Saudi Cultural Missions Theses & Dissertations

Permanent URI for this communityhttps://drepo.sdl.edu.sa/handle/20.500.14154/10

Browse

Search Results

Now showing 1 - 3 of 3
  • ItemRestricted
    ACC-PH: A Framework for Adopting Cloud Computing in Private Hospitals in Saudi Arabia
    (Saudi Digital Library, 2025) Alshahrani, Fayez Mogeb M; Beloff, Natalia
    Cloud computing refers to a service model that provides flexible, cost-effective, and on-demand access to computing resources through external providers. Within the Saudi healthcare context, especially in private hospitals, this technology holds considerable potential to improve the quality of healthcare while delivering significant financial benefits. Saudi private hospitals, which operate in a competitive environment, are under constant pressure to enhance operational efficiency while maintaining profitability. Despite the strategic advantages that cloud computing offers, its adoption across Saudi private hospitals remains relatively slow and limited. This thesis investigates the factors influencing the adoption of cloud computing within Saudi private hospitals. To achieve this aim, the Adoption of Cloud Computing in Private Hospitals (ACC-PH) framework was developed to guide an explanatory mixed-methods study, consisting of quantitative and qualitative phases. The quantitative phase involved a survey of 650 decision-makers and employees across various private hospitals in Saudi Arabia. Structural Equation Modelling (SEM) was applied to test the influence of thirteen factors, categorised into three groups: technological (security, compatibility, reliability, relative advantage); organisational (attitude toward change, top management support, prior experience, organisational readiness, cost analysis); and environmental (Internet connection, competitive pressure, cloud providers, rules and regulations). The results of the quantitative study confirmed the significant positive influence of all these factors on cloud adoption, except for rules and regulations, which showed no significant effect. To provide a deeper understanding of these findings, the qualitative phase involved two rounds of semi-structured interviews with a total of nineteen decision-makers. The initial qualitative study, involving twelve decision-makers, confirmed the relevance of the key factors identified in the quantitative phase but revealed recurring challenges associated with security, compatibility, organisational readiness, and Internet connection. The subsequent qualitative study, involving seven decision-makers, offered contextual explanations and practical justifications for the findings, thereby reinforcing the quantitative results with rich and interpretive insights. Bringing together all sets of findings, the study offers a practical and evidence-based roadmap tailored to the realities of cloud computing adoption in Saudi private hospitals. This roadmap is intended to support decision-makers as they navigate the adoption process, with the aim of lowering costs and improving the quality and efficiency of healthcare services. In addition to its practical contributions, the thesis adds to the academic conversation on technology adoption by highlighting the interaction between technological, organisational, and environmental factors in the unique context of the Saudi healthcare sector.
    8 0
  • ItemRestricted
    Cloud Cybersecurity
    (Universidad de Al cala, 2024) Bokhari, Nabil; Herraiz, Martinez; Javier, Jose
    The rapid evolution of cloud computing has revolutionized modern business operations, from hosting applications to storing data in high-security environments. Competitive businesses are leveraging cloud computing solutions to maximize the benefits, including cost-effectiveness, flexibility, and scalability. Cloud computing enables enterprises to access on-demand and scalable computing resources, specifically computational power and vast data storage. Despite the immense benefits, the security of data transmitted and stored in a cloud computing environment is vulnerable to multiple cybersecurity attacks, including data manipulation, loss, and theft. The study aims to develop a security model for enhanced data privacy and security in the cloud by leveraging a hybrid of cryptographic algorithms and steganography image-based techniques. The security model innovatively combines Advanced Encryption Standard (AES), Rivest Shamir Adleman (RSA), and the Least Significant Bit (LSB) technique to enhance data privacy and security of data in motion in a cloud computing environment. The three-step security model was designed, developed, and evaluated using the Design Science Research (DSR) methodology. The model secures data through cryptographic algorithms, adds an extra security layer using steganography, and implements backup and data recovery. The methodology was selected because of its practicality and philosophical underpinnings on addressing contemporary challenges by developing novel and relevant artifacts using scientifically rigorous procedures. The findings show that a hybrid of cryptography and steganography provides unbeatable security for data in a cloud computing environment. Implementing the security model will enhance data privacy and security in the cloud by revolutionizing how data is encrypted and decrypted. In the future, the integration of Machine Learning and Artificial Intelligence methodologies and algorithms will quadruple the effectiveness and robustness of this data security model for the cloud.
    47 0
  • ItemRestricted
    Barriers to adoption of cloud computing faced by SMEs across Saudi Arabia: A quantitative study
    (University of Portsmouth, 2024-09) Alsubaiy, Eman Shabib; Kagalidis, Ioannis
    This research investigates the barriers to cloud computing adoption among small and medium enterprises (SMEs) in Saudi Arabia, a critical focus given the country's Vision 2030 objectives to enhance contribution of SMEs to GDP. The rationale originates from the low cloud adoption rate among Saudi SMEs, despite the significant benefits cloud technology offers in improving operational efficiency and competitiveness. The study aims to identify the key barriers to cloud adoption, assess how demographic factors such as industry type, gender, and education level influence these barriers, and develop targeted recommendations to increase adoption rates. The literature review highlighted several potential barriers, including knowledge gaps, lack of management support, information security concerns, insufficient IT capabilities, and provider lock-in risks. Hypotheses were developed to test these barriers using quantitative methods. A survey was conducted among 84 Saudi SME owners and managers, and the data were analysed using descriptive statistics, correlation, regression, and independent sample t-tests. The findings reveal that information security concerns and lack of skilled IT staff are the most significant barriers to cloud adoption. Additionally, manufacturing SMEs and less educated owners are less likely to adopt cloud technologies. Gender, however, does not significantly impact adoption decisions. The study concludes that addressing these key barriers, particularly through enhanced cybersecurity measures and targeted IT training, is essential for increasing cloud adoption among Saudi SMEs. Recommendations include tailored security solutions, skill development programs, and sector-specific support, particularly for the manufacturing industry.
    38 0

Copyright owned by the Saudi Digital Library (SDL) © 2026