online] 123, pp.140–155. doi:10.1016/j.jbusres.2020.09.039.

Saudigazette. (2022). SAMA seeks proactive steps to confront growing cyber threats. [online] Available at: https://saudigazette.com.sa/article/620722 [Accessed 10 Dec. 2022].

Seemma, P., Nandhini, S., & Sowmiya, M. (2018). Overview of Cybersecurity. PEARCE, 7(11),125-128. doi:10.17148/ijarcce.2018.71127

Singh, H.P. and Alshammari, T.S. (2020). An Institutional Theory Perspective on Developing a Cyber Security Legal Framework: A Case of Saudi Arabia. Beijing Law Review, 11(03), pp.637–650. doi:10.4236/blr.2020.113039.

Slavchev, V. (2021). Using Cyber Ranges in Cybersecurity Management Educational Programmes. Information & Security: An International Journal, 50, pp.161–168. doi:10.1 1610/isij.5007.

Tsakanyan, V.T. (2017). The role of cybersecurity in world politics. Vestnik RUDN. International Relations, [online] 17(2), pp.339–348. doi:10.22363/2313-0660-2017-17-2- 339- 348.

Venter, I.M., Blignaut, R.J., Renaud, K. and Venter, M.A. (2019). Cyber security education is asessential as 'the three R's'. Heliyon, 5(12), p.e02855. doi:10.1016/j.heliyon.2019.e02855.

Woishi, W. (2019). THE IMPACT OF DIGITISATION ON THE ECONOMY OF KSA IN THE

CONTEXT OF VISION 2030. International Journal of Engineering Applied Sciences and Technology, 04(04), pp.312–316. doi:10.33564/ijeast.2019.v04i04.051.

Yang, J. (2022). Importance of Security in the digital world. [online] Available at https://techpresident.com/importance-of-security-in-digital-world/.[Accessed 14 Jul. 2022].

ZATCA Report and Plans (2017). E-Invoicing. [online] Available at: https://zatca.gov.sa/en/E-invoicing/Pages/default.aspx [Accessed 10 Dec. 2022].

Downloads

Published

2023-09-30

How to Cite

Mishra, D. R. ., & Hanna, A. H. . (2023). A SYSTEMATIC LITERATURE REVIEW ON THE CYBERSECURITY GAPS IN SAUDI CURRICULUM THAT AFFECT THE BANKING SECTOR. The Journal of Contemporary Issues in Business and Government, 29(3), 468–490. Retrieved from https://cibgp.com/au/index.php/1323-6903/article/view/2609