
Areej AlhogailKing Saud University | KKUH · Department of Information Systems
Areej Alhogail
PhD
About
25
Publications
34,827
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
581
Citations
Introduction
Additional affiliations
November 2019 - June 2020
March 2019 - present
March 2016 - March 2019
Publications
Publications (25)
The rapid growth of modern technologies has encouraged non-profit organizations (NPOs) to harness such technologies to better serve the charity sector, especially in relation to charity donation processes. Non-profit organizations primarily rely on fundraising that may involve opaque operations, which leads to the exacerbation of fears that donatio...
Unmanned Aerial Vehicles (UAVs), or drones, provided with camera sensors enable improved situational awareness of several emergency responses and disaster management applications, as they can function from remote and complex accessing regions. The UAVs can be utilized for several application areas which can hold sensitive data, which necessitates s...
Malicious domain names have been commonly used in recent years to launch different cyber-attacks. There are a large number of malicious domains that are registered every day and some of which are only active for brief periods of time. Therefore, the automated malicious domain names detection is needed to provide security for individuals and organis...
Blockchain is an emerging technology that is increasingly being applied in both industrial and academic contexts. Cryptocurrency is a major application of blockchain in the financial sector, but the technology is expected to disrupt other industries. In fact, it has influenced many businesses and reshaped private and public sector activities. There...
Saudi universities have suspended the traditional face-to-face classes and moved to online learning to ensure the continuation of the educational process during the COVID-19 pandemic. The speed at which the move to online learning has happened was unprecedented and staggering. Academics, had to improvise and try different e-learning solutions in le...
The growth of online services has been accompanied by increased growth in cyber-attacks. One of the most common effective attacks is phishing, in which attempts are made to steal confidential information by impersonating a legitimate source. The success of phishing emails is based on manipulating human emotions, which leads to concerns and creates...
Purpose
Sharing information security best practices between experts via knowledge management systems is valuable for improving information security practices, exchanging expertise, mitigating security risks, spreading knowledge, reducing costs and saving efforts. The purpose of this paper is developing a conceptual model to enhance the transfer of...
The Internet of Things (IoT) has gained a huge importance in the recent years among the other latest Internet evolutions. Internet of Things aims to provide people with the innovative and intelligent technologies and services where all the physical objects around their world are connected to the Internet and communicate with each other. IoT product...
Studies have shown that trust plays a crucial role in the consumers’ decision to adopt Internet of Things (IoT) technologies and services since it helps them to overcome perceptions of risk and uncertainty related to it and enhances the customers’ level of acceptance and adoption intention. Nevertheless, the literature of IoT still lacks studies on...
Human factor represent an essential issue in the security of information in organizations, as human factor determine the behavior of the employees toward information security. This paper attempts to integrate related human factors, recognized by previous work, into a structured comprehensive framework. The framework has four main domains that take...
An information security-aware culture will minimize internal threats to information assets through the construction of appropriate information security beliefs and values that guide employee behavior when interacting with information assets and information technology systems. This paper aims to illustrate the application of the Information Security...
Information security culture could be used in organizations to construct the appropriate security beliefs and values and to guide the employees' security behavior in order to achieve a secure environment for organizational information assets. In this paper, we adapted Information Security Culture Framework (ISCF) to create a questionnaire to assess...
The efficiency of various technical information security controls is based on the 'people' who interact with the information every day. Information security culture aims at protecting information assets by guiding how things are done in organization in regard to information security through influencing employees' security behavior. This paper revie...
Information security culture guides how things are done in organization in regard to information security, with the aim of protecting the information assets and influencing employees' security behavior. In this paper, we review key literature on information security culture that was published in the period during 2003-2013. The objective was to ide...
Establishing information security culture within an organization may include transformation of how employees interact with the information assets which may be challenged with resistance, fear or confusion. Change management skills could assist organization members to smoothly adapt to the new culture. The use of change management in information sec...
With the wide use of Virtual Learning Environments (VLEs) across universities, many researchers are looking to make the most effective use of such environment to enhance the learning and teaching experience. Many valuable learning resources are uploaded to the VLEs systems every day such as lectures, tutorials and labs, assignments and other learni...
Security of Information Systems (IS) is a major concern for organizations nowadays as security related risks may affect the organization's information assets badly. Security systems in organizations can benefit a great deal from knowledge and experiences of security experts, practitioners and professionals if this knowledge is acquired, encoded int...
Many universities around the world are investing in implementing different Virtual Learning Environments (VLEs) to support the teaching and learning process. However, without an effective implementation, many objectives and advantages are unachieved. Therefore, a well designed strategy to follow is vital to the success of an effective implementatio...