{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T13:06:48Z","timestamp":1768828008532,"version":"3.49.0"},"reference-count":27,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T00:00:00Z","timestamp":1621296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.mdpi.com"],"crossmark-restriction":true},"short-container-title":["JCP"],"abstract":"<jats:p>The evolution of information systems has escalated significantly within the last decade as research unveils new concepts. The general orientation to provide solutions to complex problems continues to inspire innovation and new advancements. Cybersecurity is emerging as a critical factor for consideration within the resultant paradigm as information systems become significantly integrated. This paper provides an in-depth analysis of cybersecurity within the context of information systems. The paper examines some of the most consequential aspects of cybersecurity from the perspective of an e-government project in Saudi Arabia. A holistic system is proposed within the research framework to incorporate various scientific guidelines. The general orientation of this research is predicated on the aspiration to design and implement a complex and robust framework within which an e-government system can thrive within the Saudi Arabian context. A consideration of the physical environment within which the project will operate is also made, focusing on security. An evaluation of the cybersecurity environment in Saudi Arabia is reflective of significant advancements that have occurred in information system domains within the past few years.<\/jats:p>","DOI":"10.3390\/jcp1020017","type":"journal-article","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T06:01:33Z","timestamp":1621317693000},"page":"302-318","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["RETRACTED: Developing a Cybersecurity Framework for e-Government Project in the Kingdom of Saudi Arabia"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9817-2887","authenticated-orcid":false,"given":"Abdullah","family":"Alrubaiq","sequence":"first","affiliation":[{"name":"Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Al Majmaah 11952, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3352-3962","authenticated-orcid":false,"given":"Talal","family":"Alharbi","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Al Majmaah 11952, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2021,5,18]]},"reference":[{"key":"ref_1","first-page":"381","article-title":"Global e-government development: Besides the relative wealth of countries, do policies matter?","volume":"14","author":"Dias","year":"2020","journal-title":"Transform. Gov. People Process Policy"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Alfalah, A., Choudrie, J., and Spencer, N. (2017, January 4\u20137). Older adults adoption, use and diffusion of E-Government services in Saudi Arabia, Hail City: A quantitative study. Proceedings of the 50th Hawaii International Conference on System Sciences, Hilton Waikoloa Village, HI, USA.","DOI":"10.24251\/HICSS.2017.357"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.giq.2019.02.001","article-title":"Cross-boundary e-government systems: Determinants of performance","volume":"36","author":"Chen","year":"2019","journal-title":"Gov. Inf. Q."},{"key":"ref_4","first-page":"253","article-title":"The role of stakeholders in the effective use of e-government resources in public services","volume":"49","author":"Ashaye","year":"2019","journal-title":"Int. J. Inf. Manag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.giq.2019.01.001","article-title":"The public value of E-Government\u2013A literature review","volume":"36","author":"Twizeyimana","year":"2019","journal-title":"Gov. Inf. Q."},{"key":"ref_6","first-page":"612","article-title":"Are government employees adopting local e-government transformation?","volume":"11","author":"Batara","year":"2017","journal-title":"Transform. Gov. People Process Policy"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.giq.2017.05.002","article-title":"Analysing the scientific evolution of e-Government using a science mapping approach","volume":"34","author":"Cobo","year":"2017","journal-title":"Gov. Inf. Q."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.giq.2018.10.007","article-title":"The role of trust in e-Government effectiveness, operational effectiveness and user satisfaction: Lessons from Saudi Arabia in e-G2B","volume":"36","author":"Santa","year":"2019","journal-title":"Gov. Inf. Q."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.procs.2017.06.080","article-title":"Current State of Cloud Computing Adoption\u2014An Empirical Study in Major Public Sector Organizations of Saudi Arabia (KSA)","volume":"110","author":"Benkhelifa","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_10","first-page":"315","article-title":"Ontology-Based Cyber Security Policy Implementation in Saudi Arabia","volume":"9","author":"Talib","year":"2018","journal-title":"J. Inf. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Alotaibi, R., Houghton, L., and Sandhu, K. (2017). Factors Influencing Users\u2019 Intentions to Use Mobile Government Applications in Saudi Arabia: TAM Applicability. Int. J. Adv. Comput. Sci. Appl., 8.","DOI":"10.14569\/IJACSA.2017.080727"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"637","DOI":"10.4236\/blr.2020.113039","article-title":"An Institutional Theory Perspective on Developing a Cyber Security Legal Framework: A Case of Saudi Arabia","volume":"11","author":"Singh","year":"2020","journal-title":"Beijing L. Rev."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.ibusrev.2016.06.004","article-title":"Analysing the critical factors influencing trust in e-government adoption from citizens\u2019 perspective: A systematic review and a conceptual framework","volume":"26","author":"Alzahrani","year":"2017","journal-title":"Int. Bus. Rev."},{"key":"ref_14","first-page":"387","article-title":"Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030","volume":"Volume 58","author":"Lee","year":"2019","journal-title":"EPiC Series in Computing, Proceedings of 34th International Conference on Computers and Their Applications, Honolulu, HI, USA, 18\u201320 March 2019"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Batubara, F.R., Ubacht, J., and Janssen, M. (2018). Challenges of Blockchain Technology Adoption for E-Government: A Systematic Literature Review. Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, Delft, The Netherlands, 30 May\u20131 June 2018, Association for Computing Machinery. dg.o\u201918.","DOI":"10.1145\/3209281.3209317"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Monz\u00f3n, F., Tupia, M., and Bruzza, M. (2020). Security Versus Usability in E-Government: Insights from the Literature. Proceedings of the International Conference of Research Applied to Defense and Security, Quito, Ecuador, 13\u201315 May 2020, Springer.","DOI":"10.1007\/978-981-15-4875-8_3"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Almrezeq, N., Alhamdan, R., Mahyub, M., and Alfayad, M. (2019, January 24\u201327). An Exploratory Study to Investigate Citizens\u2019 Experience with E-Government Mobile Services in Saudi Arabia. Proceedings of the 2019 5th International Conference on Information Management (ICIM), Cambridge, UK.","DOI":"10.1109\/INFOMAN.2019.8714719"},{"key":"ref_18","first-page":"287","article-title":"Measuring success of e-government of Saudi Arabia","volume":"9","author":"Basahel","year":"2017","journal-title":"Int. J. Inf. Technol."},{"key":"ref_19","unstructured":"Aljarallah, S., and Lock, R. (2018, January 25\u201326). An empirical study of sustainable e-government characteristics in Saudi Arabia. Proceedings of the 18th European Conference on Digital Government, Santiago, Spain."},{"key":"ref_20","first-page":"357","article-title":"Access control model for modern virtual e-government services: Saudi Arabian case study","volume":"9","author":"Albrahim","year":"2018","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_21","unstructured":"Almukhlifi, A., Deng, H., and Kam, B. (2021, March 25). E-Government Adoption in Saudi Arabia: The Moderation Effect of Wastta. CONF-IRM, Available online: https:\/\/aisel.aisnet.org\/confirm2018\/9."},{"key":"ref_22","first-page":"1","article-title":"Understanding factors influencing e-government implementation in saudi arabia from an organizational perspective","volume":"11","author":"Alassim","year":"2017","journal-title":"Int. J. Inf. Commun. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Alkhlewi, A., Walters, R., and Wills, G. (2015). Factors Influencing the Implementation of a Private Government Cloud in Saudi Arabia. Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics\u2014ESaaSA, (CLOSER 2015), INSTICC, Lisbon, Portugal, 20\u201322 May 2015, SciTePress.","DOI":"10.5220\/0005528000690072"},{"key":"ref_24","first-page":"1","article-title":"e-Government Adoption in Saudi Arabia: The Moderation Influence of Transparency","volume":"10","author":"Almukhlifi","year":"2019","journal-title":"J. Adv. Inf. Technol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1080\/0144929X.2016.1269198","article-title":"The impact of security and its antecedents in behaviour intention of using e-government services","volume":"36","author":"Alharbi","year":"2017","journal-title":"Behav. Inf. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"7","DOI":"10.18775\/ijied.1849-7551-7020.2015.54.2001","article-title":"Effects of Privacy Policy and Government Regulation on Trust of Consumers in Saudi Arabia: An Empirical Study","volume":"5","author":"Alharbi","year":"2019","journal-title":"Int. J. Innov. Econ. Dev."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"101408","DOI":"10.1016\/j.giq.2019.101408","article-title":"Does high e-government adoption assure stronger security? Results from a cross-country analysis of Australia and Thailand","volume":"37","author":"Thompson","year":"2020","journal-title":"Gov. Inf. Q."}],"updated-by":[{"DOI":"10.3390\/jcp4040041","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T00:00:00Z","timestamp":1728518400000},"record-id":"62895"},{"DOI":"10.3390\/jcp4040041","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T00:00:00Z","timestamp":1621296000000}}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/2\/17\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T23:13:07Z","timestamp":1754262787000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/2\/17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,18]]},"references-count":27,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["jcp1020017"],"URL":"https:\/\/doi.org\/10.3390\/jcp1020017","relation":{"retraction":[{"id-type":"doi","id":"10.3390\/jcp4040041","asserted-by":"object"}]},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,18]]}}}