Ethical Hacking in the Saudi Government Institutions

Author(s):  
Shaymaa Mousa ◽  
Wejdan Barashi

The Internet has become indispensable to governments by allowing them to conduct E-government, provide better citizen service, improve communications, and access needed information rapidly. While computer networks have revolutionized the way governmental institutions operate, the risks they introduce via interconnectivity can be devastating. Attacks on computer systems via the Internet can lead to lost money, time, reputation, and sensitive information. One reaction to this state of affairs is a behaviour termed “Ethical Hacking” which attempts to proactively increase security protection by indenturing and patching known security vulnerabilities on systems owned by other parties. The main purpose of this study is to address the problems related to the ethical hacking in governmental institutions in Saudi Arabia. The results show that there is a lack of awareness to issues of information security, and ethical hacking, Ethical hacking have a positive impact on the Saudi institutions, and most of ethical hacking problems in Saudi Arabia are related to senior management, staff, society and laws. More researches are needed to consider other measures and include other countries which may show different results.

2020 ◽  
Vol 9 (4) ◽  
pp. 223 ◽  
Author(s):  
Monica Sebillo ◽  
Giuliana Vitiello ◽  
Michele Grimaldi ◽  
Antonio De Piano

In the last decade, there has been a growing awareness that the involvement of citizens in decision making can produce an immediate and positive impact on actions to be taken, as they are the real owners of knowledge about the place where they live. By collecting and geolocating data through smartphones and the Internet, citizens in fact can help decision makers both create sharable spatio-temporal information about objects and phenomena and interpret territorial dynamics. However, although such a role has been definitely recognized, the lack of a homogeneous paradigm for structuring the sensing process, managing the geo big data produced and handling services makes it difficult to exploit such a potentiality. In this paper, we describe a citizen-centric approach conceived to build territorial knowledge useful to provide decision makers with a timely and reliable picture of the status of a given territory. In particular, a visual representation of geospatial knowledge is described, which summaries context-sensitive information about a territory and its citizens, thus improving the land monitoring tasks. An information system, SAFE, is finally presented, which consists of a Web and a mobile component to manage citizen supplied data to be integrated for building reliable dynamic scenarios.


Author(s):  
Mohammed Bindakhil ◽  
Scarlet Charmelo-Silva ◽  
Alhanouf A. Bin Dakhil ◽  
Ibrahim A. ALOmair

<b><i>Background:</i></b> Oral medicine is a subdiscipline of dentistry that concerns itself with the oral health of patients; it focuses on providing diagnosis and management of oral and maxillofacial diseases, as well as direct dental care for those in medically complex situations. As primary healthcare providers, physicians and dentists are often the first to evaluate patients with orofacial symptoms and make diagnoses related to oral health, whether explicit or manifested through systemic diseases. However, a lack of familiarity with oral medicine among healthcare providers often leads to significant delays in the accurate diagnosis and appropriate treatment of many oral and maxillofacial disorders. It has been well established that a lack of training and education in oral health among physicians is an impediment to alleviating the situation. <b><i>Summary:</i></b> Several studies and scientific reports in the medical community have shown a greater professional interest in oral health and medicine, with numerous recent articles reflecting a clear rise in multiple factors: an increased interest in additional training and a rise in oral diseases. This review focuses on the need for a multidisciplinary approach in modern healthcare systems that implements the oral medicine specialty. It also serves to emphasize the role of oral medicine in medical training and education, while simultaneously discussing the prevalence of oral diseases and awareness of oral health among physicians in Saudi Arabia. <b><i>Key Messages:</i></b> The prevalence of oral health conditions in Saudi Arabia appears to be high yet is accompanied by a scarcity of oral medicine specialists in this part of the world. Furthermore, numerous studies have revealed that physicians from different specialties in Saudi Arabia lack training in oral health and possess an insufficient awareness of the oral medicine specialty. This paucity of oral medicine specialists in Saudi Arabia presents a key issue as the clinical services and medical education provided by such specialists in healthcare systems can have a profound positive impact on each patient’s quality of life and health outcomes, as well as the standards of physicians’ training.


Author(s):  
Emily Sullivan ◽  
Mark Alfano

People have always shared information through chains and networks of testimony. It is arguably part of what makes us human and enables us to live in cooperative communities with populations greater than 150 or so. The invention of the internet and the rise of social media have turbocharged our ability to share information. This chapter develops a normative epistemic framework for sharing information online. This framework takes into account both ethical and epistemic considerations that are intertwined in typical cases of online testimony. The authors argue that, while the current state of affairs is not entirely novel, recent technological developments call for a rethinking of the norms of testimony, as well as the articulation of a set of virtuous dispositions that people would do well to cultivate in their capacity as conduits (not just sources or receivers) of information.


2018 ◽  
Vol 13 (12) ◽  
pp. 61
Author(s):  
Ahmad Y. Areiqat ◽  
Hanan Ibrahim

Purpose: The purpose of this study is to show that turning Jordan into an economic free zone will lead to a significant increase in foreign investments. This increase, in turn, will lead to an economic growth and to a reduction in the unemployment rate. Jordan is a developing country and any successful investments in the economy sector will have a positive impact on the quality of the social life of its people. This is particularly important now in view of the economic pressure that Jordan is going through as a result of the presence of a huge number of immigrants who have fled the civil wars in neighboring countries.&nbsp; Methodology: This study has utilized the relevant literature by way of evaluating the benefits of establishing economic free zones in Jordan. Many of the findings are based on analyzing statistical information published by governmental institutions in Jordan. Findings: Jordan offers an attractive investment environment due to the security and stability it enjoys compared with other countries in the Arab region. As such, it has succeeded in establishing new economic free zones through partnership with foreign investors. This has led to a significant increase in the flow of more foreign investments in Jordan. The present study shows that turning the whole of Jordan into an economic free zone will lead to yet a further increase of foreign investments, and hence to more empowerment of the economic sector. Limitations: &nbsp;The quantitative data available is limited to the years 1999-2007. Value: The findings of this study can be a point of departure for researchers and economic decision-makers in Jordan to prepare economic plans with the purpose of attracting foreign investments and hence promoting economic growth in the country.


2020 ◽  
Vol 4 (3) ◽  
pp. 490-495
Author(s):  
Astika Ayuningtyas ◽  
Yuliani Indrianingsih ◽  
Uyuunul Mauidzoh

The development of information and computerized tenology has led to what is called the Internet and the World Wide Web (WWW). In addition, the dramatic development of the Internet has given users more choice and control over content, and also provides individuals, businesses, and public and private organizations with the opportunity to generate and disseminate information. The interactive features of the web can be an effective way to build and maintain mutually beneficial relationships if the web is used properly. The presence of the Internet has proven to have a positive impact on the development of a village, sub-district or district to introduce and inform the potential of its region. This is evident in several regions of Indonesia which have successfully used Internet facilities to introduce tourist destinations to the world. Therefore, the training on the promotion website is an effort to optimize the introduction of high quality village products in the district of Patuk and is also intended to follow the results of research on the design of a promotion of superior products and tourist objects on the web in Patuk Gunungkidul district. On the basis of the website promotion feasibility test during the training for each representative in 11 villages in the Patuk sub-district, 87.36% was obtained, so that it can be said that the Introduction of superior village products via promotional materials based on the website was optimal and met the needs of users.


2020 ◽  
Vol 5 (4) ◽  
pp. 395-398
Author(s):  
Taleb Samad Obaid

To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key.  In general, the algorithms that implicated asymmetric keys are much more secure than others using one key.   RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.


Author(s):  
Fahad Ayed Al Radaddi , Amal Mahmoud Ali ,   Iman Mohamed Ma

Research Goal: To measure the effectiveness of the use of a proposed training program based on active learning to develop teaching skills of Shari'a Sciences’ teachers and their attitudes towards it at the kingdom of Saudi Arabia. The Research depended on the descriptive approach during building the program that based on active learning strategies, as assign experimental method when applying the program to identify its effectiveness in developing teaching of Shari'a Sciences’ teachers for the secondary school in the city of Medina and their attitudes toward it in teaching. Research instruments: The Card Note of teaching skills consisted of (45) sub-skill divided into three main areas which are (planning, implementation and evaluation). The measure of the attitude towards active learning in teaching included (26) phrases, therefore, the program is based on active learning in developing the teaching skills. After the researcher has checked the sincerity of research instruments, he began to be apply it to a stratified random sample, which consisted of (34) teachers of Shari'a Sciences’ teachers for the secondary school. The research contain a number of appropriate statistical methods, which are arithmetic averages, standard deviations, (T) test for the associated groups, the coefficient of Peerson, ETA square, the equation of the Blak, the coefficient of alpha Cronbach and the equation of Cooper. After conducting statistical analyzes, the research found the existence of Statistical differences among the average performance of the research sample in the Card Note of teaching skills in (planning, implementation and evaluation) Separated and combined in the light of active learning before and after the proposed training program for the benefit of the telemetric. In the light of the findings, the research recommended: Taking advantage of the current research program in training Shari'a Sciences’ teachers in different stages of education, especially Secondary School Teachers, because of its positive impact on the development of their teaching skills, and benefit from the list of teaching skills of the current research when assessing teachers' performance during service.   ، ، ، 


2012 ◽  
Vol 8 (1) ◽  
Author(s):  
Ve Leslie E. Atanoza ◽  
Johannes M. Camasura

The study investigates the strategies employed by the students of Cebu Technological University in searching information using digitized resources. It identifies students' information needs using the main campus’ library and describes the information seeking approaches students employ using the Internet, Online databases and Optical media. The study employs simple purposive sampling. It uses descriptive method of survey and document analysis. A focus group discussion was also conducted and computer log monitoring analysis. The study revealed that students’ information needs are varied and course related. Students’ purposes in searching information in digitize sources are to get an overview of their research topic; answering class assignments and gathering related literature. Students supply their own keywords rather than the keywords provided in the index of online databases was generally the first approach used in searching information in digitized sources. Boolean operators and truncations as search techniques were the least used approach. Search engines of Google, Yahoo, and You Tube were the top three preferences of students when using the Internet as a Digitized Information Source. Dealing with too many results to choose from and inadequate instructions on how to proceed with the search usually contribute to the delay in finding the needed information.   Keywords - digitized resources, information seeking strategies


Author(s):  
Mohammed Noah Alkhiri, Talal Aqeel Alkhiri Mohammed Noah Alkhiri, Talal Aqeel Alkhiri

This paper aims to shed light on distance education in the United Kingdom and comparing it to distance education in the Kingdom of Saudi Arabia, the extent of its use in improving the processes of distance learning and education, and ways to overcome the problems facing distance education in the Kingdom of Saudi Arabia. The study relied on reports and analysis of international data conducted by the Organization for Economic Cooperation and Development (OECD). Among the most important findings of the study: It is possible to benefit from the experience of the United Kingdom in distance learning, and there are significant differences in distance learning between the two countries, and there are few similarities. Among the most important recommendations of the study: To benefit from the experiences of British universities and institutions in distance education, and to simulate the platforms and applications used in distance education in the United Kingdom and how to benefit from them, and to benefit from the experience of the United Kingdom in responding to economic growth and bridging the digital divide by using the Internet in schools to teach academic subjects.


2001 ◽  
Vol 5 (3) ◽  
pp. 35-50 ◽  
Author(s):  
Kris Portz ◽  
Joel M. Strong ◽  
Larry Sundby

Despite the explosive growth of electronic commerce, many individuals are still reluc-tant to conduct business transactions on the Internet. Individuals may mistrust sending private information over the Internet or they may have concerns about the existence, performance, standing, and integrity of online businesses. In direct response to these concerns, the American Institute of Certified Public Accountants (AICPA) has developed an electronic commerce assurance service called WebTrust which is intended to improve the consumer's confidence in the process and the quality of information disclosed on vendor web sites. The purpose of this study is to shed light on the effectiveness of WebTrust by examining the influence of WebTrust on consumers' perceptions of a web site's trustworthiness. The question is investigated through a computer experiment. The results of this study are very encouraging for electronic commerce assurance services in general, and the WebTrust service in particular. Evidence is found that the presence of WebTrust on a web site has a positive impact on the perceived trustworthiness of the website. The results also show that knowledge of WebTrust plays a significant moderating role in the relationship between perceived trustworthiness and the presence of WebTrust. When subjects have prior knowledge of WebTrust they perceive a web site with WebTrust to be more trustworthy than a web site without whereas, the presence of WebTrust has no impact when subjects are uneducated about the WebTrust assurances. Also, when WebTrust is present, subjects with knowledge of WebTrust are more confident in the web site than those without knowledge of WebTrust. When WebTrust is not present, knowledge subjects are more unsure of a web site without WebTrust than those without knowledge.


Sign in / Sign up

Export Citation Format

Share Document