Saudi Cultural Missions Theses & Dissertations

Permanent URI for this communityhttps://drepo.sdl.edu.sa/handle/20.500.14154/10

Browse

Search Results

Now showing 1 - 5 of 5
  • ItemRestricted
    Generative AI Technologies Use Among Higher Education Students in Saudi Arabia: Benefits and Concerns
    (University of Southampton, 2024) AlKhunayfir, Sarah; Zarifis, Alex
    This study investigates the use of generative AI technologies among higher education students in Saudi Arabia, focusing on perceived benefits and concerns. As these technologies rapidly integrate into academic environments, understanding their impact becomes crucial for effective implementation and policy development. The research aims to identify specific benefits in terms of time savings, unique insights, and personalised feedback, while also examining concerns regarding overreliance, data privacy, and information accuracy. Employing a quantitative approach, the study utilised a closed-questions survey distributed to 150 higher education students in Saudi Arabia. The survey gathered data on students' perceptions and usage patterns of generative AI technologies, which were then analysed using descriptive and inferential statistical methods. Findings reveal a nuanced landscape of student attitudes. Students perceive significant benefits from generative AI, with time savings emerging as the most appreciated advantage, followed by gaining unique insights and receiving personalised feedback. Concurrently, moderate levels of concern were identified, primarily regarding the accuracy of AI-generated content and potential overreliance on these technologies. Interestingly, data privacy concerns were less pronounced than anticipated. The study concludes that while students recognise the transformative potential of generative AI in enhancing learning experiences, they remain cautious about its limitations. These findings contribute to the understanding of AI integration in Saudi higher education and offer valuable insights for developing balanced, ethical, and effective AI integration strategies. The research underscores the need for ongoing dialogue, policy development, and further investigation to ensure that the integration of generative AI aligns with educational goals and societal values in Saudi Arabia.
    10 0
  • ItemRestricted
    Identifying and Overcoming Barriers to Patient Engagement with Remote Patient Monitoring (RPM) Technologies: Insight from a systematic literature review of high-income countries
    (University College London, 2024) Almotairi, Mutaz; Jafri, Tabassum
    This research project investigates barriers to patient engagement with Remote Patient Monitoring (RPM) technologies in high-income countries while providing a systematic review of current literature. RPM technologies, driven by advancements in information and communication technologies (ICT) and a shift towards patient-centred care, have significantly reduced hospital admissions and improved outcomes for patients with chronic conditions and post-surgical recovery. Despite these benefits, several barriers hinder RPM's widespread adoption and effective use. Technological obstacles include device usability issues, connectivity problems, and data integration challenges. Psychological barriers encompass patient resistance due to fear of technology, concerns about data privacy, and a lack of trust in digital health solutions. Socioeconomic challenges involve financial constraints, digital literacy deficits, and disparities in access to necessary technology and internet services. Systemic obstacles within healthcare infrastructure, such as inadequate training for healthcare providers and insufficient reimbursement policies, further complicate the integration of RPM technologies. The research highlights the need for multifaceted strategies to overcome these barriers. Recommendations include developing user-friendly RPM devices, enhancing digital literacy through targeted educational programs, ensuring robust data security measures to build patient trust, and implementing supportive policies that provide financial incentives and comprehensive training for healthcare providers. Additionally, fostering an equity- centred approach and investing in technological infrastructure is crucial for mitigating disparities in RPM access and utilisation. By overcoming these barriers, the study aims to enhance patient engagement with RPM technologies, ultimately improving healthcare outcomes and optimising healthcare delivery. The findings provide valuable insights for healthcare providers, policymakers, and technology developers while underscoring the importance of a patient-centred approach in designing and implementing digital health solutions.
    14 0
  • ItemRestricted
    Legal implications of digital currency on traditional commercial transactions
    (Bangor University, 2024) Alshehri, Mohammad; Andrew, Baker
    The dissertation examined the legal implications of digital currency integration into traditional commercial transactions and proposed regulatory adaptations to address the connected challenges. The dissertation adopted a secondary research methodology with a doctrinal legal research approach and analysed data from academic journals, industry documents and regulatory reports. The legal aspect of the study, including legislation and case laws, was analysed using the doctrinal legal research method. Thematic analysis of the secondary sources helped to synthesise the findings to respond to the five key research questions on the evolution of UK laws on money digitisation, regulatory challenges and integration into traditional contractual frameworks, implications for consumer protection and regulatory compliance and lastly, policy recommendations. The findings indicated that even though digital currencies are beneficial as they enhance data privacy, are cost-effective and leverage the gains of smart contracts, major challenges like regulatory uncertainty and legal ambiguities remain. The dissertation recommended policies such as establishing guidelines for adaptive regulation, strengthening AML measures, enforcing fair and transparent practices, promoting standards for data privacy and security and launching consumer education programmes. The implications of the study extend to financial institutions, regulators, policymakers and consumers, with the suggestion that digital currency integration into traditional financial systems calls for clear regulatory adaptation. Future research should assess the success of collaborative efforts among stakeholders and analyse the wider economic impacts of digital currency integration
    21 0
  • ItemRestricted
    Cloud Cybersecurity
    (Universidad de Al cala, 2024) Bokhari, Nabil; Herraiz, Martinez; Javier, Jose
    The rapid evolution of cloud computing has revolutionized modern business operations, from hosting applications to storing data in high-security environments. Competitive businesses are leveraging cloud computing solutions to maximize the benefits, including cost-effectiveness, flexibility, and scalability. Cloud computing enables enterprises to access on-demand and scalable computing resources, specifically computational power and vast data storage. Despite the immense benefits, the security of data transmitted and stored in a cloud computing environment is vulnerable to multiple cybersecurity attacks, including data manipulation, loss, and theft. The study aims to develop a security model for enhanced data privacy and security in the cloud by leveraging a hybrid of cryptographic algorithms and steganography image-based techniques. The security model innovatively combines Advanced Encryption Standard (AES), Rivest Shamir Adleman (RSA), and the Least Significant Bit (LSB) technique to enhance data privacy and security of data in motion in a cloud computing environment. The three-step security model was designed, developed, and evaluated using the Design Science Research (DSR) methodology. The model secures data through cryptographic algorithms, adds an extra security layer using steganography, and implements backup and data recovery. The methodology was selected because of its practicality and philosophical underpinnings on addressing contemporary challenges by developing novel and relevant artifacts using scientifically rigorous procedures. The findings show that a hybrid of cryptography and steganography provides unbeatable security for data in a cloud computing environment. Implementing the security model will enhance data privacy and security in the cloud by revolutionizing how data is encrypted and decrypted. In the future, the integration of Machine Learning and Artificial Intelligence methodologies and algorithms will quadruple the effectiveness and robustness of this data security model for the cloud.
    11 0
  • Thumbnail Image
    ItemRestricted
    FemTech Ethics – An Empirical and Normative Analysis of FemTech and Women’s mHealth Apps
    (University of Zurich, 2023-09-28) Alfawzan, Najd; Christen, Markus; Biller-Andorno, Nikola; Hamper, Josie
    FemTech (female technology) is a growing market with a large user base globally. The investments in FemTech are huge. Collecting women’s health data is important for closing the gender health gap. However, as women have been subject to historical sociocultural oppression and surveillance, legal consequences might follow women who provide their data to FemTech companies. The primary thesis of this work is that an ethical perspective and grounding are critical for the analysis of FemTech, because technology is inextricably linked to morality, norms, and the sociocultural context in which it acts. FemTech is distinct from other types of technology and markets in that it emerged from these circumstances and has a significant impact on users within their social contexts. In my thesis, I focused on the ethical concerns in data privacy, sharing, and security by studying the privacy policies and consent practices of FemTech companies, particularly in the context of women’s mHealth apps. Data privacy and protection have been introduced as fundamental human rights. Notably, the women’s health data collected by FemTech is considered to be intimate, sensitive, and private data. Moreover, some women’s mHealth apps collect not only women’s sensitive data, but also data of their children and infants. This layer of complexity introduced by including children's data let me investigate in depth the practices of apps that collect children’s data and the related ethical and legal concerns. In short, the collection of women’s personal and health data could have negative consequences on women in certain legal and social systems of the world. The worldwide nature of the services provided by FemTech companies presents challenges in complying with the many regulations and laws that exist in different nations. Data protection and privacy legislation, for example, can differ widely from country to country. Furthermore, the sensitivity of women's health issues can differ depending on local cultural or religious considerations, with possible repercussions for national laws, particularly when it comes to sexual orientation and reproduction. In some cases, the data collected could even become evidence in criminal proceedings. Therefore, the handling of women’s intimate data must be approached with sensitivity to protect women's privacy rights.
    48 0

Copyright owned by the Saudi Digital Library (SDL) © 2025