This study focuses on the issue of information security policy for e-government in Saudi Arabia. It evaluates the three fundamental pillars that determine data security such as effectiveness, vulnerabilities, and threats. The paper is seeking to reveal the risks of information security policy for e-government in Saudi Arabia as well as to examine the vulnerabilities and the effectiveness of the system.
The methodology applied inductive approach where both qualitative and quantitative research method were used. A survey by use of questionnaires and an interview was conducted.
Library of Congress Subject Headings
Saudi Arabia--Politics and government--Data processing; Public administration--Technological innovations; Internet in public administration--Saudi Arabia; Computer networks--Security measures
Networking and System Administration (MS)
Department, Program, or Center
Information Sciences and Technologies (GCCIS)
Young B. Choi
AlGarni, Khaled, "Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats" (2015). Thesis. Rochester Institute of Technology. Accessed from
RIT – Main Campus