Abstract
The purpose of this paper is to enlighten the readers about the Cyber crimes in Saudi Arabia. The paper draws upon a rising issue in the world since the use of technology and the Internet has spread out widely that is “Cyber crime.” The aspects explored in this literature review are the types of cybercrimes and the extent of cyber crimes that exist in Saudi Arabia. It furthermore addresses the negative impact of such cyber crimes related to the use of Internet by individuals and businesses. This review paper takes a close look at some of the estimates of computer crimes to help understand the future of Internet crimes in the country. It will be basic for arrangement producers to know about the scale and nature of cyber crimes and how it will change after some time and whether intercessions to handle the issue are having an effect.
Introduction
The literature review focuses on the studies that are relevant to the topic. It consists of past studies based on the types of cyber crimes in the world and their impact on the society. The literature review highlights the types of cybercrime and its existence in Saudi Arabia. Cyber crime is a crucial topic for researchers as it affects the economy of the country and disallows multinational companies to operate in the threads prevailing in the environment.
Literature Review
Scott (2015) states that cybercrime is the threat for the commercial world as it relates to committing a fraud. The fraud is the crime that is committed to deceiving others and in the modern world; it is also used for blackmailing others. The new kind of fraud that also relates to cyber crime is online identity theft. The online identity theft is one of the latest types of cybercrime that exists in the developed countries. The multinational organizations always operate through the Internet and online facilities to deal with their employees, clients, consumers, and partners. The identity theft can harm the process of an organization (mainly government organization) and people living in that country could be misguided. The threat is not limited to the clash of business, but it could affect the national security and sovereignty of the country .
Al-Saud & Bin (2012) also highlights the intensity of cybercrime in Saudi Arabia where the government needs to improve its national security. The problem of cybercrime is severe in the country, and a substantial amount of funds is being invested in cyber security. The cyber crime is affecting the sovereignty of Saudi Arabia because of hackers and cybercrime experts in the world. The government’s spending on these policies and restrictions will prove to beneficial in the future. These policies should be reviewed regularly, and the government should make amendments to improve the outcomes to be achieved through the implementation of these policies. The requirement is to control the threat by imposing a national and foreign restriction on the use of the Internet for these types of criminal activities (Al-Saud, 2012).
Scott (2015) also highlights that cyber crime has severity for the multinational companies operating in the country. The state should realize the responsibility of protecting these companies from the threat of cyber crime. The confidence of companies towards the state should be built in a way that they should be attract to further invest in the country and feel free to work over there. Also, these companies should have strict rules for the use of the Internet to avoid such criminal activity within the organization. The identity of customers, clients, and employees are secrets of the organization, and no stranger should have access to their information .
Al-Saud & Bin (2012) also explains that corporate leaders should realize the responsibilities to implement strict policies to overcome the crime within or outside their organizations. The strategies to prevent the cybercrime will bring effectiveness in the operations of organizations, and they would be able to get a high positive response from their stakeholders. The secrets should be kept in safe to avoid leakage as hackers find different ways to get private and confidential information (Al-Saud, 2012).
Tafoya (2011) identifies that cyber terror is another type of cybercrime that can directly affect the national security of the country. Cyber terror refers to the control of the national or state security of the country using Internet tools. Cyber terror is exercised through communication on social media that has the ability to engage a large number of people in short time. The developed and developing countries have made strong policies to prevent their organizations and community from this threat. However, this type of cyber crime is not effectively controlled by some of the countries due to the lack of availability of resources . Al-Saud (2012) also states that cyber security policies adopted by Saudi Arabia proved to be revolutionary in the Middle East. The government of Saudi Arabia has imposed a restriction on using the social media as enemies were targeting the national security of the country through it. Moreover, other countries such as America, Israel, and India have implemented a similar policy. It also explains that cyber terrorism is now common in different countries that do not have complete control over cyber activities. The country’s authority should implement strict policies to prevent terrorism (Al-Saud, 2012).
Conclusion
The above review of past studies explores that cybercrime is not solely related to corporations, but it also affects the economy and sovereignty of the country at the national level. It also reveals that its presence in Saudi Arabia is a huge threat, but the policies adopted to control communication and social media in particular are helpful in decreasing the trend of this crime in the country. Another important issue notified in the research is that it is not only the problem of developed countries, but developing countries also have the threat of becoming a victim of this crime.
References
Al-Saud, A., & Bin, N. (2012). Cyber Securities Strategies. JFQ: Joint FOrce Quarterly, 5 (64), 75-81.
Al-Saud, N. B. (2012). The Evolution of Saudi Security and Enforcement Policies on Communication. JFQ: Joint Force Quarterly, 2 (65), 38-43.
Scott, N. (2015). Cyber Crime: 10 Things Every Leader Should Know. Director, 69 (2), 68-72.
Tafoya, W. L. (2011). Cyber Terror. FBI Law Enforcement Bulletin, 80 (11), 1-7.