-
A. Alzubaidi, Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia, Heliyon, Vol. 7, 1st edition, 2021
-
Aksoy, C. (2023). Are critical success factors for cybersecurity just technical issues? Cybersecurity management and the human factor. Research Journal of Business and Management, 10(2), 51-57. https://doi.org/10.17261/Pressacademia.2023.1735
-
Alam, R. G., & Ibrahim, H. (2021). Cybersecurity implementation success factors in smart city. Journal of Theoretical and Applied Information Technology, 99(13), 3353-3362.
-
Albediwi, M. R., & Sadaf, K. (2023). A framework for cybersecurity awareness in Saudi Arabia. Journal of Engineering and Applied Sciences, 10(1).
-
Albuhayri, W. (2019). The future of electronic terrorism: challenges and methods of confrontation. International Center for Future and Strategic Studies: Cairo.
-
Alhakami, W. (2024). Enhancing cybersecurity competency in the Kingdom of Saudi Arabia: A fuzzy decision-making approach. Uncertain Supply Chain Management.
-
Al-Harbi, F. E. (2018). Cyber terrorism. Riyadh.
-
Aljabri, S. (2021). Cybersecurity awareness in Saudi Arabia. International Journal of Research Publication and Reviews, 2(2), 320-330.
-
Alsemairi, S. S. (2023). Factors influencing employees on compliance with cybersecurity policies and their implications for protection of information and technology assets in Saudi Arabia. Intelligent Information Management, 15, 259-283. https://doi.org/10.4236/iim.2023.154013
-
Al-Zabn, Badra Huimel. (2012). Terrorism in cyberspace. Jordan: Amman University.
-
Ani, U.D., He, H., & Tiwari, A. (2019). Human factor security: Evaluating the cybersecurity capacity of the industrial workforce. J. Sys. Info. Technol., 21, 2–35.
-
Antonakakis, N., et al. (2017). Understanding the Mirai botnet. In Proceedings of the 26th USENIX Security Symposium (pp. 1093-1110).
-
Brezavšček, A., & Baggia, A. (2025). Recent trends in information and cyber security maturity assessment: A systematic literature review. Systems, 13(1), 52. https://doi.org/10.3390/systems13010052
-
Buller, A. (2020). Saudi Arabia sees cyber security boom as coronavirus bites. Computer Weekly. Retrieved from https://www.computerweekly.com
-
CISA. (2021). Cybersecurity and Infrastructure Security Agency Strategic Plan 2021-2025. CISA.
-
CST. (2023). What is Cybersecurity? Retrieved from Communications, Space & Technology Commission: https://www.cst.gov.sa/en/Digitalknowledge/Pages/cyber-security.aspx
-
Dawson, M. (2021). An argument for cybersecurity in Saudi Arabia. International Journal of Cyber Criminology, 17(1), 40.
-
Global Cybersecurity Outlook 2025: Insight Report. (2025). World Economic Forum.
-
Hameed, F., Agrafiotis, I., Weisser, C., Goldsmith, M., & Creese, S. (2023). Analysing trends and success factors of international cybersecurity capacity-building initiatives. International Journal of Reliability, Risk, and Safety: Theory and Application, 6(1), 63-69. https://doi.org/10.22034/IJRRS.2023.6.1.7
-
Karjalainen, M., & Ojala, A. L. (2023). Authentic learning environment for in-service trainings of cyber security: a qualitative study. International Journal of Continuing Engineering Education and Life-Long Learning, 1(1), 1. https://doi.org/10.1504/ijceell.2023.10041126
-
Kazemi, A., Heydari, S. (2023). Ranking of factors affecting cybersecurity. International Journal of Reliability, Risk, and Safety: Theory and Application, 6(1), 63-69. https://doi.org/10.22034/IJRRS.2023.6.1.7
-
Klimoski, R. (2016). Critical success factors for cyber security leaders: Not just technical competence. People Strategy, 39, 14–18.
-
Kuusisto, R., & Kuusisto, T. (2013). Strategic Communication for Cyber-security Leadership. Journal of Information Warfare, 12(3), 41–48. Retrieved from: https://www.jstor.org/stable/26486840
-
Lehto, M., & Limnell, J. (2020). Strategic Leadership in Cyber Security, Case Finland. Information Security Journal: A Global Perspective, 30, 1-10.
https://doi.org/10.1080/19393555.2020.1813851.
-
National Cybersecurity Authority (NCA). (2025). National Cybersecurity Strategy (Overview). Kingdom of Saudi Arabia.
-
National Institute of Standards and Technology (NIST) (2018). Framework for Improving Critical Infrastructure Cybersecurity Version 1.1. NIST. Retrieved from https://www.nist.gov/publications/framework-improving-critical-infrastructure-cybersecurity-version-11
-
NCA. (2019). Critical Systems Cybersecurity Controls (CSCC - 1: 2019). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2019). Cybersecurity Guidelines for e-Commerce (CGEC – 1: 2019). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2020). The National Cryptographic Standards (NCS – 1: 2020). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2020). The Saudi Cybersecurity Higher Education Framework (SCyber-Edu – 1: 2020). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2020). The Saudi Cybersecurity Workforce Framework (SCyWF - 1: 2020). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2020). National Cybersecurity Strategy. Kingdom of Saudi Arabia.
-
NCA. (2021). Organizations’ Social Media Accounts Cybersecurity Controls (OSMACC -1:2021). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2021). Telework Cybersecurity Controls (TCC -1: 2021). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2022). Data Cybersecurity Controls (DCC -1:2022). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2022). Operational Technology Cybersecurity Controls (OTCC -1: 2022). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2024). Essential Systems Cybersecurity Controls (ECC – 2: 2024). National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
NCA. (2024). Report on key economic indicators in the cybersecurity sector of 2024. National Cybersecurity Authority, Kingdom of Saudi Arabia.
-
Noor, A. F. M., Moghavvemi, S., & Tajudeen, F. P. (2024). Factors affecting cybersecurity readiness from dynamic capabilities perspective: A thematic review. Journal of Theoretical and Applied Information Technology, 14(4), 23970. https://doi.org/10.6007/IJARAFMS/v14-i4/23970
-
Okdem, S., & Okdem, S. (2024). Artificial Intelligence in Cybersecurity: A Review and a Case Study. Applied Sciences, 14(22), 10487. https://doi.org/10.3390/app142210487
-
Olech, A. (2021). Cybersecurity in Saudi Arabia. Institute of New Europe.
-
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management, 9(12), 669-710. DOI: 10.18535/ijsrm/v9i12.ec04
-
Quadri, A., & Khan, M. K. (2019). Cybersecurity challenges of the Kingdom of Saudi Arabia: Past, Present and Future. Global Foundation for Cyber Studies and Research.
-
Ryttare, E. (2019). Change management: A key in achieving successful cybersecurity. A multiple case study of organizations in Sweden. Luleå University of Technology.
-
Saleh, T., Kanaan, R., Alzubaidi, R., Kanaand, G. G., & Nino, M. (2025). Factors affecting cybersecurity awareness: A qualitative study in Saudi Arabia. Uncertain Supply Chain Management, 13(2025), 751–762. https://doi.org/10.5267/j.uscm.2024.12.005
-
Salem, A. H., Azzam, S. M., Emam, O. E., & Abohany, A. A. (2024). Advancing cybersecurity: a comprehensive review of AI-driven detection techniques. Journal of Big Data, 11, Article 105.
-
Saudi Government. (2025). Cybersecurity in the Kingdom. Retrieved from Saudi Government website https://my.gov.sa/en/content/cybersecurity
-
Saudi Press Agency. (2024). Saudi Arabia Tops Global Cybersecurity Rankings. Retrieved from https://www.spa.gov.sa/en/N2125487
-
Saudi Press Agency. (2024, October 15). Saudi Arabia affirms commitment to global economic stability. Saudi Press Agency. https://www.spa.gov.sa/en/N2125487
-
Williams, P. A. (2019). Cybersecurity: A comprehensive overview for directors and executives. Wiley.
-
Yeoh, W., Liu, M., Shore, M., & Jiang, F. (2023). Zero trust cybersecurity: Critical success factors and a maturity assessment framework. Deakin University, Centre for Cyber Resilience and Trust.
-
Yeoh, W., Wang, S., Popovič, A., & Chowdhury, N. H. (2022). A systematic synthesis of critical success factors for cybersecurity. Computers and Security, 118(July), 1-17. https://doi.org/10.1016/j.cose.2022.102724
-
Jones, A. (2015). Cybersecurity: Protecting critical infrastructures from cyber-attacks. International Journal of Critical Infrastructure Protection, 9, 1-2.
-
Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cybersecurity. Journal of Digital Forensics, Security and Law, 12(2), 53-74.
-
Asghar, M. R., Habib, M. A., & Khan, M. K. (2019). Cybersecurity challenges in cloud computing. Future Generation Computer Systems, 100, 544-561.
-
Alnatheer, M. (2015). Understanding and measuring information security culture in developing countries: Case of Saudi Arabia. Journal of Information Security and Applications, 20, 1-8.
-
Williams, P. (2011). The role of information security in protecting organizations from cyber threats. Information Security Journal: A Global Perspective, 20(1), 1-2.
-
Kumar, A. (2018). Cybersecurity: Protecting the future. Information Security Journal: A Global Perspective, 27(4), 1-8.