{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:26:04Z","timestamp":1774448764849,"version":"3.50.1"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031195594","type":"print"},{"value":"9783031195600","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-19560-0_4","type":"book-chapter","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T14:10:15Z","timestamp":1678803015000},"page":"39-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Information Security Risk Awareness Survey of Non-governmental Organization in Saudi Arabia"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6800-5105","authenticated-orcid":false,"given":"Mariyam","family":"Hassan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5295-4485","authenticated-orcid":false,"given":"Kawther","family":"Saeedi","sequence":"additional","affiliation":[]},{"given":"Haya","family":"Almagwashi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9753-1251","authenticated-orcid":false,"given":"Suaad","family":"Alarifi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"key":"4_CR1","unstructured":"Carey-Smith, M., Nelson, K., May, L.: Improving information security management in nonprofit organisations with action research. In: Proceedings of the 5th Australian Information Security Management Conference, pp. 38\u201346 (2007b)."},{"key":"4_CR2","unstructured":"Na\u00e7\u00f5es Unidas.: Handbook on Non-profit institutions in the System of National Accounts (2003). http:\/\/unstats.un.org\/unsd\/publication\/seriesf\/seriesf_91e.pdf"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Akingbola, K., Rogers, S.E., Baluch, A.: Change management in nonprofit organizations. In: Change Management in Nonprofit Organizations (2019). https:\/\/doi.org\/10.1007\/978-3-030-14774-7","DOI":"10.1007\/978-3-030-14774-7"},{"key":"4_CR4","unstructured":"Development, M. of H. R. and S.: Ministry of Human Resources and Social Development (2019). https:\/\/hrsd.gov.sa\/"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Lin, Y.: Government Management Model of Non-profit Organizations Based on E-government, pp. 164\u2013168 (2019). https:\/\/doi.org\/10.1145\/3348445.3348464","DOI":"10.1145\/3348445.3348464"},{"key":"4_CR6","unstructured":"Authority, N.C. (n.d.).: National Cybersecurity Authority. Retrieved November 14, 2019. https:\/\/nca.gov.sa\/en\/index.html"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Anthopoulos, L.G.: Smart government: a new adjective to government transformation or a trick? In: Public Administration and Information Technology, vol. 22, pp. 263\u2013293. Springer. https:\/\/doi.org\/10.1007\/978-3-319-57015-0_6","DOI":"10.1007\/978-3-319-57015-0_6"},{"issue":"2","key":"4_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1504\/IJICS.2012.051775","volume":"5","author":"DV Bernardo","year":"2012","unstructured":"Bernardo, D.V.: Security risk assessment: Toward a comprehensive practical risk management. Int. J. Inf. Comput. Secur. 5(2), 77\u2013104 (2012). https:\/\/doi.org\/10.1504\/IJICS.2012.051775","journal-title":"Int. J. Inf. Comput. Secur."},{"issue":"6","key":"4_CR9","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s10207-017-0382-0","volume":"17","author":"G Wangen","year":"2018","unstructured":"Wangen, G., Hallstensen, C., Snekkenes, E.: A framework for estimating information security risk assessment method completeness: core unified risk framework CURF. Int. J. Infor. Secur. 17(6), 681\u2013699 (2018). https:\/\/doi.org\/10.1007\/s10207-017-0382-0","journal-title":"Int. J. Infor. Secur."},{"key":"4_CR10","unstructured":"ISO\/IEC.: ISO\/IEC 27001:2005, Information security management systems-requirements. Infor. Syst. (2005)"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Bowen, P., Hash, J., Wilson, M.: Information Security Handbook: A Guide for Managers NIST Special Publication 800\u2013100. NIST Special Publication 800\u2013100, October, 137 (2006). https:\/\/doi.org\/10.6028\/NIST.SP.800-100","DOI":"10.6028\/NIST.SP.800-100"},{"key":"4_CR12","unstructured":"Mierzwa, S., Scott, J.: Cybersecurity in Non-Profit and Non-Governmental Organizations Cybersecurity View project (2017). https:\/\/www.researchgate.net\/publication\/314096686"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Ngambo\u00e9, M., Berthier, P., Ammari, N., Dyrda, K., Fernandez, J.M.: Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED). Int. J. Infor. Secur. https:\/\/doi.org\/10.1007\/s10207-020-00522-7","DOI":"10.1007\/s10207-020-00522-7"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Carey-Smith, M., Nelson, K., May, L.: Improving Information Security Management in Nonprofit Organisations with Action Improving Information Security Management in Nonprofit Organisations with Action Research (2007a). https:\/\/doi.org\/10.4225\/75\/57b52bb243e30","DOI":"10.4225\/75\/57b52bb243e30"},{"key":"4_CR15","unstructured":"ENISA. (n.d.).: ENISA. Retrieved February 11, 2020. https:\/\/www.enisa.europa.eu\/"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems Recommendations of the National Institute of Standards and Technology (2002)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"50078","DOI":"10.1109\/ACCESS.2021.3068961","volume":"9","author":"E Tufan","year":"2021","unstructured":"Tufan, E., Tezcan, C., Acart\u00fcrk, C.: Anomaly-based intrusion detection by machine learning: a case study on probing attacks to an institutional network. IEEE Access 9, 50078\u201350092 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3068961","journal-title":"IEEE Access"},{"key":"4_CR18","unstructured":"Al Achkar, Z.: Achieving Safe Operations through Acceptance: challenges and opportunities for security risk management Digital Risk: How New Technologies Impact Acceptance and Raise New Challenges for NGOs (2021)"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Moist, R.: Giuliana Sorce (Ed.). Global perspectives on NGO communication for social change. Studies Commu. Sci. 22(1), 277\u2013279 (2022). https:\/\/doi.org\/10.24434\/j.scoms.2022.01.042","DOI":"10.24434\/j.scoms.2022.01.042"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Rice, L.E.: Non-profit organizations\u2019 need to address security for effective government. 4(4), 53\u201371 (2012)","DOI":"10.5121\/ijnsa.2012.4404"},{"issue":"2","key":"4_CR21","first-page":"103","volume":"5","author":"N Kolb","year":"2009","unstructured":"Kolb, N., Abdullah, F.: Developing an information security awareness program for a non-profit organization. Int. Manag. Rev. 5(2), 103 (2009)","journal-title":"Int. Manag. Rev."},{"issue":"2","key":"4_CR22","first-page":"166","volume":"14","author":"TR Imboden","year":"2013","unstructured":"Imboden, T.R.: How are nonprofit organizations influenced to create and adopt information security policies? Issues Infor. Syst. 14(2), 166\u2013173 (2013)","journal-title":"Issues Infor. Syst."},{"issue":"4","key":"4_CR23","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.ijinfomgt.2010.10.006","volume":"31","author":"E Yeniman Yildirim","year":"2011","unstructured":"Yeniman Yildirim, E., Akalp, G., Aytac, S., Bayram, N.: Factors influencing information security management in small- and medium-sized enterprises: a case study from Turkey. Int. J. Inf. Manage. 31(4), 360\u2013365 (2011). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2010.10.006","journal-title":"Int. J. Inf. Manage."},{"issue":"3","key":"4_CR24","doi-asserted-by":"publisher","first-page":"144","DOI":"10.5430\/ijfr.v10n3p144","volume":"10","author":"EK Ghani","year":"2019","unstructured":"Ghani, E.K., Hassin, N.H.N., Muhammad, K.: Effect of employees\u2019 understanding on risk management process on risk management: a case study in a non-profit organisation. Int. J. Finan. Res. 10(3), 144\u2013152 (2019). https:\/\/doi.org\/10.5430\/ijfr.v10n3p144","journal-title":"Int. J. Finan. Res."},{"key":"4_CR25","unstructured":"Of, I., By, A.: V Oluntary D Isclosure of S Ales By S Mall and M Edium S Ized E Nterprises\u202f: I (2002)"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Sarstedt, M., Schloderer, M.P.: Developing a measurement approach for reputation of non-profit organizations. Inter. J. Nonprofit Voluntary Sector Marketing), 276\u2013299 (2010). 15(January 2009. https:\/\/doi.org\/10.1002\/nvsm","DOI":"10.1002\/nvsm"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Montenegro, C., Moncayo, D., Provemovil, S.A.: Information Security Risk in SMEs\u202f: a Hybrid Model compatible with IFRS Evaluation in two Ecuadorian SMEs of Automotive Sector Information Security Risk in SMEs\u202f: a Hybrid Model compatible with IFRS Evaluation in two Ecuadorian SMEs of Automotive Sector. October 2016 (2017). https:\/\/doi.org\/10.1109\/INFOCOMAN.2016.7784226","DOI":"10.1109\/INFOCOMAN.2016.7784226"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Valdevit, T., Mayer, N.: A gap analysis tool for SMES targeting ISO\/IEC 27001 compliance. In: ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, 3 ISAS, pp. 413\u2013416. https:\/\/doi.org\/10.5220\/0002865504130416","DOI":"10.5220\/0002865504130416"},{"key":"4_CR29","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-04133-4_17","volume":"42","author":"T Valdevit","year":"2009","unstructured":"Valdevit, T., Mayer, N., Barafort, B.: Tailoring ISO\/IEC 27001 for SMEs: a guide to implement an information security management system in small settings. Commun. Comp. Infor. Sci. 42, 201\u2013212 (2009). https:\/\/doi.org\/10.1007\/978-3-642-04133-4_17","journal-title":"Commun. Comp. Infor. Sci."},{"key":"4_CR30","unstructured":"Richard Henson, W.B.S., Daniel Dresner, H.I.A.N., David Booth, I.S.C. (n.d.).: IASME: Information Security Management evolution for SMEs"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Ponsard, C., Grandclaudon, J.: Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs. Springer International Publishing (2019). https:\/\/doi.org\/10.1007\/978-3-030-25109-3_13","DOI":"10.1007\/978-3-030-25109-3_13"},{"key":"4_CR32","unstructured":"Kumar, R.: Research methodology a step-by-step guide for beginners. In: Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, vol. 53, Issue 9 (2015). http:\/\/publications.lib.chalmers.se\/records\/fulltext\/245180\/245180.pdf"},{"key":"4_CR33","unstructured":"Department for Digital, Culture, M. & S. (DCMS).: Cyber security skills in the UK labour market 2020 (2020). https:\/\/www.gov.uk\/government\/publications\/cyber-security-skills-in-the-uk-labour-market-2020\/cyber-security-skills-in-the-uk-labour-market-2020"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Fatokun Faith, B., Hamid, S., Norman, A., Fatokun Johnson, O., Eke, C.I.: Relating factors of tertiary institution students\u2019 cybersecurity behavior. In: 2020 International Conference in Mathematics, Computer Engineering and Computer Science, ICMCECS 2020, pp. 0\u20135. https:\/\/doi.org\/10.1109\/ICMCECS47690.2020.246990","DOI":"10.1109\/ICMCECS47690.2020.246990"},{"key":"4_CR35","unstructured":"Jarques, C.: Chapter 4 stratified sampling. Stratified Sampling, pp. 1\u201327 (2014)"},{"key":"4_CR36","unstructured":"Ronald N. Forthofer, Eun Sul Lee, M.H.: Biostatistics (2544)"},{"key":"4_CR37","unstructured":"Monshaat. (n.d.).: Monshaat. Retrieved December 2, 2020. https:\/\/www.monshaat.gov.sa\/"},{"issue":"4","key":"4_CR38","first-page":"124","volume":"2","author":"AS Singh","year":"2013","unstructured":"Singh, A.S., Masuku, M.B.: Fundamentals of applied research and sampling techniques. Int. J. Medical Appl. Sci. 2(4), 124\u2013132 (2013)","journal-title":"Int. J. Medical Appl. Sci."},{"key":"4_CR39","unstructured":"Bartlett II, J.E., Kotrlik, J.W., Higgins, C.C.: Determing appropriate sample size in survey research. Infor. Technol. Learning Perform J. 19(1), 43\u201350 (2001). https:\/\/www.opalco.com\/wp-content\/uploads\/2014\/10\/Reading-Sample-Size1.pdf"},{"key":"4_CR40","unstructured":"Size, D.S. (n.d.).: Using Published Tables Using Formulas To Calculate A Sample Size Using A Census For Small Populations"},{"key":"4_CR41","unstructured":"Kanpur, I.: Chapter 10 two stage sampling (subsampling). Sampling Theory, Two Stage Sampling, pp. 1\u201321 (2013)"},{"key":"4_CR42","unstructured":"Pandey, R., Verma, M.R.: Samples allocation in different strata for impact. Rev. Bras. Biom. 26(4), 103\u2013112 (2008). http:\/\/jaguar.fcav.unesp.br\/RME\/fasciculos\/v26\/v26_n4\/A7_Artigo_Verma.pdf"},{"issue":"6","key":"4_CR43","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1111\/puar.13028","volume":"79","author":"DF Norris","year":"2019","unstructured":"Norris, D.F., Mateczun, L., Joshi, A., Finin, T.: Cyberattacks at the grass roots: american local governments and the need for high levels of cybersecurity. Public Adm. Rev. 79(6), 895\u2013904 (2019). https:\/\/doi.org\/10.1111\/puar.13028","journal-title":"Public Adm. Rev."},{"key":"4_CR44","unstructured":"Six, M.: Quality in Multisource Statistics Quality Guidelines for. 07112, 1\u201393"},{"issue":"3","key":"4_CR45","doi-asserted-by":"publisher","first-page":"392","DOI":"10.2307\/3172891","volume":"30","author":"S Sudman","year":"1993","unstructured":"Sudman, S., Lessler, J.T., Kalsbeek, W.D.: Nonsampling error in surveys. J. Mark. Res. 30(3), 392 (1993). https:\/\/doi.org\/10.2307\/3172891","journal-title":"J. Mark. Res."},{"key":"4_CR46","unstructured":"Shenton, A.K.: Strategies for ensuring trustworthiness in qualitative research projects.: University of Liverpool Library. Educ. Infor. 22, 63\u201375. https:\/\/pdfs.semanticscholar.org\/cbe6\/70d35e449ceed731466c316cd273032b28ca.pdf"}],"container-title":["Springer Proceedings in Complexity","Research and Innovation Forum 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19560-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T14:12:20Z","timestamp":1678803140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19560-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031195594","9783031195600"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19560-0_4","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"value":"2213-8684","type":"print"},{"value":"2213-8692","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RIIFORUM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Research & Innovation Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"riiforum2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/rii-forum.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}