Abstract

This study focuses on the issue of information security policy for e-government in Saudi Arabia. It evaluates the three fundamental pillars that determine data security such as effectiveness, vulnerabilities, and threats. The paper is seeking to reveal the risks of information security policy for e-government in Saudi Arabia as well as to examine the vulnerabilities and the effectiveness of the system.

The methodology applied inductive approach where both qualitative and quantitative research method were used. A survey by use of questionnaires and an interview was conducted.

Library of Congress Subject Headings

Saudi Arabia--Politics and government--Data processing; Public administration--Technological innovations; Internet in public administration--Saudi Arabia; Computer networks--Security measures

Publication Date

5-14-2015

Document Type

Thesis

Student Type

Graduate

Degree Name

Networking and System Administration (MS)

Department, Program, or Center

Information Sciences and Technologies (GCCIS)

Advisor

Tae Oh

Advisor/Committee Member

Jonathan Maurer

Advisor/Committee Member

Young B. Choi

Comments

Physical copy available from RIT's Wallace Library at DS244.5`2 .A54 2015

Campus

RIT – Main Campus

Plan Codes

COMPSEC-MS

Share

COinS