SlideShare a Scribd company logo
1 of 44
1
School of Business, Economic, and Technology
Campbellsville University- Louisville Center
Research Report Guide
A Guide for CU Graduate Students
©2017, Dr Vincent Scovetta
Campbellsville University. All rights reserved.
4/20/2020
2
Table of Contents
The Research Report
...............................................................................................
....................................... 4
Chapter 1- Background/Introduction (3 – 4 pages)
....................................................................................... 4
Introduction
...............................................................................................
..................................................... 4
Problem Statement and Purpose of Research
...............................................................................................
. 4
Relevance and Significance
...............................................................................................
............................ 4
Research Questions
...............................................................................................
......................................... 5
Barriers and Issues
...............................................................................................
.......................................... 5
Chapter 2 - Review of the Literature (6-8 pages)
.......................................................................................... 5
Chapter 3 - Approach/Methodology (1 - 2 pages)
......................................................................................... 5
Chapter 4: Findings, Analysis, and Summary of Results (2 - 4
pages) ......................................................... 5
Chapter 5: Conclusions (2 - 4 pages)
...............................................................................................
.............. 5
References
...............................................................................................
....................................................... 6
Research Report Structure
...............................................................................................
.............................. 6
Front
Matter.....................................................................................
........................................................... 6
Chapter 1 through 5 (12 pages):
...............................................................................................
.................. 6
Back Matter:
...............................................................................................
................................................ 6
Document Preparation – Form and Style
...............................................................................................
........ 6
References and Citations
...............................................................................................
............................. 7
Margins...................................................................................
.................................................................... 7
Line Spacing
...............................................................................................
................................................ 7
Paragraph Spacing
...............................................................................................
....................................... 8
Page Numbering
...............................................................................................
.......................................... 8
Type Style
...............................................................................................
................................................... 8
Title
Page........................................................................................
............................................................ 8
The Abstract
...............................................................................................
................................................ 8
Chapter Title, Heading 1, Heading
2.............................................................................................
............. 8
Tables and Figures in the Text Body
...............................................................................................
.......... 9
Appendix
....................................................................................... ........
..................................................... 9
Additional Resources
...............................................................................................
...................................... 9
Sample First Page of Table of Contents
...............................................................................................
....... 11
Sample Reference List
...............................................................................................
.................................. 12
3
4
The Research Report
The Research Report serves as the deliverable towards partial
completion of the requirement for BA634. The
requirement of your research is expected to be built and
constitutes the five-chapter model. This document is not
intended to be a one-time or static document. The Research
Report needs to be at least 14 pages and is written
in the past and present tense, as appropriate.
The Research Report should be a complete and concise
document that establishes your credentials as a relative
expert in the domain of your study. In all cases, a good
understanding of the specific domain will be necessary
for the successful completion of your study. It is vital that you
stay current in the literature germane to the
study you are conducting and update the chapters accordingly.
The following is the general structure of the Research Report
Font Style: Times New Roman throughout the document
Font color: Black (including headings)
Chapter 1- Background/Introduction (3 – 4 pages)
In this section, present enough information about the proposed
work so that the reader understands the general
context or setting. It is also helpful to include a summary of
how this document is organized.
Introduction
This section introduces the reader to the structural content of
your Research Report
Problem Statement and Purpose of Research
In this section, present a concise statement of a research-worthy
problem to be addressed (i.e., why the work
should be undertaken – don’t state “it was a requirement of the
professor”). Follow the statement of the problem
with a well-supported discussion of its scope and nature. The
discussion of the problem should include: what the
problem is, why it is a problem, how the problem evolved or
developed, and the issues and events leading to the
problem. Your problem statement must be clear, concise, to the
point and able to be articulated in no more than
three sentences.
Relevance and Significance
This section provides the necessary support for both the
problem statement of your study. Consider the following
questions and support your discussion by citing the research
literature:
affected?
far-ranging is the problem and how great is its impact?
What’s the benefit of solving the problem?
Why weren’t those attempts successful?
roblem?
problem and how will your proposed study offer
promise as a resolution to the problem?
5
zation of your results?
Research Questions
In this section you will define the research questions you expect
to answer in your finding / results / conclusion
sections. The research question(s) must be directly related to
the problem statement and introduce the reader to
their respective relationships. The answers to the research
question(s) need to be either qualitative or
quantitative.
Barriers and Issues
In this section, identify how the problem is inherently difficult
to solve. You should also show how the solution
you propose are difficult to obtain (unlike a book report). You
should show the study you propose is of adequate
difficulty to warrant a successful grade assignment.
Chapter 2 - Review of the Literature (6-8 pages)
In this section, it is important to clearly identify the major areas
on which you will need to focus your research in
order to build a solid foundation for your study in the existing
body of knowledge. The literature review is the
presentation of quality literature in a particular field that serves
as the foundation and justification for the research
problem, research questions or hypothesis, and methodology.
You will develop a more comprehensive review of
the literature as part of your report.
Chapter 3 - Approach/Methodology (1 - 2 pages)
Describe how you plan to address your research problem and
accomplish your stated goal. List the major steps
that must be taken to accomplish the goal and include a
preliminary discussion of the methodology and specific
research methods you plan to implement. Although specific
details are not required at this point, you must provide
adequate discussion of the general process you will follow to
implement your research methodology.
Chapter 4: Findings, Analysis, and Summary of Results (2 - 4
pages)
Chapter 4 includes an objective description and analysis of the
findings, results or outcomes of the research. Limit
the use of charts, tables, figures to those that are needed to
support the narrative. Most of these illustrations can
be included as part of the Appendixes.
The following topics are intended to serve as a guide:
ssion
Chapter 5: Conclusions (2 - 4 pages)
- Clearly state the conclusions of the study based
on the analysis performed and results achieved.
Indicate by the evidence or logical development the extent to
which the specified objectives have been
6
accomplished. If the research has been guided by hypotheses,
make a statement as to whether the data
supported or rejected these hypotheses. Discuss alternative
explanations for the findings, if appropriate.
Delineate strengths, weaknesses, and limitations of the study.
- Discuss the impact of the work on the field of
study and its contributions to knowledge and
professional practice. Discuss implications for future research.
- Present recommendations for future
research or for changes in research methods or
theoretical concepts. As appropriate, present recommendations
for changes in academic practice, professional
practice, or organizational procedures, practices, and behavior.
References
Follow the most current version of APA to format your
references. However, each reference should be single-
spaced with a double space between each cited entry. Make sure
that every citation is referenced and every
reference is cited.
Research Report Structure
Notes:
final grade of your report. Do not add extra space
to your document in an effort to extend the page count.
Front Matter
o Title Page
o Abstract
o Table of Contents
o List of Tables
o List of Figures
Chapter 1 through 5 (12 pages):
Back Matter:
o Appendixes
o References
Document Preparation – Form and Style
Form and style guidelines for a Research Report serve a number
of purposes: to ease adaptation of the document
for publication in whole or part, to ensure a level of
professional appearance, and ease the burden on the readers
of the document by presenting material in a logical, consistent
fashion. Nevertheless, form and style guidelines
should not be burdensome for Peer Reviewer or Professor. The
bulk of the effort in developing and mentoring a
Research Report should certainly be directed toward the quality
of the thoughts being presented, not the
7
appearance of that presentation.
The current edition of the Publication Manual of the American
Psychological Association serves as the primary
guide for format and style. Since that manual focuses primarily
on publication in journals, some exceptions are
necessary for a Research Report. The Research Report
guidelines are amplified with examples of:
• Title Page (Appendix A)
• Table of Contents (Appendix E)
• List of Tables (Appendix F)
• List of Figures (Appendix G)
• First Page of a Chapter (Appendix H)
• Appendix Pages (Appendix I)
• Reference List (Appendix J)
References and Citations
One of the most important tasks in writing a Research Report is
to reference other works and sources in the text
body. You must provide a formal reference citation for each
idea or statement taken from the work of an
individual or organization. Failure to provide a reference
citation, when one is appropriate, is plagiarism, which
is a violation of the university’s Code of Student Conduct and
Academic Responsibility. An act of plagiarism
will subject the student to disciplinary action including
suspension or expulsion from the university. Always err
on the side of caution when writing any formal paper. As you
conduct your work, keep accurate records that
indicate which portions of your Research Report are not your
own words and ideas. If you attempt to do this as
an afterthought, you run the risk of losing the source of the
information and committing plagiarism. Reference
citations in the text should use the author-date citation system
specified in the current edition of the Publication
Manual of the American Psychological Association. All
reference citations must be listed alphabetically in the
References section at the end of the document, again following
the format specified in the current edition of the
Publication Manual of the American Psychological Association.
However, each reference should be single-
spaced with a double space in between each entry. Make sure
that every citation is referenced and every
reference is cited.
Margins
The left-hand margin must be 1.5 inches (4 cm.). Margins at the
right, top, and bottom of the page should be 1.0
inch. (See exception for chapter title pages below.) The
Research Report text must be left-aligned (leaving a
ragged right edge).
Line Spacing
Double-spacing is required for most of the text in documents
submitted during the Research Report process.
Pages for the abstract, acknowledgments, and parts of the table
of contents, however, must be single-spaced in
the Research Report. Single-spacing also can be used for table
titles and headings, figure captions, references in
a reference list (but double-spacing is required between
references in the list), footnotes, and long quotations.
Long quotations may be indented five spaces. Judicial triple can
improve appearance and readability and is
appropriate after chapter titles, before major subheadings,
before footnotes, and before and after tables in the
text; however, avoid open white spaces.
8
Paragraph Spacing
The text of the document is double-spaced. There should be no
extra spaces between paragraphs in sections;
however, indent the first line of paragraphs five spaces (1/2
inch). Chapters must begin on new pages.
Page Numbering
Page numbers for the front matter, starting with the Table of
Contents, should be lowercase roman numerals,
centered at the bottom of the page. All pages following the front
matter should have page numbers in Arabic
numerals in the upper right-hand corner. The page order and
numbering for the front matter is:
1. Title page is page i, but the page number is not printed.
2. Approval Signature page is page ii, but the page number is
not printed.
3. Abstract is page iii but the page number is not printed.
4. Acknowledgements is page iv and not to exceed one page.
The page number is not printed.
5. Table of Contents is page v and the page number is printed,
bottom center.
6. List of Tables (only present if the document contains tables)
is given the next page number in
sequence, printed bottom center.
7. List of Figures (only present if the document contains
figures) is given the next page number in
sequence, printed bottom center.
Type Style
For body text, you should use 12-point Times New Roman. Text
for the cover page may be larger but should
not exceed 14-point size. Text for the chapter title text should
be 14-point size. Be consistent in your use of
typefaces throughout the document. Do not use a compressed
typeface or any settings on your word processor
that would decrease the spacing between letters or words. Sans
serif typefaces such as Helvetica or Arial may
be used for relatively short blocks of text such as chapter
headings and captions but should be avoided in long
passages of text as they impede readability.
Title Page
Every document that is submitted, from the Research Report,
must have a title page. The title page includes the
exact title of the Master’s Thesis, date of submission, your
name, and name of the department which the report
is submitted. Use the format of the Sample Research Report
Title Page provided in Appendix A.
The Abstract
The abstract (see Appendix es C) is single spaced. An abstract
is a stand-alone document and therefore, should
not include citations because it would then need references.
Note that the abstract must be fewer than 200
words.
Chapter Title, Heading 1, Heading 2
It is preferred that Research Report contain no more than three
levels of headings in the body text. All headings
should have only the first letter of each word capitalized except
that non-major words shorter than four letters
have no capital letters. See Appendix H for a sample page for a
first page of a chapter.
Instructions for heading levels follow:
Level 1: Chapter Title
9
This heading starts two inches from the top of the page, is
centered on the page, and is set in 14point type.
The first line contains the chapter number (e.g., Chapter 4). The
second line is blank. The third line
displays the chapter title, is centered on the page, and is set in
14-point type.
Level 2: Heading 1
Start heading 1 at the left margin of the page, four spaces (i.e.,
two returns when your document is set for
double-spacing) down from the title, set in bold 12-point type.
Double-space (one return) to the
subheading body text. Indent the first line of the body text five
spaces.
Level 3: Heading 2
Start the heading 2 at the left margin of the page, double-spaced
(i.e., one return when your document is
set up for double-spacing) from the subheading, set in 12-point
italics. Double-space (one return) to the
sub-subheading body text. Indent the first line of the body text
five spaces.
Tables and Figures in the Text Body
Charts, graphs, diagrams, figures, and summary tables that
significantly enhance reading of the Research Report
should be placed in the text body. Only include material in the
text body that is needed by the reader to understand
the point(s) you are trying to make. Other material should be
placed in Appendixes. Tables that summarize large
amounts of data are best placed at the end of the Master’s
Thesis. If you have included data in your text related
to some point, then the full table containing such data belongs
in an Appendix. When using tables and figures in
the body of the paper, remember that the horizontal center of
the body is not at the center of the paper. It is 0.25”
to the right of center due to the 1.5” left binding margin. All
tables and figures that are less than body width must
be centered properly. Samples of a table and figure appear in
Appendixes L and M.
Appendix
Place in appropriate appendices all analytical tables, evaluation
instruments, and other material important in the
determination, evaluation, analysis, and description of your
research that is not contained in the text body (see
section above). Use an Appendix to present material that
supplements the text or may be of interest to readers but
is too detailed or distracting for inclusion in the main body of
the text. Surveys, evaluation instruments, original
data, complicated mathematical tables, new computer programs,
computer printouts, and data collection forms
are examples of materials that are most appropriately appended.
Do not exclude material that would be necessary
for another researcher to replicate your work and that is not
available elsewhere. Include copies of IRB permission
from the sponsoring organization and from the study site.
Present copies of all letters and e-mails that allow you
to use and modify materials belonging to others. If appropriate,
you may use a titled cover sheet for an Appendix.
Additional Resources
American Psychological Association (2010). Publication manual
of the American Psychological Association. (6
th
ed.). Washington, D.C.: Author.
Bolker, J. (1998). Writing your Research Reportin fifteen
minutes a day: A guide to starting, revising, and
finishing your doctoral thesis. New York, NY: Henry Holt
Publishing.
10
Kiernan, V (2005). Writing Your Dissertation with Microsoft
Word. MattilyPublishing, Alexandria, Virginia
11
Sample First Page of Table of Contents
Table of Contents
Abstract iii
List of Tables (if necessary) viii (your actual page number may
be different)
List of Figures (if necessary) ix (your actual page number may
be different)
Chapters
1. Introduction
2. Review of the Literature
etc.
3 . Methodology
4. Findings, Analysys, Results,
5. Conclusions, Implications, and Recommendations
tions 123
Appendices
A. xxxxxxxxxxxxxxxxx 140
B. xxxxxxxxxxxxxxxxxxxxxxx 148
C. xxxxxxxxxxxxxxx 155 etc.
Reference List 198
Note: Count and print the number of this page centered here in
lowercase Roman.
12
Sample Reference List
American Psychological Association (2010). Publication manual
of the American Psychological Association. (6
th
ed.). Washington, D.C.: Author.
Bolker, J. (1998). Writing your Research Reportin fifteen
minutes a day: A guide to starting, revising, and
finishing your doctoral thesis. New York, NY: Henry Holt
Publishing.
Kiernan, V (2005). Writing Your Dissertation with Microsoft
Word. MattilyPublishing, Alexandria, Virginia
Webology, Volume 17, Number 2, December, 2020
289
http://www.webology.org
A Strategic Vision to Reduce Cybercrime to Enhance Cyber
Security
Mohammed I. Alghamdi
Department of Computer Science, Al-Baha University, Al-Baha
City, Kingdom of Saudi Arabia.
E-mail: [email protected]
Received June 15, 2020; Accepted August 18, 2020
ISSN: 1735-188X
DOI: 10.14704/WEB/V17I2/WEB17031
Abstract
The cyber-security development for future generations is at
stake as a global concern. The
existing strategic and policy structures on cyber security and
awareness-raising at many levels
needs more investigation in order to formulate workable and
efficient strategic vision that
addresses actual needs and challenges. The justification for this
work is therefore to test the
robustness, in contrast with some of the most technologically
advanced countries on the Asian
Continent and others like the USA, Japan, of Saudi Arabia's
current cyber security strategy in
order to keep the NCSS up-to-date. This research aimed to
develop a strategic vision to
combat cybercrime to enhance cyber security. The research
results confirmed the approval of
the members of the study community to a medium degree on the
reality of digital extremism
and cyber terrorism as seen by the researcher. Moreover, the
approval of the members of the
study community was to a high degree on the role of combating
cybercrime in promoting
human security as seen by the researcher. The members of the
study community agreed with a
high degree on the obstacles identified by the researcher to
combat cyber-crimes to enhance
human security in Saudi Arabia. There was a high approval of
the study community members
on the strategic vision developed by the researcher to combat
cyber-crimes to enhance human
security in Saudi Arabia.
Keywords
Cyber-Security, Strategic Vision, National Network for Cyber
Security (NCSS), Cyber-Crime
Prevention.
Introduction
Technology is a continually changing expression in modern
times, which has enhanced
security concerns and driven us to build a cyber-environment. A
country's National
Network for Cyber Security (NCSS) reflects the cyber strength
of the country, which is a
target and vision for a country's cyber safety. Researchers
worked on NCSS by comparing
Webology, Volume 17, Number 2, December, 2020
290
http://www.webology.org
NCSS for international cooperation and harmonization between
various nations and some
researchers worked for their respective governments in the
policy framework (Sarker, K.,
et al., 2019).
The Internet has become a basic and critical need for people's
lives and socio-economic
activities. Although it facilitates things for people, it also
creates new risks. Never stopped
cyber-attacks and never will they, but they exponentially
increase instead. That country
therefore needs an ICT infrastructure secure, efficient and
robust. There can be a high risk
of a poor ICT infrastructure. Every interested cyber intelligence
specialist can use ICT to
manipulate state-of-the-art government and industry classified
information. However very
small attempts were made to estimate Saudi Arabia's strategic
strength in the NCSS by
comparing the NCSS of the various nations.
Training in cyber-security is an effective response to an
increasing number of intrusions
and attacks (Nagarajan et al., 2012). 80 percent of all
vulnerabilities exploited by hackers
are due to human vulnerabilities (IBM, 2013) but cyber security
is a priority of
information technology on tools and technologies (Hershberger,
2014). Human
vulnerabilities include employee incompetence, misinformed
management and limited
training in cyber security, malicious insiders and third parties
having access to a
company's network, but are not confined to them. Current
politicians, government bodies
and academic researchers have come to know the need to
improve cyber security
capabilities and increase awareness in the workforce and
leadership (Evans & Reeder,
2010). After the breach of Target Organization information in
2013, an empirical review
of the attack found that the Target security systems recognized
the intrusion. But the
management and the personnel involved in taking action lacked
the know-how and skills
necessary (Hershberger, 2014).
Cyber security is then built on cyber defense or on a series of
technical and non-technical
measures that allow a country to defend information systems
that are deemed essential to
the creation of cyberspace. Cyber security could then be called
a state desired by an
information system that would allow it to withstand cyberspace
events that might
jeopardize the reliability, integrity or privacy of the data stored,
processed, distributed and
the related services provided or made available by those
systems. It uses security
techniques of information systems and is based on cybercrime
combat and cyber defense.
As a prerequisite for technological growth and globalization
dynamics as well as a
resource for sustainable development, cyber security concerns
that entity (individual,
government, institutional, etc.) and represents thus cross-cutting
challenges. These
Webology, Volume 17, Number 2, December, 2020
291
http://www.webology.org
challenges range from the securing of IT and IT systems
(Industrial IT, IT management,
connected objects, etc.) to the economic, political and capacity-
building strategies
(Willemant and Foulgoc, 2016).
The current combination of the exponential increase in internet
flows and the increasing
connection between players and their information makes
cybersecurity a comprehensive
and global issue. In addition, through the Agenda for
Sustainable Development, the
Millennium Development Goals are one of 17 goals to be
reached in 2030 for
technological development and capacity building in this regi on.
In this regard cyber
security and cyber-crime prevention, as a means of ensuring this
space for trade and
growth, constitute major issues in this process. Estimates
suggest that cyber-attacks cost
the global economy about EUR 400 billion a year (El Melhem,
J., et al., 2019).
Government organizations are also vulnerable to cyber-attacks.
It has been shown over the
past 12 months that nearly 70% of organizations have reported
that a successful cyber-
attack has affected their security. 65 percent of organizations
say that there is a shortage
of qualified cyber response professionals. In a report, Kim and
Solarwinds reported that in
the United Kingdom Government in 2017, almost two-thirds of
the nation's largest
company was cyber-attacked over the past 12 months. Cyber
security is therefore an
important government priority. Data theft or cyber-attack could
cost government agencies
millions. It also harms an organization's image and can have
devastating consequences for
the people.
In their analysis, Saad et al. (2016) analyzed the need to
examine any gap in current
technology in network security at current times, thereby
promoting the intensification of
researchers ' expertise while finding answers to these potential
issues. Although such
systems might be more valuable, it is usually smaller networks,
such as a campus
network, that are vulnerable to hackers. They studied in their
paper the current field of
research based on a 6-fold survey, {what, where, how, who,
how} and developed a mental
map to catch lacunae and the opening doors to network safety
research.
Webology, Volume 17, Number 2, December, 2020
292
http://www.webology.org
Figure 1 Cyber-crime mitigation network security mind – map
Most cyber security attacks are due to human errors and
attackers focus more on human
vulnerability exploitation (Evans, M., et al., 2019; Kelly, R.,
2017; Islam, T., et al., 2019).
Consequently, it is increasingly important to understand human
functions in promoting
cyber security. Joins on and van Steen (2018) suggested the
incorporation of history,
actions and design for that reason of security tools and policies.
In the case of complex situations, Ganin et al. (2016) proposed
a multi-criteria policy
framework incorporating risk assessments (threat, vulnerability
and consequences) for
prioritizing countermeasures using user friendly technology.
Dykstra and Orr (2016)
proposed a human decision-making evaluation framework for
defining security risks and
responses context accordingly.
This research aimed to develop a strategic vision to combat
cybercrime to enhance cyber
security in Saudi Arabia through the following steps:
1. Identify the nature and types of cybercrime.
2. Knowledge of the nature and dimensions of cyber security.
Webology, Volume 17, Number 2, December, 2020
293
http://www.webology.org
3. Identify the reality of digital extremism and cyber terrorism
and its impact on cyber
security.
4. Know the role of combating cybercrime in promoting cyber
security.
5. Identify obstacles to combating cybercrime to enhance cyber
security.
Methodology
An online survey was carried out in which 16 cyber security
hazards rates were measured
on the basis of the previous research as an independent variable.
A total of 200 web users
were surveyed. The study was carried out. The students' risk
perception and precautionary
actions in terms of safety during internet usage were examined
through a qualitative
empiric on-line analysis with psychometric methods. The survey
found it clear that in
cases of crimes such as identity thieving, cyber bullying, social
engineering, and loggers,
the perceived risk increased. Among the most optimistic
predictors, we are afraid,
voluntarism, catastrophic and immediate threats. In addition the
top scores are Internet
competence and its level of use. In fact, regulation was an
important precautionary
measure. Identity theft was discerned as dangerous threat by
students.
Results and Discussion
The research results confirmed the approval of the members of
the study community to a
medium degree on the reality of digital extremism and cyber
terrorism as seen by the
researcher. Moreover, the approval of the members of the study
community was to a high
degree on the role of combating cybercrime in promoting human
security as seen by the
researcher. The members of the study community agreed with a
high degree on the
obstacles identified by the researcher to combat cyber -crimes to
enhance human security
in Saudi Arabia. There was a high approval of the study
community members on the
strategic vision developed by the researcher to combat cyber-
crimes to enhance human
security in Saudi Arabia.
Strategic Steps to Avoid Cyber Crimes
Monitoring and
alerts
Network monitoring and alerting settings to detect suspicious
activity are very important – a
malicious attacker should not be allowed to access and store
sensitive data on a peripheral
device by means of comprehensive system monitoring.
Risk management
decision-making
By means of a risk assessment, they can determine how assets
and a limited budget should be
expended. If the piece in question is downgraded or attacked by
a virus, it will access
technical equipment, software system and allocate monetary risk
value
Up-to-date
technology
The proper use of security technologies and the equipment
necessary: The company will
remain vulnerable to hackers by outdated computer firmware,
weak protocols and out - of-
date safety technology.
Security team
A well-trained professional staff should be able instantly to
protect sensitive and private
information – the IT department should be vigilant to know
about common threats
Knowledge is
power
To avoid cyber-crimes, maintaining good knowledge about
potential threats and attacks
Webology, Volume 17, Number 2, December, 2020
294
http://www.webology.org
Conclusion
This decade has seen an exponential increase in the number of
internet users. It's going on
all over the world. Each world now has the blessing and curse
of technology from
underdeveloped to developing and developed countries. Cyber -
attacks are increasing and
more complicated. This also increases. It's not restricted to a
state but is beyond the
boundaries to make things worse, unlike federal crimes.
Therefore, when there is no
proper infrastructure to combat it, it is more likely to remain
undetected.
The development of cyber security policy is at a turning point.
Cyber-security has become
a national priority, while the importance of' soverei gnty' is
increasing. National cyber
security policies are aimed at promoting economic and social
prosperity and at protecting
cyber-reliant societies against cyber risk. Common elements of
such approaches are
improving policy and organizational government coordination;
strengthening the
collaboration between public and private sectors; emphasizing
the need for fundamental
values such as the security of personal data, freedom of
expression and the free flow of
information; and calling for better international cooperation.
Recommendations
1. Promptly prepare a draft law called (Cyber Security Law)
that defines the controls of the
operators of telecommunications and Internet service providers
in the Kingdom of Saudi
Arabia, and promotes the fight against cybercrime and the
protection of the Saudi society
in cyberspace.
2. Establishing a national specialized cybersecurity authority to
protect Saudi's cyberspace
and enhance infrastructure security.
3. Establish a specialized prosecutor to investigate, confront
and control all types of
cybercrime.
4. Establishing a specific security unit at the Ministry of
Interior specialized in combating
cybercrime and its tasks (attached in detail to the strategic
vision).
5. The need to educate the Saudi society - individuals and
institutions - ways to protect
against cyber-crimes.
References
Dykstra, J.A., & Orr, S.R. (2016). Acting in the unknown: the
cynefin framework for
managing cyber security risk in dynamic decision making. In
IEEE International
Conference on Cyber Conflict (CyCon US), 1-6.
El Melhem, J., Bouras, A., & Ouzrout, Y. (2019). Toward a
Holistic Approach of
Cybersecurity Capacity Building through an Innovative
Transversal Sandwich Training.
Webology, Volume 17, Number 2, December, 2020
295
http://www.webology.org
In Industry Integrated Engineering and Computing Education,
Springer, Cham,
187-212.
Evans, M., He, Y., Maglaras, L., &Janicke, H. (2019). HEART-
IS: A novel technique for
evaluating human error-related information security incidents.
Computers & Security,
80, 74-89.
Ganin, A.A., Quach, P., Panwar, M., Collier, Z.A., Keisler,
J.M., Marchese, D., & Linkov, I.
(2017).Multi-criteria decision framework for cyber security risk
assessment and
management. Risk Analysis, 40(4).
Hershberger, P. (2014). Security skills assessment and training:
The “make or break” critical
security control. SANS Institute Info Sec Reading Room.
IBM. (2013). The 2013 IBM Cyber Security Intelligence
Index.IBM Security Services.
Islam, T., Becker, I., Posner, R., Ekblom, P., McGuire, M.,
Borrion, H., & Li, S. (2019). A
socio-technical and co-evolutionary framework for reducing
human-related risks in
cyber security and cybercrime ecosystems. In International
Conference on
Dependability in Sensor, Cloud, and Big Data Systems and
Applications, Springer,
Singapore, 277-293.
Joinson, A., & Steen, T.V. (2018). Human aspects of cyber
security: Behaviour or culture
change?. Cyber Security: A Peer-Reviewed Journal, 1(4), 351-
360.
Kelly, R. (2017). Almost 90% of cyber attacks are caused by
human error or behavior. Chief
Executive.net.
Kim, J. (2017). Cyber-security in government: reducing the
risk. Computer Fraud & Security,
7, 8-11.
Nagarajan, A., Allbeck, J.M., Sood, A., & Janssen, T.L.
(2012).Exploring game design for
cybersecurity training. In IEEE International Conference on
Cyber Technology in
Automation, Control, and Intelligent Systems (CYBER), 256-
262.
Saad, A., Amran, A.R., Afif II, Zolkeple, A.H., Said, A.I.A.,
Hamzah, M.F., & Salim,
W.N.S.W. (2016). Privacy and security gaps in mitigating
Cybercrime: The review.
In IEEE 2nd International Symposium on Agent, Multi-Agent
Systems and Robotics
(ISAMSR), 92-99.
Sarker, K., Rahman, H., Rahman, K.F., Arman, M., Biswas, S.,
& Bhuiyan, T. (2019). A
Comparative Analysis of the Cyber Security Strategy of
Bangladesh. International
Journal on Cybernetics & Informatics (IJCI), 8(2), 1-21.
Willemant, R., & Foulgoc, S. (2016). Legal Aspects of Cyber-
security. Action Canada Fr., 25,
18-19.

More Related Content

Similar to 1 School of Business, Economic, and Technology

8The SBTM Prospectus TemplateThe SBTM Prospectus is a stepping.docx
8The SBTM Prospectus TemplateThe SBTM Prospectus is a stepping.docx8The SBTM Prospectus TemplateThe SBTM Prospectus is a stepping.docx
8The SBTM Prospectus TemplateThe SBTM Prospectus is a stepping.docxransayo
 
Guidelines for-writing-thesis-or-dissertation
Guidelines for-writing-thesis-or-dissertationGuidelines for-writing-thesis-or-dissertation
Guidelines for-writing-thesis-or-dissertationAprilJoyDanielBigorn
 
Research project guidelines by nmims
Research project guidelines by nmimsResearch project guidelines by nmims
Research project guidelines by nmimsHarshita Wankhedkar
 
Mba dissertation
Mba dissertationMba dissertation
Mba dissertationMANOJ1121
 
.......Final worksheet manual synopsis
.......Final worksheet manual synopsis.......Final worksheet manual synopsis
.......Final worksheet manual synopsisInvisible_Vision
 
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docx
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docxChapter 1 IntroductionBackgroundIntroductionIn this section, .docx
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docxketurahhazelhurst
 
1 RSCH 600 Research Proposal writing RESEA
1  RSCH 600 Research Proposal writing    RESEA1  RSCH 600 Research Proposal writing    RESEA
1 RSCH 600 Research Proposal writing RESEAMartineMccracken314
 
1 RSCH 600 Research Proposal writing RESEA
1  RSCH 600 Research Proposal writing    RESEA1  RSCH 600 Research Proposal writing    RESEA
1 RSCH 600 Research Proposal writing RESEAAbbyWhyte974
 
Project documentation format
Project documentation formatProject documentation format
Project documentation formatYogeshDhamke2
 
How to write_the_scientific_report.ppt_2
How to write_the_scientific_report.ppt_2How to write_the_scientific_report.ppt_2
How to write_the_scientific_report.ppt_2researchcenterm
 
14Dissertation ProspectusInsert Prospectus Title Sub.docx
14Dissertation ProspectusInsert Prospectus Title Sub.docx14Dissertation ProspectusInsert Prospectus Title Sub.docx
14Dissertation ProspectusInsert Prospectus Title Sub.docxaulasnilda
 
How to write academic article
How to write academic articleHow to write academic article
How to write academic articleAlinaV7
 
Mbs thesis format 470490
Mbs thesis format 470490Mbs thesis format 470490
Mbs thesis format 470490Ganesh Regmi
 
How to write a Research Paper1. Discussion (How to write a Resea.docx
How to write a Research Paper1. Discussion (How to write a Resea.docxHow to write a Research Paper1. Discussion (How to write a Resea.docx
How to write a Research Paper1. Discussion (How to write a Resea.docxpooleavelina
 
BA634 Current & Emerging TechnologyResearch PaperUnderstanding.docx
BA634 Current & Emerging TechnologyResearch PaperUnderstanding.docxBA634 Current & Emerging TechnologyResearch PaperUnderstanding.docx
BA634 Current & Emerging TechnologyResearch PaperUnderstanding.docxwilcockiris
 
Report and structures
Report and structures Report and structures
Report and structures Salman Jailani
 
Formal Research Report or QAResearch Report Individual Project (4
Formal Research Report or QAResearch Report  Individual Project (4Formal Research Report or QAResearch Report  Individual Project (4
Formal Research Report or QAResearch Report Individual Project (4ShainaBoling829
 
Part 3 (Due 11915)To begin, work through the .docx
Part 3 (Due 11915)To begin, work through the .docxPart 3 (Due 11915)To begin, work through the .docx
Part 3 (Due 11915)To begin, work through the .docxherbertwilson5999
 

Similar to 1 School of Business, Economic, and Technology (20)

8The SBTM Prospectus TemplateThe SBTM Prospectus is a stepping.docx
8The SBTM Prospectus TemplateThe SBTM Prospectus is a stepping.docx8The SBTM Prospectus TemplateThe SBTM Prospectus is a stepping.docx
8The SBTM Prospectus TemplateThe SBTM Prospectus is a stepping.docx
 
Guidelines for-writing-thesis-or-dissertation
Guidelines for-writing-thesis-or-dissertationGuidelines for-writing-thesis-or-dissertation
Guidelines for-writing-thesis-or-dissertation
 
Research project guidelines by nmims
Research project guidelines by nmimsResearch project guidelines by nmims
Research project guidelines by nmims
 
Mba dissertation
Mba dissertationMba dissertation
Mba dissertation
 
.......Final worksheet manual synopsis
.......Final worksheet manual synopsis.......Final worksheet manual synopsis
.......Final worksheet manual synopsis
 
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docx
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docxChapter 1 IntroductionBackgroundIntroductionIn this section, .docx
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docx
 
1 RSCH 600 Research Proposal writing RESEA
1  RSCH 600 Research Proposal writing    RESEA1  RSCH 600 Research Proposal writing    RESEA
1 RSCH 600 Research Proposal writing RESEA
 
1 RSCH 600 Research Proposal writing RESEA
1  RSCH 600 Research Proposal writing    RESEA1  RSCH 600 Research Proposal writing    RESEA
1 RSCH 600 Research Proposal writing RESEA
 
Project documentation format
Project documentation formatProject documentation format
Project documentation format
 
Thesis 11022011 1129
Thesis 11022011 1129Thesis 11022011 1129
Thesis 11022011 1129
 
How to write_the_scientific_report.ppt_2
How to write_the_scientific_report.ppt_2How to write_the_scientific_report.ppt_2
How to write_the_scientific_report.ppt_2
 
14Dissertation ProspectusInsert Prospectus Title Sub.docx
14Dissertation ProspectusInsert Prospectus Title Sub.docx14Dissertation ProspectusInsert Prospectus Title Sub.docx
14Dissertation ProspectusInsert Prospectus Title Sub.docx
 
How to write academic article
How to write academic articleHow to write academic article
How to write academic article
 
Mbs thesis format 470490
Mbs thesis format 470490Mbs thesis format 470490
Mbs thesis format 470490
 
How to write a Research Paper1. Discussion (How to write a Resea.docx
How to write a Research Paper1. Discussion (How to write a Resea.docxHow to write a Research Paper1. Discussion (How to write a Resea.docx
How to write a Research Paper1. Discussion (How to write a Resea.docx
 
BA634 Current & Emerging TechnologyResearch PaperUnderstanding.docx
BA634 Current & Emerging TechnologyResearch PaperUnderstanding.docxBA634 Current & Emerging TechnologyResearch PaperUnderstanding.docx
BA634 Current & Emerging TechnologyResearch PaperUnderstanding.docx
 
Report and structures
Report and structures Report and structures
Report and structures
 
12 rm the thesis writing
12 rm the thesis writing12 rm the thesis writing
12 rm the thesis writing
 
Formal Research Report or QAResearch Report Individual Project (4
Formal Research Report or QAResearch Report  Individual Project (4Formal Research Report or QAResearch Report  Individual Project (4
Formal Research Report or QAResearch Report Individual Project (4
 
Part 3 (Due 11915)To begin, work through the .docx
Part 3 (Due 11915)To begin, work through the .docxPart 3 (Due 11915)To begin, work through the .docx
Part 3 (Due 11915)To begin, work through the .docx
 

More from AbbyWhyte974

1. Use Postman” to test API at  httpspostman-echo.coma. Use
1. Use Postman” to test API at  httpspostman-echo.coma. Use1. Use Postman” to test API at  httpspostman-echo.coma. Use
1. Use Postman” to test API at  httpspostman-echo.coma. UseAbbyWhyte974
 
1. Use the rubric to complete the assignment and pay attention t
1. Use the rubric to complete the assignment and pay attention t1. Use the rubric to complete the assignment and pay attention t
1. Use the rubric to complete the assignment and pay attention tAbbyWhyte974
 
1. True or false. Unlike a merchandising business, a manufacturing
1. True or false. Unlike a merchandising business, a manufacturing1. True or false. Unlike a merchandising business, a manufacturing
1. True or false. Unlike a merchandising business, a manufacturingAbbyWhyte974
 
1. Top hedge fund manager Sally Buffit believes that a stock with
1. Top hedge fund manager Sally Buffit believes that a stock with 1. Top hedge fund manager Sally Buffit believes that a stock with
1. Top hedge fund manager Sally Buffit believes that a stock with AbbyWhyte974
 
1. This question is on the application of the Binomial option
1. This question is on the application of the Binomial option1. This question is on the application of the Binomial option
1. This question is on the application of the Binomial optionAbbyWhyte974
 
1. Tiktaalik httpswww.palaeocast.comtiktaalikW
1. Tiktaalik        httpswww.palaeocast.comtiktaalikW1. Tiktaalik        httpswww.palaeocast.comtiktaalikW
1. Tiktaalik httpswww.palaeocast.comtiktaalikWAbbyWhyte974
 
1. This week, we learned about the balanced scorecard and dashboar
1. This week, we learned about the balanced scorecard and dashboar1. This week, we learned about the balanced scorecard and dashboar
1. This week, we learned about the balanced scorecard and dashboarAbbyWhyte974
 
1. The company I chose was Amazon2.3.4.1) Keep i
1. The company I chose was Amazon2.3.4.1) Keep i1. The company I chose was Amazon2.3.4.1) Keep i
1. The company I chose was Amazon2.3.4.1) Keep iAbbyWhyte974
 
1. Think about a persuasive speech that you would like to present
1. Think about a persuasive speech that you would like to present 1. Think about a persuasive speech that you would like to present
1. Think about a persuasive speech that you would like to present AbbyWhyte974
 
1. The two properties about a set of measurements of a dependent v
1. The two properties about a set of measurements of a dependent v1. The two properties about a set of measurements of a dependent v
1. The two properties about a set of measurements of a dependent vAbbyWhyte974
 
1. The Danube River flows through 10 countries. Name them in the s
1. The Danube River flows through 10 countries. Name them in the s1. The Danube River flows through 10 countries. Name them in the s
1. The Danube River flows through 10 countries. Name them in the sAbbyWhyte974
 
1. The 3 genes that you will compare at listed below. Take a look.
1. The 3 genes that you will compare at listed below. Take a look.1. The 3 genes that you will compare at listed below. Take a look.
1. The 3 genes that you will compare at listed below. Take a look.AbbyWhyte974
 
1. Student and trainer detailsStudent details Full nameStu
1. Student and trainer detailsStudent details  Full nameStu1. Student and trainer detailsStudent details  Full nameStu
1. Student and trainer detailsStudent details Full nameStuAbbyWhyte974
 
1. Student uses MS Excel to calculate income tax expense or refund
1. Student uses MS Excel to calculate income tax expense or refund1. Student uses MS Excel to calculate income tax expense or refund
1. Student uses MS Excel to calculate income tax expense or refundAbbyWhyte974
 
1. Socrates - In your view, what was it about Socrates’ teachings
1. Socrates - In your view, what was it about Socrates’ teachings 1. Socrates - In your view, what was it about Socrates’ teachings
1. Socrates - In your view, what was it about Socrates’ teachings AbbyWhyte974
 
1. Select a patient” (friend or family member) on whom to perform
1. Select a patient” (friend or family member) on whom to perform1. Select a patient” (friend or family member) on whom to perform
1. Select a patient” (friend or family member) on whom to performAbbyWhyte974
 
1. Respond to your classmates’ question and post. Submission to y
1. Respond to your classmates’ question and post.  Submission to y1. Respond to your classmates’ question and post.  Submission to y
1. Respond to your classmates’ question and post. Submission to yAbbyWhyte974
 
1. Review the HCAPHS survey document, by clicking on the hyperlink
1. Review the HCAPHS survey document, by clicking on the hyperlink1. Review the HCAPHS survey document, by clicking on the hyperlink
1. Review the HCAPHS survey document, by clicking on the hyperlinkAbbyWhyte974
 
1. Saint Leo Portal loginUser ID[email protected]
1. Saint Leo Portal loginUser ID[email protected]          1. Saint Leo Portal loginUser ID[email protected]
1. Saint Leo Portal loginUser ID[email protected] AbbyWhyte974
 
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...pleaAbbyWhyte974
 

More from AbbyWhyte974 (20)

1. Use Postman” to test API at  httpspostman-echo.coma. Use
1. Use Postman” to test API at  httpspostman-echo.coma. Use1. Use Postman” to test API at  httpspostman-echo.coma. Use
1. Use Postman” to test API at  httpspostman-echo.coma. Use
 
1. Use the rubric to complete the assignment and pay attention t
1. Use the rubric to complete the assignment and pay attention t1. Use the rubric to complete the assignment and pay attention t
1. Use the rubric to complete the assignment and pay attention t
 
1. True or false. Unlike a merchandising business, a manufacturing
1. True or false. Unlike a merchandising business, a manufacturing1. True or false. Unlike a merchandising business, a manufacturing
1. True or false. Unlike a merchandising business, a manufacturing
 
1. Top hedge fund manager Sally Buffit believes that a stock with
1. Top hedge fund manager Sally Buffit believes that a stock with 1. Top hedge fund manager Sally Buffit believes that a stock with
1. Top hedge fund manager Sally Buffit believes that a stock with
 
1. This question is on the application of the Binomial option
1. This question is on the application of the Binomial option1. This question is on the application of the Binomial option
1. This question is on the application of the Binomial option
 
1. Tiktaalik httpswww.palaeocast.comtiktaalikW
1. Tiktaalik        httpswww.palaeocast.comtiktaalikW1. Tiktaalik        httpswww.palaeocast.comtiktaalikW
1. Tiktaalik httpswww.palaeocast.comtiktaalikW
 
1. This week, we learned about the balanced scorecard and dashboar
1. This week, we learned about the balanced scorecard and dashboar1. This week, we learned about the balanced scorecard and dashboar
1. This week, we learned about the balanced scorecard and dashboar
 
1. The company I chose was Amazon2.3.4.1) Keep i
1. The company I chose was Amazon2.3.4.1) Keep i1. The company I chose was Amazon2.3.4.1) Keep i
1. The company I chose was Amazon2.3.4.1) Keep i
 
1. Think about a persuasive speech that you would like to present
1. Think about a persuasive speech that you would like to present 1. Think about a persuasive speech that you would like to present
1. Think about a persuasive speech that you would like to present
 
1. The two properties about a set of measurements of a dependent v
1. The two properties about a set of measurements of a dependent v1. The two properties about a set of measurements of a dependent v
1. The two properties about a set of measurements of a dependent v
 
1. The Danube River flows through 10 countries. Name them in the s
1. The Danube River flows through 10 countries. Name them in the s1. The Danube River flows through 10 countries. Name them in the s
1. The Danube River flows through 10 countries. Name them in the s
 
1. The 3 genes that you will compare at listed below. Take a look.
1. The 3 genes that you will compare at listed below. Take a look.1. The 3 genes that you will compare at listed below. Take a look.
1. The 3 genes that you will compare at listed below. Take a look.
 
1. Student and trainer detailsStudent details Full nameStu
1. Student and trainer detailsStudent details  Full nameStu1. Student and trainer detailsStudent details  Full nameStu
1. Student and trainer detailsStudent details Full nameStu
 
1. Student uses MS Excel to calculate income tax expense or refund
1. Student uses MS Excel to calculate income tax expense or refund1. Student uses MS Excel to calculate income tax expense or refund
1. Student uses MS Excel to calculate income tax expense or refund
 
1. Socrates - In your view, what was it about Socrates’ teachings
1. Socrates - In your view, what was it about Socrates’ teachings 1. Socrates - In your view, what was it about Socrates’ teachings
1. Socrates - In your view, what was it about Socrates’ teachings
 
1. Select a patient” (friend or family member) on whom to perform
1. Select a patient” (friend or family member) on whom to perform1. Select a patient” (friend or family member) on whom to perform
1. Select a patient” (friend or family member) on whom to perform
 
1. Respond to your classmates’ question and post. Submission to y
1. Respond to your classmates’ question and post.  Submission to y1. Respond to your classmates’ question and post.  Submission to y
1. Respond to your classmates’ question and post. Submission to y
 
1. Review the HCAPHS survey document, by clicking on the hyperlink
1. Review the HCAPHS survey document, by clicking on the hyperlink1. Review the HCAPHS survey document, by clicking on the hyperlink
1. Review the HCAPHS survey document, by clicking on the hyperlink
 
1. Saint Leo Portal loginUser ID[email protected]
1. Saint Leo Portal loginUser ID[email protected]          1. Saint Leo Portal loginUser ID[email protected]
1. Saint Leo Portal loginUser ID[email protected]
 
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

1 School of Business, Economic, and Technology

  • 1. 1 School of Business, Economic, and Technology Campbellsville University- Louisville Center Research Report Guide A Guide for CU Graduate Students ©2017, Dr Vincent Scovetta Campbellsville University. All rights reserved. 4/20/2020
  • 2. 2 Table of Contents The Research Report ............................................................................................... ....................................... 4 Chapter 1- Background/Introduction (3 – 4 pages) ....................................................................................... 4 Introduction ............................................................................................... ..................................................... 4 Problem Statement and Purpose of Research ............................................................................................... . 4 Relevance and Significance ............................................................................................... ............................ 4 Research Questions ............................................................................................... ......................................... 5 Barriers and Issues ............................................................................................... .......................................... 5 Chapter 2 - Review of the Literature (6-8 pages) .......................................................................................... 5 Chapter 3 - Approach/Methodology (1 - 2 pages)
  • 3. ......................................................................................... 5 Chapter 4: Findings, Analysis, and Summary of Results (2 - 4 pages) ......................................................... 5 Chapter 5: Conclusions (2 - 4 pages) ............................................................................................... .............. 5 References ............................................................................................... ....................................................... 6 Research Report Structure ............................................................................................... .............................. 6 Front Matter..................................................................................... ........................................................... 6 Chapter 1 through 5 (12 pages): ............................................................................................... .................. 6 Back Matter: ............................................................................................... ................................................ 6 Document Preparation – Form and Style ............................................................................................... ........ 6 References and Citations ............................................................................................... ............................. 7
  • 4. Margins................................................................................... .................................................................... 7 Line Spacing ............................................................................................... ................................................ 7 Paragraph Spacing ............................................................................................... ....................................... 8 Page Numbering ............................................................................................... .......................................... 8 Type Style ............................................................................................... ................................................... 8 Title Page........................................................................................ ............................................................ 8 The Abstract ............................................................................................... ................................................ 8 Chapter Title, Heading 1, Heading 2............................................................................................. ............. 8 Tables and Figures in the Text Body ............................................................................................... .......... 9
  • 5. Appendix ....................................................................................... ........ ..................................................... 9 Additional Resources ............................................................................................... ...................................... 9 Sample First Page of Table of Contents ............................................................................................... ....... 11 Sample Reference List ............................................................................................... .................................. 12 3 4 The Research Report The Research Report serves as the deliverable towards partial completion of the requirement for BA634. The
  • 6. requirement of your research is expected to be built and constitutes the five-chapter model. This document is not intended to be a one-time or static document. The Research Report needs to be at least 14 pages and is written in the past and present tense, as appropriate. The Research Report should be a complete and concise document that establishes your credentials as a relative expert in the domain of your study. In all cases, a good understanding of the specific domain will be necessary for the successful completion of your study. It is vital that you stay current in the literature germane to the study you are conducting and update the chapters accordingly. The following is the general structure of the Research Report Font Style: Times New Roman throughout the document Font color: Black (including headings) Chapter 1- Background/Introduction (3 – 4 pages) In this section, present enough information about the proposed work so that the reader understands the general context or setting. It is also helpful to include a summary of how this document is organized. Introduction This section introduces the reader to the structural content of your Research Report
  • 7. Problem Statement and Purpose of Research In this section, present a concise statement of a research-worthy problem to be addressed (i.e., why the work should be undertaken – don’t state “it was a requirement of the professor”). Follow the statement of the problem with a well-supported discussion of its scope and nature. The discussion of the problem should include: what the problem is, why it is a problem, how the problem evolved or developed, and the issues and events leading to the problem. Your problem statement must be clear, concise, to the point and able to be articulated in no more than three sentences. Relevance and Significance This section provides the necessary support for both the problem statement of your study. Consider the following questions and support your discussion by citing the research literature: affected? far-ranging is the problem and how great is its impact? What’s the benefit of solving the problem? Why weren’t those attempts successful? roblem?
  • 8. problem and how will your proposed study offer promise as a resolution to the problem? 5 zation of your results? Research Questions In this section you will define the research questions you expect to answer in your finding / results / conclusion sections. The research question(s) must be directly related to the problem statement and introduce the reader to their respective relationships. The answers to the research question(s) need to be either qualitative or quantitative. Barriers and Issues In this section, identify how the problem is inherently difficult to solve. You should also show how the solution you propose are difficult to obtain (unlike a book report). You should show the study you propose is of adequate difficulty to warrant a successful grade assignment.
  • 9. Chapter 2 - Review of the Literature (6-8 pages) In this section, it is important to clearly identify the major areas on which you will need to focus your research in order to build a solid foundation for your study in the existing body of knowledge. The literature review is the presentation of quality literature in a particular field that serves as the foundation and justification for the research problem, research questions or hypothesis, and methodology. You will develop a more comprehensive review of the literature as part of your report. Chapter 3 - Approach/Methodology (1 - 2 pages) Describe how you plan to address your research problem and accomplish your stated goal. List the major steps that must be taken to accomplish the goal and include a preliminary discussion of the methodology and specific research methods you plan to implement. Although specific details are not required at this point, you must provide adequate discussion of the general process you will follow to implement your research methodology. Chapter 4: Findings, Analysis, and Summary of Results (2 - 4 pages) Chapter 4 includes an objective description and analysis of the findings, results or outcomes of the research. Limit the use of charts, tables, figures to those that are needed to support the narrative. Most of these illustrations can
  • 10. be included as part of the Appendixes. The following topics are intended to serve as a guide: ssion Chapter 5: Conclusions (2 - 4 pages) - Clearly state the conclusions of the study based on the analysis performed and results achieved. Indicate by the evidence or logical development the extent to which the specified objectives have been 6 accomplished. If the research has been guided by hypotheses, make a statement as to whether the data supported or rejected these hypotheses. Discuss alternative explanations for the findings, if appropriate. Delineate strengths, weaknesses, and limitations of the study. - Discuss the impact of the work on the field of study and its contributions to knowledge and professional practice. Discuss implications for future research.
  • 11. - Present recommendations for future research or for changes in research methods or theoretical concepts. As appropriate, present recommendations for changes in academic practice, professional practice, or organizational procedures, practices, and behavior. References Follow the most current version of APA to format your references. However, each reference should be single- spaced with a double space between each cited entry. Make sure that every citation is referenced and every reference is cited. Research Report Structure Notes: final grade of your report. Do not add extra space to your document in an effort to extend the page count. Front Matter o Title Page o Abstract o Table of Contents o List of Tables o List of Figures Chapter 1 through 5 (12 pages): Back Matter:
  • 12. o Appendixes o References Document Preparation – Form and Style Form and style guidelines for a Research Report serve a number of purposes: to ease adaptation of the document for publication in whole or part, to ensure a level of professional appearance, and ease the burden on the readers of the document by presenting material in a logical, consistent fashion. Nevertheless, form and style guidelines should not be burdensome for Peer Reviewer or Professor. The bulk of the effort in developing and mentoring a Research Report should certainly be directed toward the quality of the thoughts being presented, not the 7 appearance of that presentation. The current edition of the Publication Manual of the American Psychological Association serves as the primary guide for format and style. Since that manual focuses primarily on publication in journals, some exceptions are
  • 13. necessary for a Research Report. The Research Report guidelines are amplified with examples of: • Title Page (Appendix A) • Table of Contents (Appendix E) • List of Tables (Appendix F) • List of Figures (Appendix G) • First Page of a Chapter (Appendix H) • Appendix Pages (Appendix I) • Reference List (Appendix J) References and Citations One of the most important tasks in writing a Research Report is to reference other works and sources in the text body. You must provide a formal reference citation for each idea or statement taken from the work of an individual or organization. Failure to provide a reference citation, when one is appropriate, is plagiarism, which is a violation of the university’s Code of Student Conduct and Academic Responsibility. An act of plagiarism will subject the student to disciplinary action including suspension or expulsion from the university. Always err on the side of caution when writing any formal paper. As you conduct your work, keep accurate records that indicate which portions of your Research Report are not your own words and ideas. If you attempt to do this as an afterthought, you run the risk of losing the source of the information and committing plagiarism. Reference
  • 14. citations in the text should use the author-date citation system specified in the current edition of the Publication Manual of the American Psychological Association. All reference citations must be listed alphabetically in the References section at the end of the document, again following the format specified in the current edition of the Publication Manual of the American Psychological Association. However, each reference should be single- spaced with a double space in between each entry. Make sure that every citation is referenced and every reference is cited. Margins The left-hand margin must be 1.5 inches (4 cm.). Margins at the right, top, and bottom of the page should be 1.0 inch. (See exception for chapter title pages below.) The Research Report text must be left-aligned (leaving a ragged right edge). Line Spacing Double-spacing is required for most of the text in documents submitted during the Research Report process. Pages for the abstract, acknowledgments, and parts of the table of contents, however, must be single-spaced in the Research Report. Single-spacing also can be used for table titles and headings, figure captions, references in
  • 15. a reference list (but double-spacing is required between references in the list), footnotes, and long quotations. Long quotations may be indented five spaces. Judicial triple can improve appearance and readability and is appropriate after chapter titles, before major subheadings, before footnotes, and before and after tables in the text; however, avoid open white spaces. 8 Paragraph Spacing The text of the document is double-spaced. There should be no extra spaces between paragraphs in sections; however, indent the first line of paragraphs five spaces (1/2 inch). Chapters must begin on new pages. Page Numbering Page numbers for the front matter, starting with the Table of Contents, should be lowercase roman numerals, centered at the bottom of the page. All pages following the front matter should have page numbers in Arabic numerals in the upper right-hand corner. The page order and numbering for the front matter is: 1. Title page is page i, but the page number is not printed. 2. Approval Signature page is page ii, but the page number is
  • 16. not printed. 3. Abstract is page iii but the page number is not printed. 4. Acknowledgements is page iv and not to exceed one page. The page number is not printed. 5. Table of Contents is page v and the page number is printed, bottom center. 6. List of Tables (only present if the document contains tables) is given the next page number in sequence, printed bottom center. 7. List of Figures (only present if the document contains figures) is given the next page number in sequence, printed bottom center. Type Style For body text, you should use 12-point Times New Roman. Text for the cover page may be larger but should not exceed 14-point size. Text for the chapter title text should be 14-point size. Be consistent in your use of typefaces throughout the document. Do not use a compressed typeface or any settings on your word processor that would decrease the spacing between letters or words. Sans serif typefaces such as Helvetica or Arial may be used for relatively short blocks of text such as chapter headings and captions but should be avoided in long passages of text as they impede readability.
  • 17. Title Page Every document that is submitted, from the Research Report, must have a title page. The title page includes the exact title of the Master’s Thesis, date of submission, your name, and name of the department which the report is submitted. Use the format of the Sample Research Report Title Page provided in Appendix A. The Abstract The abstract (see Appendix es C) is single spaced. An abstract is a stand-alone document and therefore, should not include citations because it would then need references. Note that the abstract must be fewer than 200 words. Chapter Title, Heading 1, Heading 2 It is preferred that Research Report contain no more than three levels of headings in the body text. All headings should have only the first letter of each word capitalized except that non-major words shorter than four letters have no capital letters. See Appendix H for a sample page for a first page of a chapter. Instructions for heading levels follow: Level 1: Chapter Title
  • 18. 9 This heading starts two inches from the top of the page, is centered on the page, and is set in 14point type. The first line contains the chapter number (e.g., Chapter 4). The second line is blank. The third line displays the chapter title, is centered on the page, and is set in 14-point type. Level 2: Heading 1 Start heading 1 at the left margin of the page, four spaces (i.e., two returns when your document is set for double-spacing) down from the title, set in bold 12-point type. Double-space (one return) to the subheading body text. Indent the first line of the body text five spaces. Level 3: Heading 2 Start the heading 2 at the left margin of the page, double-spaced (i.e., one return when your document is set up for double-spacing) from the subheading, set in 12-point italics. Double-space (one return) to the sub-subheading body text. Indent the first line of the body text five spaces. Tables and Figures in the Text Body Charts, graphs, diagrams, figures, and summary tables that
  • 19. significantly enhance reading of the Research Report should be placed in the text body. Only include material in the text body that is needed by the reader to understand the point(s) you are trying to make. Other material should be placed in Appendixes. Tables that summarize large amounts of data are best placed at the end of the Master’s Thesis. If you have included data in your text related to some point, then the full table containing such data belongs in an Appendix. When using tables and figures in the body of the paper, remember that the horizontal center of the body is not at the center of the paper. It is 0.25” to the right of center due to the 1.5” left binding margin. All tables and figures that are less than body width must be centered properly. Samples of a table and figure appear in Appendixes L and M. Appendix Place in appropriate appendices all analytical tables, evaluation instruments, and other material important in the determination, evaluation, analysis, and description of your research that is not contained in the text body (see section above). Use an Appendix to present material that supplements the text or may be of interest to readers but is too detailed or distracting for inclusion in the main body of the text. Surveys, evaluation instruments, original
  • 20. data, complicated mathematical tables, new computer programs, computer printouts, and data collection forms are examples of materials that are most appropriately appended. Do not exclude material that would be necessary for another researcher to replicate your work and that is not available elsewhere. Include copies of IRB permission from the sponsoring organization and from the study site. Present copies of all letters and e-mails that allow you to use and modify materials belonging to others. If appropriate, you may use a titled cover sheet for an Appendix. Additional Resources American Psychological Association (2010). Publication manual of the American Psychological Association. (6 th ed.). Washington, D.C.: Author. Bolker, J. (1998). Writing your Research Reportin fifteen minutes a day: A guide to starting, revising, and finishing your doctoral thesis. New York, NY: Henry Holt Publishing. 10
  • 21. Kiernan, V (2005). Writing Your Dissertation with Microsoft Word. MattilyPublishing, Alexandria, Virginia 11 Sample First Page of Table of Contents Table of Contents Abstract iii List of Tables (if necessary) viii (your actual page number may be different) List of Figures (if necessary) ix (your actual page number may be different) Chapters 1. Introduction 2. Review of the Literature
  • 22. etc. 3 . Methodology 4. Findings, Analysys, Results, 5. Conclusions, Implications, and Recommendations tions 123 Appendices A. xxxxxxxxxxxxxxxxx 140 B. xxxxxxxxxxxxxxxxxxxxxxx 148 C. xxxxxxxxxxxxxxx 155 etc. Reference List 198
  • 23. Note: Count and print the number of this page centered here in lowercase Roman. 12 Sample Reference List American Psychological Association (2010). Publication manual of the American Psychological Association. (6 th ed.). Washington, D.C.: Author. Bolker, J. (1998). Writing your Research Reportin fifteen minutes a day: A guide to starting, revising, and finishing your doctoral thesis. New York, NY: Henry Holt Publishing. Kiernan, V (2005). Writing Your Dissertation with Microsoft Word. MattilyPublishing, Alexandria, Virginia
  • 24.
  • 25. Webology, Volume 17, Number 2, December, 2020 289 http://www.webology.org A Strategic Vision to Reduce Cybercrime to Enhance Cyber Security Mohammed I. Alghamdi Department of Computer Science, Al-Baha University, Al-Baha City, Kingdom of Saudi Arabia. E-mail: [email protected] Received June 15, 2020; Accepted August 18, 2020 ISSN: 1735-188X DOI: 10.14704/WEB/V17I2/WEB17031 Abstract The cyber-security development for future generations is at stake as a global concern. The
  • 26. existing strategic and policy structures on cyber security and awareness-raising at many levels needs more investigation in order to formulate workable and efficient strategic vision that addresses actual needs and challenges. The justification for this work is therefore to test the robustness, in contrast with some of the most technologically advanced countries on the Asian Continent and others like the USA, Japan, of Saudi Arabia's current cyber security strategy in order to keep the NCSS up-to-date. This research aimed to develop a strategic vision to combat cybercrime to enhance cyber security. The research results confirmed the approval of the members of the study community to a medium degree on the reality of digital extremism and cyber terrorism as seen by the researcher. Moreover, the approval of the members of the study community was to a high degree on the role of combating cybercrime in promoting human security as seen by the researcher. The members of the study community agreed with a high degree on the obstacles identified by the researcher to combat cyber-crimes to enhance
  • 27. human security in Saudi Arabia. There was a high approval of the study community members on the strategic vision developed by the researcher to combat cyber-crimes to enhance human security in Saudi Arabia. Keywords Cyber-Security, Strategic Vision, National Network for Cyber Security (NCSS), Cyber-Crime Prevention. Introduction Technology is a continually changing expression in modern times, which has enhanced security concerns and driven us to build a cyber-environment. A country's National Network for Cyber Security (NCSS) reflects the cyber strength of the country, which is a target and vision for a country's cyber safety. Researchers worked on NCSS by comparing
  • 28. Webology, Volume 17, Number 2, December, 2020 290 http://www.webology.org NCSS for international cooperation and harmonization between various nations and some researchers worked for their respective governments in the policy framework (Sarker, K., et al., 2019). The Internet has become a basic and critical need for people's lives and socio-economic activities. Although it facilitates things for people, it also creates new risks. Never stopped cyber-attacks and never will they, but they exponentially increase instead. That country therefore needs an ICT infrastructure secure, efficient and robust. There can be a high risk of a poor ICT infrastructure. Every interested cyber intelligence specialist can use ICT to manipulate state-of-the-art government and industry classified information. However very small attempts were made to estimate Saudi Arabia's strategic strength in the NCSS by
  • 29. comparing the NCSS of the various nations. Training in cyber-security is an effective response to an increasing number of intrusions and attacks (Nagarajan et al., 2012). 80 percent of all vulnerabilities exploited by hackers are due to human vulnerabilities (IBM, 2013) but cyber security is a priority of information technology on tools and technologies (Hershberger, 2014). Human vulnerabilities include employee incompetence, misinformed management and limited training in cyber security, malicious insiders and third parties having access to a company's network, but are not confined to them. Current politicians, government bodies and academic researchers have come to know the need to improve cyber security capabilities and increase awareness in the workforce and leadership (Evans & Reeder, 2010). After the breach of Target Organization information in 2013, an empirical review of the attack found that the Target security systems recognized the intrusion. But the
  • 30. management and the personnel involved in taking action lacked the know-how and skills necessary (Hershberger, 2014). Cyber security is then built on cyber defense or on a series of technical and non-technical measures that allow a country to defend information systems that are deemed essential to the creation of cyberspace. Cyber security could then be called a state desired by an information system that would allow it to withstand cyberspace events that might jeopardize the reliability, integrity or privacy of the data stored, processed, distributed and the related services provided or made available by those systems. It uses security techniques of information systems and is based on cybercrime combat and cyber defense. As a prerequisite for technological growth and globalization dynamics as well as a resource for sustainable development, cyber security concerns that entity (individual, government, institutional, etc.) and represents thus cross-cutting challenges. These
  • 31. Webology, Volume 17, Number 2, December, 2020 291 http://www.webology.org challenges range from the securing of IT and IT systems (Industrial IT, IT management, connected objects, etc.) to the economic, political and capacity- building strategies (Willemant and Foulgoc, 2016). The current combination of the exponential increase in internet flows and the increasing connection between players and their information makes cybersecurity a comprehensive and global issue. In addition, through the Agenda for Sustainable Development, the Millennium Development Goals are one of 17 goals to be reached in 2030 for technological development and capacity building in this regi on. In this regard cyber security and cyber-crime prevention, as a means of ensuring this space for trade and
  • 32. growth, constitute major issues in this process. Estimates suggest that cyber-attacks cost the global economy about EUR 400 billion a year (El Melhem, J., et al., 2019). Government organizations are also vulnerable to cyber-attacks. It has been shown over the past 12 months that nearly 70% of organizations have reported that a successful cyber- attack has affected their security. 65 percent of organizations say that there is a shortage of qualified cyber response professionals. In a report, Kim and Solarwinds reported that in the United Kingdom Government in 2017, almost two-thirds of the nation's largest company was cyber-attacked over the past 12 months. Cyber security is therefore an important government priority. Data theft or cyber-attack could cost government agencies millions. It also harms an organization's image and can have devastating consequences for the people. In their analysis, Saad et al. (2016) analyzed the need to examine any gap in current
  • 33. technology in network security at current times, thereby promoting the intensification of researchers ' expertise while finding answers to these potential issues. Although such systems might be more valuable, it is usually smaller networks, such as a campus network, that are vulnerable to hackers. They studied in their paper the current field of research based on a 6-fold survey, {what, where, how, who, how} and developed a mental map to catch lacunae and the opening doors to network safety research. Webology, Volume 17, Number 2, December, 2020 292 http://www.webology.org Figure 1 Cyber-crime mitigation network security mind – map Most cyber security attacks are due to human errors and attackers focus more on human
  • 34. vulnerability exploitation (Evans, M., et al., 2019; Kelly, R., 2017; Islam, T., et al., 2019). Consequently, it is increasingly important to understand human functions in promoting cyber security. Joins on and van Steen (2018) suggested the incorporation of history, actions and design for that reason of security tools and policies. In the case of complex situations, Ganin et al. (2016) proposed a multi-criteria policy framework incorporating risk assessments (threat, vulnerability and consequences) for prioritizing countermeasures using user friendly technology. Dykstra and Orr (2016) proposed a human decision-making evaluation framework for defining security risks and responses context accordingly. This research aimed to develop a strategic vision to combat cybercrime to enhance cyber security in Saudi Arabia through the following steps: 1. Identify the nature and types of cybercrime. 2. Knowledge of the nature and dimensions of cyber security.
  • 35. Webology, Volume 17, Number 2, December, 2020 293 http://www.webology.org 3. Identify the reality of digital extremism and cyber terrorism and its impact on cyber security. 4. Know the role of combating cybercrime in promoting cyber security. 5. Identify obstacles to combating cybercrime to enhance cyber security. Methodology An online survey was carried out in which 16 cyber security hazards rates were measured on the basis of the previous research as an independent variable. A total of 200 web users were surveyed. The study was carried out. The students' risk perception and precautionary actions in terms of safety during internet usage were examined through a qualitative empiric on-line analysis with psychometric methods. The survey found it clear that in
  • 36. cases of crimes such as identity thieving, cyber bullying, social engineering, and loggers, the perceived risk increased. Among the most optimistic predictors, we are afraid, voluntarism, catastrophic and immediate threats. In addition the top scores are Internet competence and its level of use. In fact, regulation was an important precautionary measure. Identity theft was discerned as dangerous threat by students. Results and Discussion The research results confirmed the approval of the members of the study community to a medium degree on the reality of digital extremism and cyber terrorism as seen by the researcher. Moreover, the approval of the members of the study community was to a high degree on the role of combating cybercrime in promoting human security as seen by the researcher. The members of the study community agreed with a high degree on the obstacles identified by the researcher to combat cyber -crimes to enhance human security
  • 37. in Saudi Arabia. There was a high approval of the study community members on the strategic vision developed by the researcher to combat cyber- crimes to enhance human security in Saudi Arabia. Strategic Steps to Avoid Cyber Crimes Monitoring and alerts Network monitoring and alerting settings to detect suspicious activity are very important – a malicious attacker should not be allowed to access and store sensitive data on a peripheral device by means of comprehensive system monitoring. Risk management decision-making By means of a risk assessment, they can determine how assets and a limited budget should be expended. If the piece in question is downgraded or attacked by a virus, it will access technical equipment, software system and allocate monetary risk value
  • 38. Up-to-date technology The proper use of security technologies and the equipment necessary: The company will remain vulnerable to hackers by outdated computer firmware, weak protocols and out - of- date safety technology. Security team A well-trained professional staff should be able instantly to protect sensitive and private information – the IT department should be vigilant to know about common threats Knowledge is power To avoid cyber-crimes, maintaining good knowledge about potential threats and attacks Webology, Volume 17, Number 2, December, 2020 294 http://www.webology.org Conclusion
  • 39. This decade has seen an exponential increase in the number of internet users. It's going on all over the world. Each world now has the blessing and curse of technology from underdeveloped to developing and developed countries. Cyber - attacks are increasing and more complicated. This also increases. It's not restricted to a state but is beyond the boundaries to make things worse, unlike federal crimes. Therefore, when there is no proper infrastructure to combat it, it is more likely to remain undetected. The development of cyber security policy is at a turning point. Cyber-security has become a national priority, while the importance of' soverei gnty' is increasing. National cyber security policies are aimed at promoting economic and social prosperity and at protecting cyber-reliant societies against cyber risk. Common elements of such approaches are improving policy and organizational government coordination; strengthening the collaboration between public and private sectors; emphasizing
  • 40. the need for fundamental values such as the security of personal data, freedom of expression and the free flow of information; and calling for better international cooperation. Recommendations 1. Promptly prepare a draft law called (Cyber Security Law) that defines the controls of the operators of telecommunications and Internet service providers in the Kingdom of Saudi Arabia, and promotes the fight against cybercrime and the protection of the Saudi society in cyberspace. 2. Establishing a national specialized cybersecurity authority to protect Saudi's cyberspace and enhance infrastructure security. 3. Establish a specialized prosecutor to investigate, confront and control all types of cybercrime. 4. Establishing a specific security unit at the Ministry of Interior specialized in combating cybercrime and its tasks (attached in detail to the strategic
  • 41. vision). 5. The need to educate the Saudi society - individuals and institutions - ways to protect against cyber-crimes. References Dykstra, J.A., & Orr, S.R. (2016). Acting in the unknown: the cynefin framework for managing cyber security risk in dynamic decision making. In IEEE International Conference on Cyber Conflict (CyCon US), 1-6. El Melhem, J., Bouras, A., & Ouzrout, Y. (2019). Toward a Holistic Approach of Cybersecurity Capacity Building through an Innovative Transversal Sandwich Training. Webology, Volume 17, Number 2, December, 2020 295 http://www.webology.org In Industry Integrated Engineering and Computing Education, Springer, Cham,
  • 42. 187-212. Evans, M., He, Y., Maglaras, L., &Janicke, H. (2019). HEART- IS: A novel technique for evaluating human error-related information security incidents. Computers & Security, 80, 74-89. Ganin, A.A., Quach, P., Panwar, M., Collier, Z.A., Keisler, J.M., Marchese, D., & Linkov, I. (2017).Multi-criteria decision framework for cyber security risk assessment and management. Risk Analysis, 40(4). Hershberger, P. (2014). Security skills assessment and training: The “make or break” critical security control. SANS Institute Info Sec Reading Room. IBM. (2013). The 2013 IBM Cyber Security Intelligence Index.IBM Security Services. Islam, T., Becker, I., Posner, R., Ekblom, P., McGuire, M., Borrion, H., & Li, S. (2019). A socio-technical and co-evolutionary framework for reducing human-related risks in cyber security and cybercrime ecosystems. In International Conference on Dependability in Sensor, Cloud, and Big Data Systems and
  • 43. Applications, Springer, Singapore, 277-293. Joinson, A., & Steen, T.V. (2018). Human aspects of cyber security: Behaviour or culture change?. Cyber Security: A Peer-Reviewed Journal, 1(4), 351- 360. Kelly, R. (2017). Almost 90% of cyber attacks are caused by human error or behavior. Chief Executive.net. Kim, J. (2017). Cyber-security in government: reducing the risk. Computer Fraud & Security, 7, 8-11. Nagarajan, A., Allbeck, J.M., Sood, A., & Janssen, T.L. (2012).Exploring game design for cybersecurity training. In IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 256- 262. Saad, A., Amran, A.R., Afif II, Zolkeple, A.H., Said, A.I.A., Hamzah, M.F., & Salim, W.N.S.W. (2016). Privacy and security gaps in mitigating Cybercrime: The review. In IEEE 2nd International Symposium on Agent, Multi-Agent
  • 44. Systems and Robotics (ISAMSR), 92-99. Sarker, K., Rahman, H., Rahman, K.F., Arman, M., Biswas, S., & Bhuiyan, T. (2019). A Comparative Analysis of the Cyber Security Strategy of Bangladesh. International Journal on Cybernetics & Informatics (IJCI), 8(2), 1-21. Willemant, R., & Foulgoc, S. (2016). Legal Aspects of Cyber- security. Action Canada Fr., 25, 18-19.