Call for manuscripts for April 2026
IJIER, announces the call for manuscripts...
IJIER, announces the call for manuscripts...
The Journal is moving to a...
Shaymaa Mousa
King Abdulaziz University, Saudi Arabia
Author
Author
The Internet has become indispensable to governments by allowing them to conduct E-government, provide better citizen service, improve communications, and access needed information rapidly. While computer networks have revolutionized the way governmental institutions operate, the risks they introduce via interconnectivity can be devastating. Attacks on computer systems via the Internet can lead to lost money, time, reputation, and sensitive information. One reaction to this state of affairs is a behaviour termed “Ethical Hacking” which attempts to proactively increase security protection by indenturing and patching known security vulnerabilities on systems owned by other parties. The main purpose of this study is to address the problems related to the ethical hacking in governmental institutions in Saudi Arabia. The results show that there is a lack of awareness to issues of information security, and ethical hacking, Ethical hacking have a positive impact on the Saudi institutions, and most of ethical hacking problems in Saudi Arabia are related to senior management, staff, society and laws. More researches are needed to consider other measures and include other countries which may show different results.
Ajbaili,M. Saudi & UAE at high risk to cyber-crime: report, al-arabiya news,dubai,(2009).Available:http://www.alarabiya.net/articles/2009/11/15/91411.html
Baumann,R.Ethical hacking,(2002), Accessed:February15,2012.Available:http://www.giac.org/registration/gsec
Graves, K. CEH® Certified Ethical Hacker StudyGuide,Indianapolis: sybox& wily, (2010).
Jain, B, Ravi,K.Hacking- Ethical or Criminal-A Legal Quandary,The Icfai University Press, (2008).
JAMIL,D andALI KHAN,M.Is Ethical Hacking Ethical,International Journal of Engineering Science and Technology(IJEST), Vol .3 No.5. (2011),pp. 3758-3763.
Kraus,R.ISSA member,Ethical hacking from start to success, ISSA Journal,San antonio,USA, (2009),pp.14-18.
Krejcie,R and Morgan,D. Determining Sample Size For Research Activities, In Educational And Psychological Measurement. University of Minnesota,Texas A. & M. University, (1970) , pp.607-610. DOI: https://doi.org/10.1177/001316447003000308
Pondent, C. eHow Contributor The Advantages of Ethical Hacking Accessed:May7,2012. Available:http://www.ehow.com/info_8431442_advantages ethical-hacking.html
Reuters. Saudi Arabia says hackers sabotagegovernment websites,Al-arabiya news,Riyadh,KSA,(2013)Available:http://english.alarabiya.net/en/media/2013/05/18/Saudi-Arabia-says-hackers-sabotage-government-websites.html
Voutsa, A.E , Siakas,V. E , Nisioti ,S. K , and Ross, M, Survey of Informatics Students’ Awareness on Ethical Issues, The British Computer Society , (ISBN 1-902505-77-8). ( 2006), pp. 139-150.
Copyright (c) 2015 Shaymaa Mousa, Wejdan Barashi

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Copyrights for articles published in IJIER journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author for more visit Copyright & License.