Beijing Law Review

Volume 11, Issue 3 (September 2020)

ISSN Print: 2159-4627   ISSN Online: 2159-4635

Google-based Impact Factor: 0.76  Citations  

An Institutional Theory Perspective on Developing a Cyber Security Legal Framework: A Case of Saudi Arabia

HTML  XML Download Download as PDF (Size: 281KB)  PP. 637-650  
DOI: 10.4236/blr.2020.113039    1,011 Downloads   4,721 Views  Citations

ABSTRACT

In the information age, the cyber-attacks have increased manifold, and developing a cyber-security legal framework is the need of the hour. Saudi Arabia experiences the highest cyber-attacks in the Arab region. This research attempts to develop a cyber-security legal framework for Saudi Arabia in particular and other countries in general. The study uses coercive, normative, and mimetic forces of institutional theory for this endeavor. Coercive pressure manifests in legal instruments, so countries like Saudi Arabia need to ensure compliance of their organizations to their respective laws, regulations, security policies, and procedures. Normative force manifests in professional networks and community expectations. So, countries like Saudi Arabia should collaborate, share information with other countries and join the Budapest Convention to combat cyber-crimes. Saudi Arabia should sufficiently incorporate the provisions of the Arab Convention on Combating Information Technology Offences in its legal instruments. Mimetic force involves copying the actions and practices of successful organizations. So, countries like Saudi Arabia should improve their legal tools by incorporating key features of legal instruments of more advanced cyber-secure nations like the UK, USA, Singapore, etc. Specifically, Saudi Arabia should improve its legal tools in the areas of privacy, identity theft, cyber-bullying, etc.

Share and Cite:

Singh, H. and Alshammari, T. (2020) An Institutional Theory Perspective on Developing a Cyber Security Legal Framework: A Case of Saudi Arabia. Beijing Law Review, 11, 637-650. doi: 10.4236/blr.2020.113039.

Cited by

[1] Information security policy effectiveness: a managerial perspective of the financial industry in Vietnam
Information & Computer Security, 2024
[2] Testing a rich sample of cybercrimes dataset by using powerful classifiers' competences
Authorea Preprints, 2024
[3] Managing Risks in the Adoption of Cybersecurity Technology in Manufacturing Enterprises: Identification and Assessment.
… Journal for Computers …, 2023
[4] The Influence of Institutional Pressure on Healthcare Employees' Information Security Compliance
2023
[5] Political affiliation, collective agency and structural opportunities for lumley market women in Sierra Leone
2023
[6] A SYSTEMATIC LITERATURE REVIEW ON THE CYBERSECURITY GAPS IN SAUDI CURRICULUM THAT AFFECT THE BANKING SECTOR.
The journal of contemporary issues in business …, 2023
[7] Evaluating Legal Frameworks for Cybercrime in Indonesian Public Administration: An Interdisciplinary Approach
International Journal of Cyber Criminology, 2023
[8] Investigating tourism experiences and attention allocation of outbound tourists through the lens of the two-factor theory: a grounded theory analysis of Chinese …
Heliyon, 2023
[9] Risk-Based Cybersecurity Compliance Assessment System (RC2AS)
Applied Sciences, 2023
[10] ROLE OF TECHNOLOGY IN IDENTIFYING CYBER CRIMES IN INDIA A STUDY
2023
[11] Investigating the components of a contextual cyber resilience for organisations
2023
[12] НАЦІОНАЛЬНА ПОЛІТИКА КІБЕРБЕЗПЕКИ КИТАЮ: ІНСТИТУЦІОНАЛЬНИЙ ТИСК
Китаєзнавчі дослідження, 2022
[13] Exploring Challenges Faced by Information Technology Security Managers in Implementing Risk Management Framework to Protect Protected Health Information and …
2022
[14] Role of Incident Reporting System in Healthcare Management: A Case of Multispeciality Tertiary Hospital in India
International Journal of Information Movement, 2022
[15] Factors affecting information security compliance among SMEs in Cape Town
2022
[16] Articles in ITJEMAST@ 12 (13) 2021
2021
[17] Legislative deficiency in the procedural aspect of information crime.
Review of International …, 2021
[18] The Evolution of Cybersecurity Regulation in the European Union Law and Its Implementation in Poland
2021
[19] Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia
2021
[20] Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
2021
[21] Legislative deficiency in the procedural aspect of information crime
2021
[22] Predicting Key Factors Impacting Online Hotel Ratings Using Data Mining Approach: A Case Study of Makkah of Saudi Arabia
2021
[23] Impacts of Digital Technology-Enabled Personalized and Adaptive Learning on Student Learning Performance: A TOE Framework for Saudi Arabia …
& Applied Sciences & Technologies, 2021
[24] Deciphering Key Factors Impacting Online Hotel Ratings Through the Lens of Two-Factor Theory: A Case of Hotels in the Makkah City of Saudi Arabia
International Transaction Journal of …, 2021
[25] Impacts of Digital technology-enabled personalized and adaptive learning on student learning performance: A TOE framework for Saudi Arabia
& Applied Sciences & …, 2021
[26] Managing Risks in the Adoption of Cybersecurity Technology in Manufacturing Enterprises: Identification and Assessment
[27] The Legal Tangle

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.