Digital Transformation in Governmental Public Service Provision and Usable Security Perception in Saudi Arabia
Abstract
:1. Introduction
2. Related Work
- What are the concerns of citizens in using e-government portals in Saudi Arabia?
- What is the trust level of citizens regarding the e-governmental portals in Saudi Arabia?
- What is the citizens’ perception of usable security in e-government portals in Saudi Arabia?
- How do user intention, citizen concerns, and trust affect the citizens’ perception of the usable security of e-government portals?
3. Materials and Methods
4. Results
5. Discussion
6. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Alshammari, W.S.; Ajoud, M.E.K.; Ibrahim, A.I.H.; Al Shamlan, A.E.; Alsalman, A.I. Impact of E-government on Institutional Performance: Fostering Sustainable Higher Educational Practices. Eur. J. Sustain. Dev. 2025, 14, 169. [Google Scholar] [CrossRef]
- Ghobakhloo, M.; Iranmanesh, M.; Foroughi, B.; Tseng, M.L.; Nikbin, D.; Khanfar, A.A. Industry 4.0 digital transformation and opportunities for supply chain resilience: A comprehensive review and a strategic roadmap. Prod. Plan. Control. 2025, 36, 61–91. [Google Scholar] [CrossRef]
- Vrana, J.; Singh, R.R. Digitization, digitalization, digital transformation, and beyond. In Handbook of Nondestructive Evaluation 4.0; Springer Nature: Cham, Switzerland, 2025; pp. 1–26. [Google Scholar]
- Onesi-Ozigagun, O.; Ololade, Y.J.; Eyo-Udo, N.L.; Ogundipe, D.O. Leading digital transformation in non-digital sectors: A strategic review. Int. J. Manag. Entrep. Res. 2024, 6, 1157–1175. [Google Scholar] [CrossRef]
- Malik, M.; Andargoli, A.; Clavijo, R.C.; Mikalef, P. A relational view of how social capital contributes to effective digital transformation outcomes. J. Strateg. Inf. Syst. 2024, 33, 101837. [Google Scholar] [CrossRef]
- Iuliano, G.; Cuadrado-Ballesteros, B.; Bisogno, M. Citizens’e-participation in the digital world: Empirical insights from Europe. Public Money Manag. 2025, 45, 12–21. [Google Scholar] [CrossRef]
- Hossen, M.D.; Abedin, M.Z.; Chowdhury, T.M.; Islam, Z.; Kabir, M.R. Unveiling the Impact of E-Governance on the Transformation from Digital to Smart Bangladesh. Pak. J. Life Soc. Sci. 2025, 23, 85–108. [Google Scholar] [CrossRef]
- Chan, F.K.; Thong, J.Y.; Brown, S.A.; Venkatesh, V. Design characteristics and service experience with e-government services: A public value perspective. Int. J. Inf. Manag. 2025, 80, 102834. [Google Scholar] [CrossRef]
- Jejeniwa, T.O.; Mhlongo, N.Z.; Jejeniwa, T.O. Conceptualizing e-government initiatives: Lessons learned from Africa-US collaborations in digital governance. Int. J. Appl. Res. Soc. Sci. 2024, 6, 759–769. [Google Scholar] [CrossRef]
- Saeed, S.; Gull, H.; Aldossary, M.M.; Altamimi, A.F.; Alshahrani, M.S.; Saqib, M.; Zafar Iqbal, S.; Almuhaideb, A.M. Digital Transformation in Energy Sector: Cybersecurity Challenges and Implications. Information 2024, 15, 764. [Google Scholar] [CrossRef]
- Damaraju, A. Cloud Security Challenges and Solutions in the Era of Digital Transformation. Int. J. Adv. Eng. Technol. Innov. 2024, 1, 387–413. [Google Scholar]
- Azizi, M.; Hakimi, M.; Amiri, F.; Shahidzay, A.K. The Role of IT (Information Technology) Audit in Digital Transformation: Opportunities and Challenges. Open Access Indones. J. Soc. Sci. 2024, 7, 1473–1482. [Google Scholar]
- van der Kleij, R.; Van Hemert, D.; Te Paske, B.J.; Rooijakkers, T. Human-Centric Security Engineering: Towards a Research Agenda. Hum. Factors Des. Eng. Comput. 2024, 159, 8–10. [Google Scholar]
- de Nobrega, K.M.; Rutkowski, A.F.; Saunders, C. The whole of cyber defense: Syncing practice and theory. J. Strateg. Inf. Syst. 2024, 33, 101861. [Google Scholar] [CrossRef]
- Ghahramani, F.; Yazdanmehr, A.; Chen, D.; Wang, J. Continuous improvement of information security management: An organisational learning perspective. Eur. J. Inf. Syst. 2023, 32, 1011–1032. [Google Scholar] [CrossRef]
- Saeed, S.; Altamimi, S.A.; Alkayyal, N.A.; Alshehri, E.; Alabbad, D.A. Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors 2023, 23, 6666. [Google Scholar] [CrossRef]
- Shoemaker, D.; Kohnke, A.; Sigler, K. The Cybersecurity Body of Knowledge: The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity; CRC Press: Boca Raton, FL, USA, 2020. [Google Scholar]
- Kling, R. The organizational context of user-centered software designs. MIS Q. 1977, 1, 41–52. [Google Scholar] [CrossRef]
- Norman, D. Cognitive engineering. In User Centered System Design; Lawrence Erlbaum Associates, Inc.: Mahwah, NJ, USA, 1986. [Google Scholar]
- Wulf, V.; Müller, C.; Pipek, V.; Randall, D.; Rohde, M.; Stevens, G. Practice-based computing: Empirically grounded conceptualizations derived from design case studies. In Designing Socially Embedded Technologies in the Real-World; Springer: London, UK, 2015; pp. 111–150. [Google Scholar]
- Acar, Y.; Fahl, S.; Mazurek, M.L. You are not your developer, either: A research agenda for usable security and privacy research beyond end users. In Proceedings of the 2016 IEEE Cybersecurity Development (SecDev), Boston, MA, USA, 3–4 November 2016; pp. 3–8. [Google Scholar]
- Fischer-Hübner, S.; Karegar, F. Overview of Usable Privacy Research: Major Themes and Research Directions. In The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects; Springer: Cham, Switzerland, 2024; pp. 43–102. [Google Scholar]
- IBM Cost of a Data Breach Report. 2020. Available online: https://www.ibm.com/security/digital-assets/cost-data-breach-report/1Cost%20of%20a%20Data%20Breach%20Report%202020.pdf (accessed on 6 February 2025).
- Forbes. Available online: https://www.forbes.com/sites/joemckendrick/2013/11/20/cloud-computing-may-save-u-s-federal-government-20-billion-a-year-but-theres-more-to-it-than-just-cost-savings/ (accessed on 6 February 2025).
- Goldberg, S.G.; Johnson, G.A.; Shriver, S.K. Regulating privacy online: An economic evaluation of the GDPR. Am. Econ. J. Econ. Policy 2024, 16, 325–358. [Google Scholar] [CrossRef]
- Estonia. Available online: https://www.pwc.com/gx/en/services/legal/tech/assets/estonia-the-digital-republic-secured-by-blockchain.pdf (accessed on 6 February 2025).
- Cybersecurity in Estonia. 2024. Available online: https://www.ria.ee/sites/default/files/documents/2024-02/Cyber-security-in-Estonia-2024.pdf (accessed on 6 February 2025).
- Dixon, P. A Failure to “Do No Harm”—India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the US. Health Technol. 2017, 7, 539–567. [Google Scholar] [CrossRef]
- National Fraud Initiative. Available online: https://www.audit.wales/sites/default/files/2022-07/nfi_work_programme_final_eng.pdf (accessed on 6 February 2025).
- Haney, J.; Cunningham, C.; Furman, S.M. Towards Integrating Human-Centered Cybersecurity Research into Practice: A Practitioner Survey. In Proceedings of the Symposium on Usable Security and Privacy (USEC), San Diego, CA, USA, 26 February 2024. [Google Scholar]
- Kurdi, M.H.; Denden, M.; Paul, D. A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality. J. Inf. Secur. 2024, 15, 218–231. [Google Scholar] [CrossRef]
- Albarrak, A.M. Integration of Cybersecurity, Usability, and Human-Computer Interaction for Securing Energy Management Systems. Sustainability 2024, 16, 8144. [Google Scholar] [CrossRef]
- Jastaniah, K.; Zhang, N.; Mustafa, M.A. Efficient user-centric privacy-friendly and flexible wearable data aggregation and sharing. IEEE Trans. Cloud Comput. 2024, 12, 967–982. [Google Scholar] [CrossRef]
- Farzand, H.; Abraham, M.; Brewster, S.; Khamis, M.; Marky, K. A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones. Int. J. Hum. Comput. Interact. 2024, 41, 1628–1651. [Google Scholar]
- Zimmermann, V.; Schöni, L.; Schaltegger, T.; Ambuehl, B.; Knieps, M.; Ebert, N. Human-Centered Cybersecurity Revisited: From Enemies to Partners. Commun. ACM 2024, 67, 72–81. [Google Scholar] [CrossRef]
- Frik, A.; Kim, J.; Sanchez, J.R.; Ma, J. Users’ expectations about and use of smartphone privacy and security settings. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April–5 May 2022; pp. 1–24. [Google Scholar]
- Gull, H.; Saeed, S.; Iqbal, S.Z.; Bamarouf, Y.A.; Alqahtani, M.A.; Alabbad, D.A.; Saqib, M.; Al Qahtani, S.H.; Alamer, A. An empirical study of mobile commerce and customers security perception in Saudi Arabia. Electronics 2022, 11, 293. [Google Scholar] [CrossRef]
- Saeed, S. A customer-centric view of E-commerce security and privacy. Appl. Sci. 2023, 13, 1020. [Google Scholar] [CrossRef]
- Saeed, S. Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia. Sustainability 2023, 15, 9426. [Google Scholar] [CrossRef]
- Saeed, S. Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia. Sustainability 2023, 15, 6019. [Google Scholar] [CrossRef]
- Saeed, S. Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia. Big Data Cogn. Comput. 2024, 8, 162. [Google Scholar] [CrossRef]
- Metcalf, K.N. How to build e-governance in a digital society: The case of Estonia. Rev. Catalana Dret Pub. 2019, 58, 1. [Google Scholar]
- Roots, L. E-governance in providing public services in Estonia: A case study. Zesz. Nauk. Politech. Poznańskiej. Organ. i Zarządzanie 2017, 74, 77–93. [Google Scholar] [CrossRef]
- Lim, K.Y. Usability in Singapore. In Global Usability; Springer: London, UK, 2011; pp. 285–307. [Google Scholar]
- Lim, E.T.; Tan, C.W.; Cyr, D.; Pan, S.L.; Xiao, B. Advancing public trust relationships in electronic government: The Singapore e-filing journey. Inf. Syst. Res. 2012, 23, 1110–1130. [Google Scholar] [CrossRef]
- Larsen, H.C. Secure Data Exchange in Healthcare Infrastructure-A Case Study of Norway and Denmark. Master’s Thesis, University of Agder, Kristiansand, Norway, 2024. [Google Scholar]
- Kankam-Boateng, J.; Peressotti, M.; Mayer, P. Mapping Cybersecurity Practices and Mental Models in Danish Small and Medium Enterprises (SMEs): A Comprehensive Study using Focus Groups. In Proceedings of the 20th Symposium on Usable Privacy and Security, SOUPS 2024, Philadelphia, PA, USA, 11–13 August 2024. [Google Scholar]
- e-gov Index. Available online: https://publicadministration.un.org/egovkb/en-us/Data/Country-Information/id/149-Saudi-Arabia (accessed on 6 February 2025).
- Vision 2030. Available online: https://www.vision2030.gov.sa/en (accessed on 6 February 2025).
- Digital Government Authority. Available online: https://dga.gov.sa/en (accessed on 6 February 2025).
- National Cybersecurity Authority. Available online: https://nca.gov.sa/en/ (accessed on 6 February 2025).
- SDAIA. Available online: https://sdaia.gov.sa/en/default.aspx (accessed on 6 February 2025).
- Smart PLS 4. Available online: https://www.smartpls.com/ (accessed on 6 February 2025).
- Ozili, P.K. The acceptable R-square in empirical modelling for social science research. In Social Research Methodology and Publishing Results: A Guide to Non-Native English Speakers; IGI Global: Hershey, PA, USA, 2023; pp. 134–143. [Google Scholar]
- Cheung, G.W.; Cooper-Thomas, H.D.; Lau, R.S.; Wang, L.C. Reporting reliability, convergent and discriminant validity with structural equation modeling: A review and best-practice recommendations. Asia Pac. J. Manag. 2024, 41, 745–783. [Google Scholar] [CrossRef]
- Hair, J.F., Jr.; Hult, G.T.M.; Ringle, C.M.; Sarstedt, M.; Danks, N.P.; Ray, S. Partial Least Squares Structural Equation Modeling (PLS-SEM) Using R: A Workbook; Springer Nature: Cham, Switzerland, 2021; p. 197. [Google Scholar]
- Calder, A.; Watkins, S. IT Governance: A Manager’s Guide to Data Security and ISO 27001/ISO 27002; Kogan Page Ltd.: New York, NY, USA, 2008. [Google Scholar]
- Agrawal, V. Towards the Ontology of ISO/IEC 27005: 2011 Risk Management Standard. In Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, Frankfurt, Germany, 19–21 July 2016; pp. 101–111. [Google Scholar]
- Shen, L. The NIST cybersecurity framework: Overview and potential impacts. Scitech Lawyer 2014, 10, 16. [Google Scholar]
- Sadri, M. HIPAA: A Demand to Modernize Health Legislation. Undergrad. Law Rev. UC San Diego 2024, 2, 24–48. [Google Scholar] [CrossRef]
Study | Core Finding |
---|---|
[30] | Cybersecurity specialists recognize the value of adopting a human-centered cybersecurity approach, but its application is challenging. |
[31] | Proposed the need for more security awareness among software development teams for developing secure software systems in software development lifecycle. |
[32] | Proposed a framework to integrate usability in security controls to improve the user experience as well as resilience against cyber threats. |
[33] | Proposed a scheme, “SAMA”, which applies homomorphic encryption to ensure privacy during data aggregation. |
[34] | Proposed categorization-based solutions to protect users from different security attacks on their mobile phones. |
[35] | Emphasized improvements in usability aspects of security controls to transform users from weakest links to active controls against cybersecurity threats. |
[36] | Reported users’ inability to appropriately control security settings, making them more vulnerable to security threats. |
[37] | Proposed a model to improve customer security perception for improving e-commerce security in Saudi Arabia. |
[38] | Based on an empirical study in Pakistan, reported how credit card usage concerns, trustworthiness, user feelings, and motivational factors and reputation of an e-commerce application affect customers’ perceptions of security and trust. |
[39] | Reported email management and infrastructure management as main constructs in security perception of students in Saudi Arabia. |
[40] | Highlighted need for enhanced security controls and regular training of employees to better prepare themselves to respond to cybersecurity threats in an agile manner. |
[41] | Highlighted how privacy and security concerns as well as trustworthiness levels of end users positively impact a user’s perception of usable security and privacy perception of mobile phone applications. |
[42] | Discussed establishment of an e-governance system by providing an in-depth case study of Estonia. |
[43] | Based on a case study of Estonian Road Information Bureau, highlighted that successful usage of an e-government system requires awareness from the end users. |
[44] | Provided detailed insights on adoption of usability in research and development projects across Singapore. |
[45] | Based on the analysis of Singapore’s Electronic Tax-Filing (E-Filing) system, proposed strategies for building trust of end users in e-government systems. |
[46] | Compared data exchange strategies in the health sectors of Norway and Denmark and emphasized the need for collaboration among stakeholders for improvement. |
[47] | Explored Danish small- and medium-scale enterprises to evaluate cybersecurity practices and enhance security deficiencies. |
ID | Questions | Completely Agree | Mostly Agree | Neutral | Mostly Disagree | Completely Disagree |
---|---|---|---|---|---|---|
I1 | It makes it efficient to complete my governmental public service or tasks using e-government applications. | 33.68% | 23.58% | 21.72% | 8.48% | 12.54% |
I2 | Application of privacy and security policy makes learning the usage of e-government applications easy for me. | 22.53% | 31.82% | 26.13% | 11.03% | 8.48% |
ID | Question | Completely Agree | Mostly Agree | Neutral | Mostly Disagree | Completely Disagree |
---|---|---|---|---|---|---|
UC1 | It would be difficult for me to use e-government applications to do what I want it to do due to my privacy and security concerns. | 8.59% | 18.58% | 29.73% | 28.80% | 14.29% |
UC2 | It would be easy for me to become skillful in the use of the technology, even after applying privacy policy. | 19.40% | 36.82% | 29.15% | 8.71% | 5.92% |
UC3 | E-government applications will be more usable after applying privacy and security policies. | 27.41% | 31.36% | 26.48% | 8.71% | 6.04% |
UC4 | I feel that I have sufficient control over my own data when interacting with e- government applications. | 16.26% | 32.98% | 31.36% | 12.78% | 6.62% |
UC5 | I am concerned that e-government applications will expose my personal information to others without my authorization. | 7.67% | 20.79% | 27.41% | 23.81% | 20.33% |
UC6 | I believe that e-government applications collect only the necessary data required for providing the service. | 19.98% | 35.08% | 29.04% | 10.92% | 4.99% |
ID | Questions | Completely Agree | Mostly Agree | Neutral | Mostly Disagree | Completely Disagree |
---|---|---|---|---|---|---|
T1 | When you use e-government applications, do you think your data are more vulnerable to privacy and security issues? | 9.52% | 22.53% | 34.96% | 18.23% | 14.75% |
T2 | I presently intend to use e-government applications regularly for public services. | 20.09% | 33.68% | 28.46% | 10.34% | 7.43% |
T3 | I have limited the use the e-government applications because of my privacy and security concerns. | 7.55% | 18.12% | 29.73% | 28.69% | 15.91% |
T4 | I trust that e-government application managers would keep my best interests in mind when dealing with my personal data. | 21.60% | 35.89% | 28.34% | 8.25% | 5.92% |
T5 | Technological providers (such as software companies and app development companies) are always honest with users when it comes to using private data that they would provide. | 9.99% | 23.69% | 36.59% | 16.72% | 13.01% |
ID | Questions | Completely Agree | Mostly Agree | Neutral | Mostly Disagree | Completely Disagree |
---|---|---|---|---|---|---|
US1 | Privacy and security policies on the use of e-government applications are visible on the website or app that I use for public services. | 14.63% | 31.82% | 33.68% | 12.20% | 7.67% |
US2 | The privacy and security policies of e-government applications are accessible by easy navigation. | 13.24% | 36.35% | 33.22% | 12.54% | 4.65% |
US3 | Intended usage of my personal data is clearly mentioned by e-government applications. | 15.21% | 34.38% | 34.84% | 10.45% | 5.11% |
US4 | It is clearly mentioned by e-government applications that data will not be accessed without my explicit consent. | 17.54% | 31.13% | 34.84% | 10.69% | 5.81% |
US5 | Changes in privacy and security policies are notified to users? | 17.42% | 31.82% | 34.03% | 10.80% | 5.92% |
US6 | Security alerts are implemented in e-government applications to alert users about potential threats. | 17.42% | 33.91% | 32.98% | 9.52% | 6.16% |
US7 | Privacy- and security-related error messages are meaningful in e-government applications. | 19.05% | 34.73% | 31.24% | 9.99% | 4.99% |
US8 | E-government applications employ multiple methods of user authentication (such as two-factor authentication). | 29.97% | 29.85% | 26.95% | 6.97% | 6.27% |
US9 | Security and privacy measures implemented by e-government applications create barriers for users with disabilities? | 11.85% | 25.20% | 36.00% | 19.28% | 7.67% |
US10 | I believe that e-government services should be accessible to all citizens, including those with visual or hearing impairments | 35.42% | 24.27% | 25.78% | 8.13% | 6.39% |
Construct | R-Squared | Composite Reliability (rho_a) | Average Variance Extracted | Composite Reliability (rho_c) |
---|---|---|---|---|
User intention to use e-government services | - | 0.628 | 0.717 | 0.835 |
Citizens’ concerns with using e-government | - | 0.674 | 0.506 | 0.803 |
Trust in e-government portals | - | 0.612 | 0.551 | 0.785 |
Usable design of e-government services | 0.582 | 0.832 | 0.426 | 0.869 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Saeed, S. Digital Transformation in Governmental Public Service Provision and Usable Security Perception in Saudi Arabia. Information 2025, 16, 247. https://doi.org/10.3390/info16030247
Saeed S. Digital Transformation in Governmental Public Service Provision and Usable Security Perception in Saudi Arabia. Information. 2025; 16(3):247. https://doi.org/10.3390/info16030247
Chicago/Turabian StyleSaeed, Saqib. 2025. "Digital Transformation in Governmental Public Service Provision and Usable Security Perception in Saudi Arabia" Information 16, no. 3: 247. https://doi.org/10.3390/info16030247
APA StyleSaeed, S. (2025). Digital Transformation in Governmental Public Service Provision and Usable Security Perception in Saudi Arabia. Information, 16(3), 247. https://doi.org/10.3390/info16030247