Areej Alhogail

Areej Alhogail
King Saud University | KKUH · Department of Information Systems

PhD

About

25
Publications
34,827
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
581
Citations
Additional affiliations
November 2019 - June 2020
King Saud University
Position
  • Head of Faculty
March 2019 - present
King Saud University
Position
  • Professor (Assistant)
March 2016 - March 2019
Imam Muhammad bin Saud Islamic University
Position
  • Professor (Assistant)

Publications

Publications (25)
Article
The rapid growth of modern technologies has encouraged non-profit organizations (NPOs) to harness such technologies to better serve the charity sector, especially in relation to charity donation processes. Non-profit organizations primarily rely on fundraising that may involve opaque operations, which leads to the exacerbation of fears that donatio...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs), or drones, provided with camera sensors enable improved situational awareness of several emergency responses and disaster management applications, as they can function from remote and complex accessing regions. The UAVs can be utilized for several application areas which can hold sensitive data, which necessitates s...
Article
Malicious domain names have been commonly used in recent years to launch different cyber-attacks. There are a large number of malicious domains that are registered every day and some of which are only active for brief periods of time. Therefore, the automated malicious domain names detection is needed to provide security for individuals and organis...
Article
Full-text available
Blockchain is an emerging technology that is increasingly being applied in both industrial and academic contexts. Cryptocurrency is a major application of blockchain in the financial sector, but the technology is expected to disrupt other industries. In fact, it has influenced many businesses and reshaped private and public sector activities. There...
Article
Full-text available
Saudi universities have suspended the traditional face-to-face classes and moved to online learning to ensure the continuation of the educational process during the COVID-19 pandemic. The speed at which the move to online learning has happened was unprecedented and staggering. Academics, had to improvise and try different e-learning solutions in le...
Article
The growth of online services has been accompanied by increased growth in cyber-attacks. One of the most common effective attacks is phishing, in which attempts are made to steal confidential information by impersonating a legitimate source. The success of phishing emails is based on manipulating human emotions, which leads to concerns and creates...
Article
Purpose Sharing information security best practices between experts via knowledge management systems is valuable for improving information security practices, exchanging expertise, mitigating security risks, spreading knowledge, reducing costs and saving efforts. The purpose of this paper is developing a conceptual model to enhance the transfer of...
Chapter
The Internet of Things (IoT) has gained a huge importance in the recent years among the other latest Internet evolutions. Internet of Things aims to provide people with the innovative and intelligent technologies and services where all the physical objects around their world are connected to the Internet and communicate with each other. IoT product...
Article
Full-text available
Studies have shown that trust plays a crucial role in the consumers’ decision to adopt Internet of Things (IoT) technologies and services since it helps them to overcome perceptions of risk and uncertainty related to it and enhances the customers’ level of acceptance and adoption intention. Nevertheless, the literature of IoT still lacks studies on...
Article
Full-text available
Human factor represent an essential issue in the security of information in organizations, as human factor determine the behavior of the employees toward information security. This paper attempts to integrate related human factors, recognized by previous work, into a structured comprehensive framework. The framework has four main domains that take...
Article
Full-text available
An information security-aware culture will minimize internal threats to information assets through the construction of appropriate information security beliefs and values that guide employee behavior when interacting with information assets and information technology systems. This paper aims to illustrate the application of the Information Security...
Conference Paper
Full-text available
Information security culture could be used in organizations to construct the appropriate security beliefs and values and to guide the employees' security behavior in order to achieve a secure environment for organizational information assets. In this paper, we adapted Information Security Culture Framework (ISCF) to create a questionnaire to assess...
Article
Full-text available
The efficiency of various technical information security controls is based on the 'people' who interact with the information every day. Information security culture aims at protecting information assets by guiding how things are done in organization in regard to information security through influencing employees' security behavior. This paper revie...
Conference Paper
Full-text available
Information security culture guides how things are done in organization in regard to information security, with the aim of protecting the information assets and influencing employees' security behavior. In this paper, we review key literature on information security culture that was published in the period during 2003-2013. The objective was to ide...
Article
Full-text available
Establishing information security culture within an organization may include transformation of how employees interact with the information assets which may be challenged with resistance, fear or confusion. Change management skills could assist organization members to smoothly adapt to the new culture. The use of change management in information sec...
Article
Full-text available
With the wide use of Virtual Learning Environments (VLEs) across universities, many researchers are looking to make the most effective use of such environment to enhance the learning and teaching experience. Many valuable learning resources are uploaded to the VLEs systems every day such as lectures, tutorials and labs, assignments and other learni...
Article
Full-text available
Security of Information Systems (IS) is a major concern for organizations nowadays as security related risks may affect the organization's information assets badly. Security systems in organizations can benefit a great deal from knowledge and experiences of security experts, practitioners and professionals if this knowledge is acquired, encoded int...
Article
Full-text available
Many universities around the world are investing in implementing different Virtual Learning Environments (VLEs) to support the teaching and learning process. However, without an effective implementation, many objectives and advantages are unachieved. Therefore, a well designed strategy to follow is vital to the success of an effective implementatio...

Network

Cited By