1 Introduction

Security of data has always been a hot issue for corporations, businesses and individuals. Breach in users’ data as well as that of organizations, can be devastating for citizens and government. It is the responsibility of the custodians to protect the data in their care. In this paper we shall study the details of Information Security policy of the Kingdom of Saudi Arabia in case of E-government. Our study will discuss vulnerabilities and threats posed by intruders to gain access to sensitive data or lack of safeguards in protecting the data. Privacy and security of location-based servers’ data are discussed in detail by Yamin and Abi Sen [1]. Many aspects of E-government in Saudi Arabia are discussed by Basahel and Yamin [2], and Yamin and Matar [3]. Some aspects of E-government in Jordan, which falls in the same region as Saudi Arabia, are discussed in [4].

The selection, deployment and employment of sound information security controls in any E-government is crucial and often results in major implications in the assets and operations of governmental agencies in addition to the benefits of end users. Information security policy refers to the technical, operational and mechanical countermeasures or safeguards prescribed to enhance protection of availability, integrity and confidentiality of the information and the system.

It is a guide to adopt a policy to direct stakeholders to abide by the system structure to prevent such threats as unauthorized access to invasion of personal information. For instance, end users should access e government portals from safe and secure internet connections preferably using their personal computers and mobile phones instead of public computers and cyber cafes.

This article provides an overview of Saudi E-government data security and presents results of a number of interviews conducted to assess the security aspects of these services. Our research is based on the qualitative analysis of the interviews which we had conducted on security aspects of E-government in Saudi Arabia.

2 Literature review

We shall group review of literature in different categories.

2.1 E-government

Since its introduction, the concept, service model, policies and other associated issues of E-government have been studied extensively by many researchers. E-government policies have over the years been framed by many national, regional and international organizations. For example, [5] have discussed framework for E-government including the security aspects relevant to the associated technology. Policies regarding the E-government in Saudi Arabia can be found in [6]. Various case studies of E-government of Saudi Arabia can be found in [7,8,9,10].

Concerns and safeguards to protect data have taken a much bigger stage with usage of internet. While internet is a gift to the society, its misuse by breach of data can be very harmful to individuals and the society at large. With the ongoing threats of cyber-attacks, the Saudi Arabian government has made remarkable improvements in digitization of the public sector. According to rankings by the United Nations E-government Survey 2018 (Chapter 7) [11], Riyadh stood at position 30 in the group of countries performing 50% to 75%. In 2014, for instance, the government average score stood at 0.75 EGDI scores ranking position thirty-six globally out of 193 nations surveyed. Australia was atop the survey scoring “very high” with averages scores of 0.91 closely followed by United Kingdom at 0.87. For details, refer to [12]. Several government services in Kingdom of Saudi Arabia are available online such as record online application and renewal of passports and filing of tax returns. The Saudi portal website [13] affords access to most government services under one roof. With the wide penetration of e government and commerce services in the Kingdom, enhanced adherence to privacy and security policies in all public enterprises is of high importance. In this article our focus is on the study of E-government data security in the case of Saudi Arabia.

2.2 General information about the Kingdom of Saudi Arabia

Saudi Arabia, an oil rich country, has in the twenty-first century undergone tremendous developments, modifications, pupation and changes by embracing and providing latest technologies to its citizens and businesses. Saudi Arabia represent strong cultural and religious past. Makkah (Mecca), the religious center of nearly one and a three quarters of Muslims on this planet, is the birthplace of the prophet of Islam. Saudi Arabia hosts millions of pilgrims every year for the annual and ongoing pilgrimages known as the Hajj and Umrah, which take place in and around Makkah. An estimated ten million people perform religious rituals during these pilgrimages. This pilgrimage has a great impact on the Saudi civil and civic services and in particular the services provided by the government of Saudi Arabia. The services sought for these pilgrims include grant of permission for hajj and issue of suitable visas, security clearance, travel, health and well-being management, accommodation and guidance. Thus, any policies which are used for the provision of E-government have to take these pilgrims into consideration. Many aspects of Saudi Arabia are extensively studied by many researchers including [14,15,16,17,18,19,20]. The most recent developments governing Saudi Arabian modernization are stipulated in the Saudi 2030 Vision [21].

3 The case of Saudi Arabia

The Saudi Arabia’s Information Security policy demands that all governmental agencies in accordance to Saudi Laws contained in Executive decrees, policies, regulations, standards and orders must deploy sufficient security controls in the security requirements. Despite this, determination of appropriate mix of security controls poses the greatest challenge. The national security policy provides appropriate recommended selection of security policies mix for enhanced protection of information systems. The policy document developed in 2007 during the launch of Yesser program [22] has safeguarded the E-government structure over time. However, it has not prevented cyber-attacks altogether. The purpose of this paper is to assess the effectiveness of the Saudi Arabia’s E-government system.

The Yesser program, measuring its effectiveness in preventing threats and vulnerabilities. The study further provides insights to enhance Yesser program’s information security, further improve the skills of IT specialists and increase consumer uptake of the program, thereby improving the life quality of Saudi citizenry. Saudi Arabia represent strong cultural and religious past. The country is a birthplace of Muhammad (PBUH), the prophet of Islam. Saudi Arabia hosts millions of pilgrims every year for the annual and ongoing pilgrimages known as the Haj and Omrah. An estimated ten million people perform religious rituals during these pilgrimages. These pilgrims have a great impact on the Saudi civil and civic services and in particular on the E-government provisions. The services sough for these pilgrims include grant of permission for hajj and issue of suitable visas, security clearance, travel, health and well-being management, accommodation and guidance. Thus, any policies of E-government have to take these pilgrims into consideration.

3.1 Significance of our study

The Kingdom of Saudi Arabia’s E-government Security policy aims at securing data resources and uphold a tri-set of data security features, namely: data integrity, its confidentiality and availability. Information security should not appear as restrictive or preventative to daily operations but instead facilitate safety in information safety from a wide array of threats and enhance business perpetuity, minimize damage costs and maximize use of information system. Improved information security has multifold benefits. Firstly, it assuages consumers of confidentiality about the Yesser program resulting to better services and delivery. Secondly, economic development trickles following stable foundation for effective and sustainable relationship among different economic sectors. With enormous resources at their disposal, it is the prerogative of governments to provide realization of information security principals. Consequently, it is archetypical to achieve successfully information security policy in Saudi Arabia, enabling striking multiple objectives. For instance, optimization of internal government business structures with free flow of information and synchronized sharing of will set in. Sharing of personal identification numbers among government departments enhances tracking of taxpayers, offenders and credit defaulters will enhance ease of doing business, informing government of appropriate programs for different users thereby curbing social ills and improve the country’s international relations. Foreign investors will trickle into the kingdom bring along additional investments from abroad and thereby strengthening Saudi Arabia’s competitiveness in international investment markets.

Equally, E-government information security increases government’s effectiveness and response to major social and economic problems. End user’s information freely but securely shared provides the government with objective and verifiable information to adjust its policies effectively and appropriately. For instance, demographic information on college students suffering from diabetes may inform the government’s ministry of health to develop advocacy and sensitization campaigns in campuses informing students on better living and lifestyle change. Equally, information on employability of graduates may inform the government through the ministry of higher education to overhaul the curriculum discourse. Consequently, information security policy is vitally beneficial to the kingdom in the long run, regionally and globally.

3.2 Research questions

This study will seek to answer the following questions with the aim of achieving the objectives of this study.

  1. 3.2.1

    How effective is the Saudi Arabia’s e government security policy in safeguarding government services?

  2. 3.2.2

    What protection safeguards does the security policy propagate in protecting the e government infrastructure?

  3. 3.2.3

    What are the major concerns of the consumers of the e government and how can the government address them?

3.3 Objective of our research

This study seeks to:

  1. 3.3.3

    Determine the effectiveness of the E-government’s security policy in protecting provision of government services online

  2. 3.3.4

    Identify the protection safeguards recommend in the security policy to protect the e government infrastructure

  3. 3.3.5

    Assess the vulnerabilities and threats prevalent in the e government’s security policy and how to mitigate them

4 Saudi E-government policies and their effectiveness

As in the case of evolution of many human interactive services, E-government has emerged from the combination of internet and web 2.0. E-government is synonymous with digitization of public sector; it goes beyond digitizing the civil service. It refers to the integration of information and communication technology (ICT) in the public sector intended to enhance provision of government services, increase transparency, save costs and perpetuate the government as accessible, responsive and in touch with the public. In spite of multifold launch and deployment of E-government initiatives globally, successful E-governments are significantly few and especially in developing countries. True, organizational, ICT infrastructure, social and political factors determine the partial or success of E-government altogether. We infer from [6] that the non-technical issues directly attribute to E-government initiative failures in most developing countries.

4.1 Users’ trust in security and privacy policy

Users have always been concerned about the security and privacy of their data in internet-based services. Multi studies on E-government in Saudi Arabia context hypothesized need for two types of trusts in E-government and E-commerce initiative success, namely: government trust and internet trust. An update on latest policies appears in the CITC annual report which includes details of the latest policies and governance of Saudi Arabia’s digital and E-government policies and Vision 2030 [23]. For instance, it was realized that 29% of interviewed Saudis attributed online shopping with safety fears. It also revealed strong assertive relationship between adoption of E-commerce and security and privacy issues emphasis among Saudi buyers and sellers. Still, Alharbi [16] found out security and privacy issues as two important barriers to E-govern and E-commerce adoption in Kingdom of Saudi Arabia. Additional studies on KSA’s E-government have revealed that users’ level of trust differed across different governmental agencies subject to user experience reporting by friends, family, media and own personal experiences.

4.2 Security policy in wed design

Designing security policy for internet-based services is usually an act of government. There seems to be a general lack of information on the security aspects of e-services in general and E-government in particular in the context of Saudi Arabia. The future of web portals in Saudi Arabia should witness proper guidelines governing with the web portals.

4.3 Accountability and monitoring of governmental agencies implementing Yesser program

A number of researchers have identified issues affecting security in Yasser program. In particular, Khaled [24], in his thesis dissertation identifies multiple vulnerabilities with the Yesser program’s security policy. Firstly, the program does not inculcate monitoring and accountability of governmental agencies implementing e government services in their operations. Khaled cites inadequate professionalism as a major vulnerability in implementation of the program’s e government security policy. AlGarni [25] has carried out an in-depth study of the information security policy of E-Government in Saudi Arabia. He has discussed many aspects of the Yesser’s provision of these services.

4.4 Decentralization and restructuring implementation of E-government security policy

Governments have always have a choice between centralized and decentralized service model as a policy regime. In instituting an E-government’s security policy, a centralized entity does the heavy lifting. As a result, implementing the policy across different governmental agencies becomes a complex and intricate process. Alyabis [26] offers that restructuring policy regulations and rules and flexibility sits at the center of a more transparent, accessible and democratic government as well as safe and secure system of online transactions.

4.5 Qualified and skilled manpower

Full proof secure E-government system bedevils presence of skilled and qualifies personnel to forecast, preempt, prevent and heal security loopholes. Inadequately skilled national Saudis in IT sector harbor successful implementation of e government security policy. Foreigners and expatriates are sadly in charge of securing Yesser’s infrastructure. Nonetheless, revamped scholarships, trainings and academicians in the IT field in the past decade will seal this vulnerability in the near future.

From a number of studies that we have mentioned, we find growing evidence that Yesser’s implementation requires above average internet users in Saudi Arabia. Over the years, internet connectivity, penetration and Yesser adoption remains at between 50 and 55 per cent of the population. The Computer Emergency Response Team proactively and reactively sensitizes and assuages Yesser program users of safety, privacy, reliability and security. In addition, its services cover both public and private enterprises using the Yesser program’s infrastructure.

5 Our study

We have conducted seventeen interviews of stakeholders of E-government services in 2019. Here we provide qualitative analysis of the interviews that we have conducted for the purpose.

5.1 Qualitative analysis

We designed 10 questions for the interviews of a selected group of Saudi E-government users. A list of these questions is available in Table 1. It is evident from this list that the qualitative analysis was suitable for our purpose. We compiled a list of users for the interviews which represented different age groups of both male and females from Qasim and Makkah regions of Saudi Arabia. We took all the standard precautions of the privacy and security of the respondents. These people were asked to respond to our questions on different aspects of data security of Saudi E-government as can be seen from Table 1. In some cases the responses were short while the others were detailed. In the next section we present an analysis of the responses followed by conclusions.

Table 1 Questionnaire for qualitative analysis

5.2 Analysis of the responses

The qualitative analysis of the questionnaire is based on seventeen interviews of the respondents who had previously used Saudi E-government and possessed good knowledge of the topic and service.

When asked about the quality of the E-government applications as in Question 1 (Q1), twelve respondents were found to be satisfied with overall quality of the applications, three were somewhat satisfied and two were unhappy. As for the quality of the E-government portal, as in Q2, fourteen respondents affirmed satisfaction with the overall features of Saudi E-government portal, two were neutral while one was unhappy. Double security verification features including sending a code to one’s phone number were appreciated as important security features. The interviewees appreciated the colorful and eye catching graphic features on the portal.

For Q3, thirteen respondents expressed satisfaction with the usefulness and relevance of data and information in the application about services in serving the intended purpose, three expressed somewhat satisfied while one was unsatisfied. User’s demographical details such as age, sex, and marital status, and occupation, date of birth and level of education were particularly considered as relevant and useful among interviewed stakeholders.

For Q4, sixteen respondents confirmed their satisfaction with the E-government user experience. The basis for their affirmation mainly rested on the fact that the service was quite stable with the downtime frequency of the service converging to zero. One respondent, however, expressed unhappiness due to slow internet connection accessed over a smart phone in a remote location. However, none of the respondents expressed dissatisfaction with E-government services over high frequency of downtime.

For Q5, twelve respondents were found to be satisfied with overall level of security of the e government service, two were somewhat satisfied and three were unhappy. Fourteen respondents did not have any concerns on overall security of the service and three of them were somewhat satisfied. None was unhappy. The three cited data and site encryption as an added security feature missing in the e government portal. For Q7, fourteen respondents were satisfied with the Yasser’s program and its provision of security mechanisms, two were somewhat satisfied while one was not satisfied. All of the fourteen respondents were satisfied with the programs security features and did not propose any areas for security enhancement. However any future improvements were welcome by all the respondents. There were some suggestions made by some of the interviewees. Two of them suggested that the login should be restricted to only within the country to enable monitoring the IP addresses that breach data. These respondent felt that perpetual monitoring of the Yasser’s program and transparent reporting of any breaches will further enhance security features. For Q9, fifteen respondents did not propose improvement in data security of e government applications saying they were satisfied while two were somewhat not satisfied. They recommended data encryption as an important security improvement. Finally, for Q10, fourteen of the respondents affirmed their support for need to audit the Yasser’s security mechanisms; two were satisfied with the present state while one was dissatisfied with the audit frequency and coverage.

5.3 Analysis and discussion of results of the responses

From the analysis of survey responses of the subsection 5.2, it is clear that a convincing majority of respondents have backed the initiatives of the Saudi Arabian government in providing and tightening privacy and security mechanisms related to E-government Applications data. Although majority of responses are in general appreciative about Yasser’s program and mechanisms but in the same time they have expressed their opinion to audit are the program on a regular basis. We expected some suggestions from the respondents to improve the security mechanisms but we didn’t get any. Instead, the respondents expressed their full satisfaction. In general, 85% or more respondents were satisfied with the overall security program and their huddling by the government. In a few cases, there were two or three respondents who were not entirely satisfied but they didn’t provide any suggestions to improve the program.

6 Conclusions

Data security and privacy in the E-government applications are major issues. In particular, there usually are sensitivities with the user data, which should never be compromised. Therefore, it is the duty of the E-government providers to ensure that the user data is kept secure and safe. In the case of Saudi Arabia, from the analysis and foregoing discussion, it is clear that the Saudi government has made serious efforts and have done a good job in the shorter than usual time to improve the security of data and its management. However, there are still some areas where data security requires improved management. It is the responsibility of government organizations, corporations and business organizations to take advantage of the Saudi government’s liberal policies to provide help in setting up infrastructure. The government has already provided the nation with state of art internet facilities. Fiber Optics internet technology, with its fast speed, which Saudi organizations are enjoying, should help even further to improve the security of data involved in E-government. In particular it is suggested that Yasser program should undergo a security audit to ensure the highest level of the privacy and safety. This will boost the confidence of the users and all hesitations will be eradicated from the minds of the people. It must be born in mind that the personal privacy is even more critical and difficult to provide and maintain in the E-government services, especially in the associated web portals.