Saudi Cultural Missions Theses & Dissertations

Permanent URI for this communityhttps://drepo.sdl.edu.sa/handle/20.500.14154/10

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    ItemRestricted
    A Trust Framework For Information Sharing
    (University of Southampton, 2024-03-14) Ghamri, Rayan Mohamed S; Wills, Gary; Al Hashimy, Nawfal; Farhat, Hikmat
    The Kingdom of Saudi Arabia (KSA) is planning Vision 2030 to improve the outcomes of its education and training system and subsequently to develop a local and global labour market. The country needs to establish KSA’s current educational and employment status, as this will assist in finding areas that need development to support government planning and human resource capital, mainly since education is provided and funded by the government. Since the government funds education, most young people study. whatever they like or what is readily available. That means it creates a dearth of a particular graduate’s specialisation and an overflow of another, which leads to training and educating more graduates majoring in subjects than the employment market needs or not training enough graduates in specific areas the employment market needs. Without information sharing between employment and education, it lowers having accurate information to make economic growth decisions. This novel framework assists in finding the numbers of skilled candidates, vacancy opportunities and learners in one place, thus ensuring sustainability, efficiency and effectiveness. In light of the above, there is a need for a research project to explore how best to allocate and share trusted and accurate information on educational certificates and employment achievements while preserving the privacy and security of stakeholders’ digital assets. This research examines current practices in information-sharing of educational certificates and employment history verification in the integrated environment intending to reduce wasted resources. Part of the e-government system, the scheme considers aspects relating to both KSA’s unique context and information-sharing technologies, making it highly relevant and context-specific. A prerequisite is a framework of factors to enable information-sharing among educational providers, employers and the government. This research introduces a novel framework comprising four principal dimensions: Facilitating Conditions, IT Services, Secure Access, and Trust and Accuracy (FIST). These four elements collectively form the basis of the innovative framework, named the ’FIST Framework,’ an acronym derived from the initial letter of each dimension. The FIST Framework aims to help software engineers structure an integration system at an early stage of the software development life cycle. Four dimensions characterise the architecture: Facilitating Conditions; IT Services; Secure Access; and Trust and Accuracy. Each has six requirements (factors) defined in natural language for software engineers when implementing the FIST Framework. The purpose is to preserve the trust and accuracy of integrated data (Shared or Exchanged) that contain both organisations’ and individuals’ personal and private data. The primary objective of this research is to build a robust framework, known as the FIST framework, developed to improve the outcomes of education and training systems to strengthen economic growth in the labour sector through information sharing. This framework development happened through comprehensive expert reviews and analysis. The core purpose of the FIST framework is to tackle two hidden but critical problems in data integration: Trust and Accuracy. Experts often express concern regarding the trustworthiness of data integration, primarily due to the potential unavailability of data. Additionally, there needs to be more accuracy, particularly in identifying the data sources. This lack of trust and observed inaccuracy pose significant challenges for data integration. This research used the Delphi method to confirm and expose various factors and their associated requirements. It involved a systematic approach for gathering requirements, primarily focusing on human interactions, then a modelling approach for designing interaction models. Formal Modelling is essential in validating the critical tasks of systems based on the FIST framework. Utilising Rodin for rigorous analysis, this approach strengthens the system by ensuring robustness and detecting inconsistencies in data integration, sharing, and exchange. This process is necessary for the FIST framework’s integrity, which involves simulating various scenarios to test the data integration system’s effectiveness against theoretical and real-world requirements. The outcome is a reliable, trusted system for essential tasks in education and employment. Formal Modelling demonstrates the FIST framework’s theoretical soundness and practical effectiveness, especially in maintaining trust and accuracy in data integration. Applying Formal Modelling rectifies potential weaknesses, enhancing the FIST framework’s recognition and stakeholder confidence.
    39 0
  • Thumbnail Image
    ItemRestricted
    THE SECURITY ASPECTS OF USERS’ INFORMATION SHARING ON SOCIAL MEDIA
    (Saudi Digital Library, 2025) Alharbi, Mohannad; Chen, Jiangping; Habib, Abdulrahman; Anderson, Rich; Herrington, Richard
    This study aims to investigate college students’ security awareness of using social media in sharing information. The two theories that have guided this study are the theory of planned behavior (TPB) and the technology acceptance model (TAM). Data was collected from both undergraduate and graduate students from the University of North Texas (UNT) in Denton. The total responses included 380 students from different majors with 291 valid responses for data analysis; The structural equation model (SEM) Lavaan package was used to find out the best fit of the model. A diagonally weighted least squares (DWLS) was used to model the variables as ordinal in this study's analysis as ordinal data made the model fit substantially. The study found that 6 factors: attitude (AB), subjective norm (SN), perceived behavior control (PBC), perceived usefulness (PU), perceived risks (PR), and security awareness (SA) influenced behavior intention (BI). Also, I found that AB was influenced by PR and SA, as well as SN influenced by SA. Self-efficacy (SE) influenced PBC. On the other hand, the study found that controllability (C) did not influence PBC; perhaps, an individual’s skills do not interact with social media security settings. Perceived ease of use (PEOU) did not influence BI; perhaps this occurred because of an individual's inability to prevent his or her information from being disclosed in the future, even if they had taken the right precautions. This study contributed to literature on understanding the nature of information sharing among college students on social media. The results may help college security professionals to evaluate or revise the rules and policies regarding cybersecurity and privacy.
    28 0

Copyright owned by the Saudi Digital Library (SDL) © 2024