Cybercrime Awareness among Saudi Nationals: Dataset

The supplementary dataset presented in this paper was used to measure the level of cybersecurity awareness of cybercrime in Saudi Arabia, presented in detail in [1]. The data were collected during the period of August to October of 2019. The dissemination process took place via an online questionnaire. The survey has four main parts: Personal and skill information (10 questions), Cybersecurity Activities (7 questions), Cybercrime Consciousness (8 questions), and Case Reports (6 questions). Two protocols were employed to recruit participants: subject must be of Saudi nationality and older than 18 years old. A combination of purposive and snowball techniques was utilized to collect respondents via university emails from 27 Saudi universities and WhatsApp messages to people meeting the requirements, gathering a total of 1230 responses. The data can be used to inform responsible authorities in Saudi Arabia about their roles in solving anticipated problems, as well as raising the awareness through programs, training, and short courses.


Subject
Computer Science, Cryptography and Cybersecurity Specific subject area Cybersecurity, Cybercrime, Malware Attack Type of data Tables How data were acquired Data was collected using an online survey platform (Google forms).The questionnaire is provided as a supplementary file.Data format Raw, Analyzed, Filtered Parameters for data collection The survey data was obtained from 1230 respondents of Saudi nationality with different backgrounds and levels of education within the period of August through October 2019.Only Saudi nationals older than 18 years old could participate in the survey Description of data collection The data was collected through an online questionnaire, distributed to Saudi people using a combination of purposive and snowball techniques to recruit the respondents via University emails and WhatsApp.Data

Value of the Data
• The data are important since they evaluate the level of awareness of Saudis based on aspects not covered in previous studies, such as using participants of different backgrounds, regions and expertise in utilizing technology.• The data can be useful for Saudi authorities such as the National Cybersecurity authority as well as researchers who are interested in the cybersecurity field.• The data can be valuable for authorities and researchers who aim to measure and promote the awareness level of cybersecurity.• The data can be utilized for educational purposes in terms of short courses and training.

Data Description
The questionnaire recruited 1230 Saudi nationals with different backgrounds and relies on knowledge and attitude aspects.The collected data were gathered between August and October of 2019.The survey is divided into four main groups of variables, which are listed below.
1. Personal and skill information, with 10 questions; gender, age, education level, major, administrative region, how often they access the Internet, level of digital skill, which devices they regularly use, what type of connectivity service they use in daily accessing the Internet, and finally the purpose for accessing the Internet.Tables 1 , and 2 are represented this part.2. Cybersecurity Activities, which aims to assess current Information technology knowledge based on 7 main questions (one main question has 11 sub-questions) using a five-point Likert scale (from 1-5: Never -Always), which outline in Table 3 .3. Cybercrime Consciousness, to measure what subjects believe and their opinion, based on 8 main questions (one main question has 6 sub-questions) using a five-point Likert scale (from 1-5: Strongly disagree to Strongly agree), and two questions used a four-point Likert scale (from 1-4: Do not know to Always).The answer of these questions are illustrated in Tables 4 , 5 , and 6 .4. Case Reports, which aimed to evaluate subjects?reactions when they faced a cybercrime incident, with 7 questions, as listed in Tables 7 and 8 Table

Experimental Design, Materials and Methods
The survey relies on an online questionnaire to examine the level of cybersecurity awareness of cybercrime in Saudi Arabia.The dataset was composed of 1230 participants, with data collected between August and October 2019.The questionnaire was created in Google forms, and adopted two protocols: participants older than 18 years old and of Saudi nationality, and who had their own Google account to submit their responses one time only.In order to meet with the aforementioned protocols, we utilized two methods to collect responses.The first method relied on creating an email list of faculty members from more than 20 public and private universities inside Saudi Arabia, asking them to participate in our questionnaire and forward the link to their students.The second method was based on employing the WhatsApp application to encourage individuals to participate our study, and to forward the link to their friends, family members and fellow college students who met with the predefined protocols.Each participant was asked if he/she would agree or disagree to enroll in our questionnaire.By the end of October 2019, the questionnaire was locked to further responses, with a total of 1,230 responses saved locally.
Since current studies such as [2] concentrate on specific groups, recruited insufficient number of subjects and the Internet users increased 10 million users since 2016, therefore, the paper [1] motivated from these aspects, and employed the Technology Acceptance Model (TAM) [3] to measure the level of awareness in Saudi Arabia using a questionnaire that developed by [2] and [4] .The final version of questionnaire is written in both the Arabic and English languages.It was also evaluated by six expert pilot users in terms of 1 (not relevant), 2 (somewhat relevant), 3 (quite relevant) and 4 (highly relevant).The overall of Content Validity Index (CVI) was 0.83.We then examined the reliability of the survey utilizing Cronbach's Alpha, with overall coefficient of 0.863.
The questionnaire is divided into four parts, which are: personal and skill information, Cybersecurity Activities, Cybercrime Consciousness and Case Reporting.We reported results in terms of frequency and percentage for all parts using R studio.Also, correlation coefficients were employed to calculate the relation about the activities that constitute cybercrimes, and it was concluded that there is a relation between online extortion and identity theft, with coefficient of 0.6.Further analyses were performed using Statistical Package for Social Sciences (SPSS) and utilized Regression Analysis to assess the effect of the vectors on Cyber Security Practices.For each question, we initially provided a summary for the model, then utilized ANOVA b and computation of correlation Coefficients a to validate the significance of gender and digital skill level.For example, for the question asking about creating a password that contains personal information, we defined a predictor (constant) for digital skill level and gender; the value of R is 0 .130 a and R Square is 0.017, Adjusted R Square is 0.015 and the Stand Error (Std.Error) of the Estimate is 1.41353.Then, we performed the regression analysis.

Table 2
Sociodemographic characteristics of the participants (n = 1230): Continued ( continued on next page )

Table 3
Assessing the IT knowledge of the participant (n = 1230)

Table 5
Evaluating the current awareness of the participants regarding cybercrimes (Online resources)(n = 1230)