期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia:A Fuzzy Decision-Making Approach
1
作者 wajdi alhakami 《Computers, Materials & Continua》 SCIE EI 2024年第5期3211-3237,共27页
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user... The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare. 展开更多
关键词 Cyber security fuzzy DMTAEL security policy cyber crime MCDM
下载PDF
Atrocious Impinging of COVID-19 Pandemic on Software Development Industries 被引量:3
2
作者 wajdi alhakami Ahmed Binmahfoudh +3 位作者 Abdullah Baz Hosam alhakami Md Tarique Jamal Ansari Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2021年第2期323-338,共16页
COVID-19 is the contagious disease transmitted by Coronavirus.The majority of people diagnosed with COVID-19 may suffer from moderate-tosevere respiratory illnesses and stabilize without preferential treatment.Those w... COVID-19 is the contagious disease transmitted by Coronavirus.The majority of people diagnosed with COVID-19 may suffer from moderate-tosevere respiratory illnesses and stabilize without preferential treatment.Those who are most likely to experience significant infections include the elderly as well as people with a history of significant medical issues including heart disease,diabetes,or chronic breathing problems.The novel Coronavirus has affected not only the physical and mental health of the people but also had adverse impact on their emotional well-being.For months on end now,due to constant monitoring and containment measures to combat COVID-19,people have been forced to live in isolation and maintain the norms of social distancing with no community interactions.Social ties,experiences,and partnerships are not only integral part of work life but also form the basis of human evolvement.However,COVID-19 brought all such communication to a grinding halt.Digital interactions have failed to support the fervor that one enjoys in face-to-face meets.The COVID-19 disease outbreak has triggered dramatic changes in many sectors,and the main among them is the software industry.This paper aims at assessing COVID-19’s impact on Software Industries.The impact of the COVID-19 disease outbreak has been measured on the basis of some predefined criteria for the demand of different software applications in the software industry.For the stated analysis,we used an approach that involves the application of the integrated Fuzzy ANP and TOPSIS strategies for the assessment of the impact of COVID-19 on the software industry.Findings of this research study indicate that Government administration based software applications were severely affected,and these applications have been the major apprehensions in the wake of the pandemic’s outbreak.Undoubtedly,COVID-19 has had a considerable impact on software industry,yet the damage is not irretrievable and the world’s societies can emerge out of this setback through concerted efforts in all facets of life. 展开更多
关键词 CORONAVIRUS software industry safety COVID-19 monitoring fuzzy ANP-TOPSIS
下载PDF
An Effective Secure MAC Protocol for Cognitive Radio Networks
3
作者 Bayan Al-Amri Gofran Sami wajdi alhakami 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期133-148,共16页
The vast revolution in networking is increasing rapidly along with tech-nology advancements,which requires more effort from all cyberspace profes-sionals to cope with the challenges that come with advanced technology ... The vast revolution in networking is increasing rapidly along with tech-nology advancements,which requires more effort from all cyberspace profes-sionals to cope with the challenges that come with advanced technology privileges and services.Hence,Cognitive Radio Network is one of the promising approaches that permit a dynamic type of smart network for improving the utili-zation of idle spectrum portions of wireless communications.However,it is vul-nerable to security threats and attacks and demands security mechanisms to preserve and protect the cognitive radio networks for ensuring a secure commu-nication environment.This paper presents an effective secure MAC protocol for cognitive radio networks,significantly enhancing the security level of the existing DSMCRN and SSMCRN protocols by eliminating the authentication server’s necessity,which can be a single point of failure to compromise the entire network communication.The proposed protocol has proven to be effective and reliable since it does not rely on a centralized entity for providing the required security for a single pair of cognitive users.The protocol also improves the performance in the context of fast switching to data channels leading to higher throughput is achieved compared to the benchmark protocols. 展开更多
关键词 Cognitive radio networks shared key AUTHENTICATION elliptic curve cryptography THROUGHPUT
下载PDF
A Usability Management Framework for Securing Healthcare Information System
4
作者 Hosam alhakami Abdullah Baz +3 位作者 wajdi alhakami Abhishek Kumar Pandey Alka Agrawal Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第9期1015-1030,共16页
Transformation from conventional business management systems tosmart digital systems is a recurrent trend in the current era. This has led to digitalrevolution, and in this context, the hardwired technologies in the s... Transformation from conventional business management systems tosmart digital systems is a recurrent trend in the current era. This has led to digitalrevolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remainsa serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses andcompromising software usability as well. Most of the data breaches are financiallymotivated, especially in the healthcare sector. The cyber invaders continuouslypenetrate the E- Health data because of the high cost of the data on the darkweb. Therefore, security assessment of healthcare web-based applicationsdemands immediate intervention mechanisms to weed out the threats of cyberattacks for the sake of software usability. The proposed disclosure is a unique process of three phases that are combined by researchers in order to produce andmanage usability management framework for healthcare information system. Inthis most threatened time of digital era where, Healthcare data industry has bornethe brunt of the highest number of data breach episodes in the last few years. Thekey reason for this is attributed to the sensitivity of healthcare data and the highcosts entailed in trading the data over the dark web. Hence, usability managementof healthcare information systems is the need of hour as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. The proposed unique developed model of usability management workflow is preparedby associating steps like learn;analyze and manage. All these steps gives an allin one package for the healthcare information management industry because thereis no systematic model available which associate identification to implementationsteps with different evaluation steps. 展开更多
关键词 Smart healthcare healthcare industry USABILITY SECURITY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部