{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T23:49:43Z","timestamp":1773013783025,"version":"3.50.1"},"reference-count":38,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"vor","delay-in-days":208,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>\n                    <jats:bold>Purpose:<\/jats:bold>\n                    This study explores cryptocurrency security concerns in the context of Saudi Arabia, focusing on a cross\u2010sectional survey to assess evolving technical threats and public risk perceptions. While regulatory concerns are acknowledged, the primary emphasis is on security risks, making this one of the few studies to specifically investigate digital asset vulnerabilities from a Saudi perspective. The novelty lies in bridging the views of both the general public and industry professionals to offer multidimensional insights into the country\u2019s cryptocurrency environment.\n                  <\/jats:p>\n                  <jats:p>\n                    <jats:bold>Methods:<\/jats:bold>\n                    A large\u2010scale online survey was conducted with 392 participants, including individuals from the general public, IT sector, banking institutions, and regulatory bodies. The instrument captured perceptions of various technical security threats\u2014such as 51% attacks, phishing, timejacking, and double\u2010spending\u2014alongside key public concerns about cryptocurrency safety. The mixed\u2010participant approach enabled a balanced analysis of cross\u2010sector risk awareness.\n                  <\/jats:p>\n                  <jats:p>\n                    <jats:bold>Results:<\/jats:bold>\n                    The findings indicate a significant disparity between public understanding and expert awareness regarding cryptocurrency security. Notably, 87.3% of respondents support the idea of central banks issuing their own digital currencies (CBDCs), reflecting widespread demand for safer and more regulated alternatives. Core risks identified include token theft, manipulative trading behavior, and technical vulnerabilities in decentralized platforms.\n                  <\/jats:p>\n                  <jats:p>\n                    <jats:bold>Conclusion:<\/jats:bold>\n                    This research contributes original insights into cryptocurrency security from a regional lens, integrating technical and perceptual dimensions often overlooked in existing literature. The study\u2019s multistakeholder findings offer valuable input for policymakers, regulators, and technology developers seeking to build secure and trusted crypto ecosystems in emerging markets like Saudi Arabia.\n                  <\/jats:p>","DOI":"10.1049\/ise2\/5100339","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T14:05:44Z","timestamp":1753711544000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing Cryptocurrency Security Risks: A Comprehensive Survey of Saudi Arabian Perspectives"],"prefix":"10.1049","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9391-6389","authenticated-orcid":false,"given":"Abeer Abdullah","family":"Alsadhan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"265","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"key":"e_1_2_16_1_2","doi-asserted-by":"publisher","DOI":"10.1177\/21582440231218513"},{"key":"e_1_2_16_2_2","unstructured":"ElshityE. M. I. Acceptance and Use of Cryptocurrencies in Saudi Arabia 2022 Academia.edu."},{"key":"e_1_2_16_3_2","doi-asserted-by":"publisher","DOI":"10.21608\/jstc.2022.274486"},{"key":"e_1_2_16_4_2","unstructured":"AlaklabiS. Factors Driving Individuals\u2019 Behavioral Intention to Use Cryptocurrency in Saudi Arabia 2022 ProQuest Dissertations."},{"key":"e_1_2_16_5_2","series-title":"Lecture Notes in Networks and Systems","first-page":"137","volume-title":"Proceedings of Eighth International Congress on Information and Communication Technology","author":"Alrehaili A.","year":"2023"},{"key":"e_1_2_16_6_2","doi-asserted-by":"publisher","DOI":"10.1080\/23311975.2023.2178092"},{"key":"e_1_2_16_7_2","unstructured":"Al-JabraA. A.andAlNuhaitH. A Vision Towards the Future of Cryptocurrencies: Financial Significance and Legal Challenges 2023 Info. Systems."},{"key":"e_1_2_16_8_2","article-title":"Cryptocurrency as a FinTech Instrument and Islamic Finance","author":"Abdeldayem M. M.","year":"2020","journal-title":"Journal of Xi\u2019an University of Architecture & Technology"},{"key":"e_1_2_16_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/jrfm16050271"},{"key":"e_1_2_16_10_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIR.2022.125657"},{"key":"e_1_2_16_11_2","article-title":"Investigating Trust and Perceived Value in Cryptocurrencies","author":"Shuhaiber A.","year":"2023","journal-title":"Kybernetes"},{"key":"e_1_2_16_12_2","doi-asserted-by":"publisher","DOI":"10.1108\/IJOA-02-2023-3623"},{"key":"e_1_2_16_13_2","doi-asserted-by":"publisher","DOI":"10.26414\/A130"},{"key":"e_1_2_16_14_2","doi-asserted-by":"publisher","DOI":"10.26668\/businessreview\/2023.v8i7.3265"},{"key":"e_1_2_16_15_2","doi-asserted-by":"publisher","DOI":"10.1177\/09722629241228965"},{"key":"e_1_2_16_16_2","first-page":"3248","article-title":"Blockchain Technology Adoption in the Context of Saudi Arabia: An Empirical Analysis for a Future Outlook","volume":"71","author":"Basiouni A. F.","year":"2022","journal-title":"Mathematical Statistician and Engineering Applications"},{"key":"e_1_2_16_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129697"},{"key":"e_1_2_16_18_2","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/9116006"},{"key":"e_1_2_16_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/su151813401"},{"key":"e_1_2_16_20_2","doi-asserted-by":"publisher","DOI":"10.4236\/jssm.2024.174018"},{"key":"e_1_2_16_21_2","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-07-2024-0110"},{"key":"e_1_2_16_22_2","doi-asserted-by":"publisher","DOI":"10.62754\/joe.v4i1.6067"},{"key":"e_1_2_16_23_2","doi-asserted-by":"crossref","unstructured":"Juma\u2019hA. AlnsourY. andKartalH. Influence of Security and Privacy Perceptions on User Ratings in Cryptocurrency Apps: A Text Mining Approach Study 2025 Available at SSRN 5115529 SSRN.","DOI":"10.2139\/ssrn.5115529"},{"key":"e_1_2_16_24_2","unstructured":"ZamanA. TlemsaniI. andMatthewsR. et al.Assessing the Potential of Blockchain Technology for Islamic Crypto Assets 2025 International Review: An Islamic Perspective."},{"key":"e_1_2_16_25_2","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-08-2024-0132"},{"key":"e_1_2_16_26_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-6403-8.ch013"},{"key":"e_1_2_16_27_2","doi-asserted-by":"publisher","DOI":"10.1108\/DPRG-10-2023-0146"},{"key":"e_1_2_16_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10614-025-10888-2"},{"key":"e_1_2_16_29_2","article-title":"Security Threats in Cryptocurrency Trading: A Comparative Study of Platforms","volume":"122","author":"Kim Y.","year":"2023","journal-title":"Computers & Security"},{"key":"e_1_2_16_30_2","article-title":"The Role of Central Bank Digital Currencies in Mitigating Risks of Cryptocurrencies","volume":"9","author":"Gupta R.","year":"2023","journal-title":"Financial Innovation"},{"key":"e_1_2_16_31_2","first-page":"213","article-title":"The Influence of Regulatory Frameworks on Cryptocurrency Adoption: An International Perspective","volume":"31","author":"Zhang H.","year":"2023","journal-title":"Journal of Financial Regulation and Compliance"},{"key":"e_1_2_16_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359552"},{"key":"e_1_2_16_33_2","article-title":"Public Perception of Cryptocurrency Security: An Empirical Study","volume":"69","author":"Rossi M.","year":"2024","journal-title":"International Journal of Information Management"},{"key":"e_1_2_16_34_2","first-page":"872","article-title":"Analyzing the Risks and Rewards of Cryptocurrency Investments: Insights From Emerging Markets","volume":"60","author":"Patel R.","year":"2024","journal-title":"Emerging Markets Finance and Trade"},{"key":"e_1_2_16_35_2","doi-asserted-by":"publisher","DOI":"10.1108\/JCEFTS-05-2024-0034"},{"key":"e_1_2_16_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.intfin.2023.101788"},{"key":"e_1_2_16_37_2","doi-asserted-by":"publisher","DOI":"10.70729\/SE23704161138"},{"key":"e_1_2_16_38_2","unstructured":"MungoliN. Deciphering the Blockchain: A Comprehensive Analysis of Bitcoin\u2019s Evolution Adoption and Future Implications 2023 arXiv preprintarXiv: 2304.02655."}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/5100339","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/ise2\/5100339","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/5100339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T22:34:52Z","timestamp":1773009292000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ise2\/5100339"}},"subtitle":[],"editor":[{"given":"Naghmeh","family":"Moradpoor","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/ise2\/5100339"],"URL":"https:\/\/doi.org\/10.1049\/ise2\/5100339","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-02-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5100339"}}