graduate student from 01.01.2021 until now
Russian Federation
The research featured the national cybersecurity system of the Kingdom of Saudi Arabia. The cybersecurity standards developed by the International Telecommunication Union of the United Nations made it possible to reveal the institutional and legal foundations of the digital security system, as well as the degree of involvement in international cybersecurity cooperation. The analysis demonstrated the key risks of the development of the Saudi cyber model. The assessment by the International Telecommunication Union standards gave quite positive results. However, Saudi Arabia proved to adhere to a catching-up development model and still experiences some problems with national cyberspace security. Some are of global nature, e.g. legislation gaps, while others result from the specifics of the national model of state governance. The most obvious risks include the imbalance between the civil and military sectors, the disagreements between various regions, and the poor integration of the local hacker community into the overall structure of national cybersecurity. Saudi Arabia plans to eliminate these imbalances in the medium term in order to build an integrated cybersecurity system by expanding its international cooperation.
information security, digital protection, cybercrime, digital development strategies, Vision 2030, public-private partnerships, international cooperation
1. Lebedeva M. M., Kharkevich M. V., Zinovieva E. S., Koposova E. N. State archaization: the role of information technologies. Polis. Political Studies, 2016, (6): 22-36. (In Russ.) https://doi.org/10.17976/jpps/2016.06.03
2. Sapronova M. A. The Arab East on the modern stage: evolution of institutions of power and modernization of traditional society. Vestnik Tomskogo gosudarstvennogo universiteta, 2009, (318): 125-132. (In Russ.)
3. Kosach G. G. Saudi Arabia: transformation of power and policy. Mirovaya ekonomika i mezhdunarodnye otnosheniya, 2019, 63(4): 59-67. (In Russ.) https://doi.org/10.20542/0131-2227-2019-63-4-59-67
4. Melkumyan E. S. Development of Arab gulf monarchies: breakout to future. Aziya i Afrika segodnya, 2020, (2): 37-42. (In Russ.) https://doi.org/10.31857/S032150750008471-0
5. Easttom C., Butler W. The Iran-Saudi cyber conflict. International Journal of Cyber Warfare and Terrorism, 2021, 11(2): 29-42. https://doi.org/10.4018/IJCWT.2021040103
6. Nodelend B., Morris R. The impact of low self-control on past and future cyber offending. International Journal of Cyber Criminology, 2020, 14(1): 106-120. https://doi.org/10.5281/zenodo.3742075
7. Polat A. Effects of GDPR on the financial services sector in the Kingdom of Saudi Arabia. Journal of Data Protection & Privacy, 2021, 4(3): 273-282.
8. Alrubaiq A., Alharbi T. Developing a cybersecurity framework for e-government project in the Kingdom of Saudi Arabia. Journal of Cybersecurity and Privacy, 2021, 1(2): 302-318. https://doi.org/10.3390/jcp1020017
9. Albogami O., Alruqi M., Almalki K., Aljahdali A. Public key infrastructure traditional and modern implementation. International Journal of Network Security, 2021, 23(2): 343-350. https://doi.org/10.6633/IJNS.202103_23(2).18
10. Abu-Taieh E., Alfaries A. A., Al-Otaibi S., Aldehim G. Cyber security crime and punishment: comparative study of the laws of Jordan, Ku-wait, Qatar, Oman, and Saudi Arabia. International Journal of Cyber Warfare and Terrorism, 2018, 8(3): 46-59. https://doi.org/10.4018/IJCWT.2018070104
11. NSCA strength and conditioning professional standards and guidelines. Strength and Conditioning Journal, 2017, 39(6): 1-24. https://doi.org/10.1519/SSC.0000000000000348
12. Al-Mulhim R. A., Al-Zamil L. A., Al-Dossary F. M. Cyber-attacks on Saudi Arabia environment. International Journal of Computer Net-works and Communications Security, 2020, 8(3): 26-31. https://doi.org/10.47277/IJCNCS/8(3)1
13. Ali A. M., Shamsuddin S. M., Eassa F. E., Saeed F., Alassafi M. O., Al-Hadhrami T., Elmisery A. M. Towards an intelligent framework for cloud service discovery. International Journal of Cloud Applications and Computing, 2021, 11(3): 33-57. https://doi.org/10.4018/IJCAC.2021070103
14. Alzubaidi A. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Heliyon, 2021, 7(1). https://doi.org/10.1016/j.heliyon.2021.e06016
15. Mahmood H. The security challenges in cloud IoT - a review. Saudi Journal of Engineering and Technology, 2021, 6(7): 162-168. https://doi.org/10.36348/sjet.2021.v06i07.003
16. Arab States call for heightened cybersecurity. ITU News, 2008, (3): 32. Available at: https://historicjournals.itu.int/viewer/516/?return=1&css-name=include#page=34&viewer=picture&o=&n=0&q= (accessed 14 Aug 2021).
17. Shkvarya L. V. Integration processes in the GCC in the context of digitalization. Ekonomika i predprinimatelstvo, 2020, (11): 453-455. (In Russ.) https://doi.org/10.34925/EIP.2020.124.11.082
18. Valiakhmetova G. N. The Middle East in digital age: globalization of threats to regional security. Vostok (Oriens), 2017, (3): 6-15. (In Russ.)
19. Leonova O. G. Cyber war and confrontation in the digital information space. Informatsionnoye obshchestvo, 2018, (2): 43-46. (In Russ.)
20. Almomani I., Ahmed M., Maglaras L. Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Computer Science, 2021, 7. https://doi.org/10.7717/peerj-cs.703
21. Alammary A., Alshaikh M., Alhogail A. The impact of the COVID-19 pandemic on the adoption of e-learning among academics in Saudi Arabia. Behaviour & Information Technology, 2021. https://doi.org/10.1080/0144929x.2021.1973106
22. Ouassini A., Boynton K. W. The "Silicon Valley of the Middle East": cybersecurity, Saudi Arabia, and the path to Vision 2030. Routledge Companion to Global Cyber-Security Strategy, eds. Romaniuk S. N., Manjikian M., 1st ed. London: Routledge, 2021, 427-434. https://doi.org/10.4324/9780429399718-36
23. Aleidan M. Commercial diplomacy as a part of national transformation and its impact on the internationalization of SMEs: evidence from Saudi Arabia. Asian Economic and Financial Review, 2019, 9(9): 1019-1031.https://doi.org/10.18488/journal.aefr.2019.99.1019.1031
24. Albantan M. A. R. Social skills and cyberbullying behavior among students in Hail from the perspective of social work. Cypriot Journal of Educational Sciences, 2021, 16(1): 96-113. https://doi.org/10.18844/cjes.v16i1.5512
25. Soliman N. S. The direct fatwa in the media, the pros and cons. Islamic Sciences Journal, 2021, 11(10): 192-221. http://dx.doi.org/10.25130/islam.v11i10.379
26. Mowatt-Larssen R. Zawahiri's WMD fatwa. Symmetry between 2003 WMD fatwa and 2008 "Exoneration". Islam and the Bomb: Religious Justification For and Against Nuclear Weapons. Cambridge: Belfer Center for Science and International Affairs, 2011, 35-37.
27. Ahmadian H., Mohseni P. From detente to containment: the emergence of Iran's new Saudi strategy. International Affairs, 2021, 97(3): 779-799. https://doi.org/10.1093/ia/iiab014