has been cited by the following article(s):
[1]
|
Exploring the Challenges and Issues in Adopting Cybersecurity in Saudi Smart Cities: Conceptualization of the Cybersecurity-Based UTAUT Model
|
|
Smart Cities,
2023 |
|
|
[2]
|
A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field
|
|
Dhaqm, WMS Yafooz, YD Al-Otaibi - Applied Sciences,
2023 |
|
|
[3]
|
Towards Development of a Security Risk Assessment Model for Saudi Arabian Business Environment Based on the ISO/IEC 27005 ISRM Standard
|
|
Journal of Information Security,
2023 |
|
|
[4]
|
Cybersecurity Practices, Challenges, and applications in Saudi Smart Cities: Developing and Testing Extended UTAUT3 Model using Multi-stage Samplings.
|
|
2023 |
|
|
[5]
|
Ontology Based-Security Issues for Internet of Thing (IoT): Ontology Development
|
|
International Journal of Computer Science & Network …,
2023 |
|
|
[6]
|
Ai-based modeling: Techniques, applications and research issues towards automation, intelligent and smart systems
|
|
SN Computer Science,
2022 |
|
|
[7]
|
An Ontological Model for a National Cyber-Attack Response in South Africa
|
|
ECCWS 2022 21st …,
2022 |
|
|
[8]
|
Information Security Risk Management (ISRM) Model for Saudi Arabian Organisations
|
|
2022 |
|
|
[9]
|
Vulnerability of Saudi Private Sector Organisations to Cyber Threats and Methods to Reduce the Vulnerability
|
|
2022 |
|
|
[10]
|
Impact of ontology in aviation incident and accident knowledge repository
|
|
ATBU J. of Sci., Tech …,
2021 |
|
|
[11]
|
Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia
|
|
2021 |
|
|
[12]
|
Community of practice: converting IT graduate students into specialists via professional knowledge sharing
|
|
2021 |
|
|
[1]
|
Community of practice: converting IT graduate students into specialists via professional knowledge sharing
Kybernetes,
2022
DOI:10.1108/K-10-2020-0711
|
|
|
[2]
|
Vulnerability of Saudi Private Sector Organisations to Cyber Threats and Methods to Reduce the Vulnerability
Pertanika Journal of Science and Technology,
2022
DOI:10.47836/pjst.30.3.08
|
|
|
[3]
|
Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia
Journal of Cybersecurity and Privacy,
2021
DOI:10.3390/jcp1020017
|
|
|
[4]
|
Cybersecurity in Humanities and Social Sciences
2020
DOI:10.1002/9781119777588.ch2
|
|
|