Next Article in Journal
An Experimental Study on Performance Evaluation of Shading Matrix to Select Optimal Parking Space for Solar-Powered Electric Vehicles
Previous Article in Journal
Bioeconomy: The Innovative Twin of Sustainability
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Managing Security Threats through Touchless Security Technologies: An Overview of the Integration of Facial Recognition Technology in the UAE Oil and Gas Industry

by
Saeed Hasan Al Zaabi
1,* and
Ruzaidi Zamri
2
1
Philosophy in Technology Management Faculty, Institute of Technology Management and Entrepreneurship, Universiti Teknikal Malaysia Melaka, Durian Tunggal 76100, Melaka, Malaysia
2
Manufacturing System Engineering, Faculty of Manufacturing Engineering, Universiti Teknikal Malaysia Melaka, Durian Tunggal 76100, Melaka, Malaysia
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(22), 14915; https://doi.org/10.3390/su142214915
Submission received: 17 October 2022 / Revised: 1 November 2022 / Accepted: 4 November 2022 / Published: 11 November 2022
(This article belongs to the Topic Emerging Technologies, Law and Policies)

Abstract

:
Throughout the past few years, the oil and gas industry in the United Arab Emirates has grown significantly, and is currently one of the top ten oil producers in the world. As a result, it is at risk of physical security threats, including theft, unauthorized access, vandalism, espionage, and other incidents which could disrupt its operation. Consequently, significant investments in the latest security technologies are necessary to protect this critical infrastructure and maintain its international standing. Therefore, the main objective of this study is to examine whether integrating facial recognition technology (FRT) with a physical security system in this sector would improve physical security performance and efficiently mitigate potential threats. A quantitative approach was applied to collect the essential information with a sample size of 371 selected through a simple random sampling method to ensure the validity and reliability of the research results. In addition, regression analysis was conducted using Smart-PLS version 3.3.9 based on (SEM) to define the significant relationships between the hypothesis applied in the conceptual model. Furthermore, the findings were significant as they provided the basis for future studies for the practical application of FRT to enhance the UAE oil and gas company’s resilience to physical security threats.

1. Introduction

Globally, the security of oil and gas infrastructure has become a paramount issue because of the safety levels needed in such sectors. These evolving security needs are critical, given the significance of oil and gas to the global economy. Ref. [1] notes that security lapses, government negligence, organizational culture, and criminal intent to access oil and gas resources have increased thefts and vandalism at different sites. According to [2], physical security performance within the oil production industry must be improved by adopting systematic and strategy-linked approaches. As a result, many companies in the modern business environment have been finding ways to implement physical protection systems that use different physical security technologies [3]. Indeed, discussions on physical security have evolved into topical issues for many organizations, given the growing need to secure assets from unauthorized personnel [4,5,6,7]. As [8] advised, one should not consider themselves lucky or 100% secure if you there is no experience of physical security threats, but rather one should rather think that monitoring capability is probably insufficient, as physical security threats can manifest in many forms, and should be paid attention to. However, one of the primary reasons for the growing concerns is that physical security threats have evolved, presenting physical security teams with novel and sophisticated challenges. For example, oil and gas company Saudi Aramco, one of the leading companies in the world, has encountered several security incidents in recent years even though it has invested considerable resources into improving network security and has entrusted 33,000 soldiers and 5000 guards to protect the company’s assets [9]. It seems reasonable to argue in this situation that physical security is a topic that is becoming more relevant than ever, leading scholars to examine the factors that could strengthen the existing physical security systems and develop new strategies for enhancing their effectiveness.
The United Arab Emirates is one of the key players in the global oil and gas industry. Despite its location in a desert region, which previously neglected its prosperity, the country has proven oil reserves of approximately 97.8 billion barrels, accounting for close to 10% of the global reserve [10]. Abu Dhabi’s oil and gas industry is pivotal to the region’s energy production, and its physical security has been gradually developing. Many mechanisms, such as traditional physical security controls, effective security officers’ patrols, fingerprint technology applications, electronic access control, perimeter intrusion, and CCTV surveillance systems, are already incorporated in highly restricted security zones [11,12,13,14]. Organizations have used these options for decades to protect their assets, and the technologies used therein have served their purpose effectively [15]. Unfortunately, these security measures display several weaknesses, such as the risk of unauthorized access to restricted facilities because of the loss of an access card or confusion during rush hours [6,16,17]. The fact that physical components of security systems are often insufficiently addressed is a truism in the academic literature. For example, ref. [6] argues that “the physical element of security is often overlooked”.
Therefore, the primary purpose of the current study aims to examine the potential of facial recognition technology integration with the existing physical security in an oil and gas organization in the UAE to improve its performance. The study was conducted in line with the integrated physical security culture model to understand the physical security gaps in this organization. The model is relatively recent; nonetheless, it has been validated in several studies [18,19,20]. Specifically, this study aimed to address the lack of research evidence on the industrial application of facial recognition technology in oil and gas companies operating in the Middle East and North Africa region, demonstrating its practical applicability. Therefore, the current study extends the limited research on facial recognition technology integration in the oil and gas industries of Abu Dhabi and the MENA region. This study is among the first to consider the applicability of facial recognition technology in the UAE oil and gas sector as opposed to other industries, such as law enforcement and airports.
Furthermore, there is compelling evidence that integrating facial recognition technology (FRT) into the existing physical security system could significantly enhance the effectiveness of physical security culture domains within an organization [7,21,22,23]. Despite the lack of adequate information from the literature on how the integration between the physical security system could be achieved, a research gap that the current study seeks to address, the findings could be used to develop practical recommendations to enhance physical security systems at any oil and gas company. However, a single study could hardly serve as specific guidelines for integrating facial recognition technology with the current physical security system. Therefore, the study results serve as a foundation for future research into the facial recognition technology integration concept in oil and gas industries, which has the prospect of widening the knowledge of the technology’s applicability. In addition, security specialists, scholars, policymakers, regulatory specialists, and corporate managers may use this study to support the development of further research into facial recognition technology integration in the oil and gas industries rather than in airport settings or other similar lines of study.

2. Literature Review

2.1. Physical Security Performance in the UAE Oil and Gas Industry

This literature review section covers the physical security performance in the UAE oil and gas industry, highlighting physical security systems in Abu Dhabi and the security technologies used. In the most general view, physical security can be defined as the system and process of protecting physical assets, restricted areas, and personnel within a company from any physical events and actions that may lead to damage or losses to an agency, institution, or enterprise [11]. Every organization maintains a security culture that protects its critical assets and valuable information. According to [7], physical security is an inalienable part of the systems engineering framework in the oil and gas sector and operations, information, network, communications, administrative, computer, personnel, and emanation security. Physical security in the UAE oil and gas industry has been gradually stabilizing since the dramatic explosion at one oil and gas facility in 2017, and as a consequence, security, health, and safety have become common discussions topics and focuses for the industry [24,25]. However, Abu Dhabi’s oil and gas industry is one of the country’s critical infrastructures and one of the top vital drivers of its economy. As a result, the likelihood of various threats emerging in this sector is significantly high.
The rapid progress of technology has underscored the need for organizations to maintain a robust physical security system to deal with more sophisticated security threats. However, most organizations do not prioritize physical security performance, instead focusing on cyber security [26]. It is imperative that organizations, especially those operating in critical infrastructures, assess their physical security to determine the level of protection, as adequate physical security requires continuous fostering, guidance, and attention to flourish and succeed. According to [27], understanding security performance and conducting vulnerability assessments have been a traditional part of security for decades. However, ref. [28] have emphasized that evaluating the level of protection a security element may provide against estimated or defined threats is challenging, particularly with limited available evaluation frameworks. Moreover, many security professionals often neglect the importance and role of operational attributes, including people, policies, and plans, in asset vulnerability assessments, which are much more challenging to control than observable security technologies [27]. According to Kralj, as cited in [29], security measures should be developed after assessing the extent of the threat, and if the threatening danger changes or becomes complex, security measures should be adjusted accordingly.
The current study explores the possibility of improving one of the UAE oil and gas organizations by integrating facial recognition technology with its existing physical security system. Whereas several studies have explored the importance of physical security vulnerabilities resulting from specific physical security elements’ inadequacies [30,31], designing and implementing an effective physical security framework is challenging. Nevertheless, ref. [32] note that oil and gas companies have various risks that must be accounted for in any investment decision. Due to the oil and gas industry representing a large portion of Abu Dhabi’s overall revenue, there is an enormous opportunity for physical security threats to surface within this organization [7]. Furthermore, the available evidence suggests that physical security measures currently implemented within Abu Dhabi’s oil and gas industry are insufficient. As a result, the number of acts of theft, unauthorized access, vandalism, espionage, and other events has increasingly threatened organizations’ physical security systems [20]. Therefore, an inherent change in the oil and gas industry in UAE is in finding a holistic approach to safety and security by investing in the latest technologies and resources to protect this critical infrastructure from impending physical security threats. Ref. [33] emphasized that “beyond deploying the latest technology, effective security must involve the corporate culture as well”. Moreover, at one point, an organization’s security functions, policies, procedures, and technologies have begun with decision-making, whether developed by humans or made evident through human decisions [34]. In this regard, it would be fair to conclude that physical security performance is significant for UAE oil and gas facilities and the global oil and gas industry.

2.2. Physical Security Threats and Physical Security Performance

Generally, each industry receives different physical security threats, so there is no universal tool to measure physical security performance. In addition, rapid technological change has left many organizations vulnerable to physical security threats as they focus less on the significance of physical security measures. However, proactive and preventative security planning can enhance resilience in many areas despite distinct differences in threats, knowledge, and experience, besides using effective and enforceable protocols, training in human factors, and understanding adverse conditions, events, and abnormal behavior patterns [35]. Therefore, organizations should take time to understand any vulnerabilities that they might face in order to develop an effective measuring tool following the set of significant physical security threats prevailing in such an industry at that particular time.
An inherent challenge for organizations responsible for maintaining critical infrastructures, such as oil and gas companies, usually lies in protecting assets of high value. Given the scope of their operations and significance to national economies, the implications of an ignored physical security threat could amount to immense losses. For example, in a recent occurrence in Abu Dhabi, three petroleum tankers exploded in a fire near ADNOC storage tanks, resulting in three deaths and six injuries, and one explosion occurred at the new construction area of Abu Dhabi International Airport [36,37]. Ultimately, major accidents can cause catastrophic damage to people, process facilities, and the environment, including toxic leakages, fires, and explosions triggered by safety hazards and security threats [2,38]. Due to compromised physical security systems, more effective solutions need to be studied and implemented. Nonetheless, the oil and gas facilities in Abu Dhabi might have physical security gaps [39], despite there being no consensus in the literature regarding specific vulnerabilities inherent to different organizations.
The theft of identification cards is one of the most significant physical security threats. While strict rules and procedures can prevent most other physical security threats, a penetrator can circumvent most physical barriers using a stolen identification card. Most controls utilized by organizations fail to address physical security threats related to stolen identification cards [40,41]. In particular, a penetrator could use a stolen key or someone else’s borrowed access card. Unfortunately, sometimes intruders breach restricted areas because someone has not used a locking system [42]. According to [28] during a conference on security technology, maintaining the integrity of electronic locking systems is essential to ensure physical security and manage risks that may threaten an organization’s goals. Furthermore, ref. [7] argues that oil and gas facilities struggle with “taking physical measures to protect personnel and prevent unauthorized access to installations, material, and documents, which also include protection against sabotage, willful damage, and theft”.
On the other hand, the theft of documents is a prevalent security threat in various sectors, including oil and gas. First, unaccounted visitors, individuals who entered the premises using the tailgating method, stolen access cards, or other penetrators could steal documents lying on employees’ desks or access the available information on their computers [43]. In this regard, organizations must maintain a “clear desk” policy by ensuring that employees who leave their desks remove all valuable documents to safe places to prevent such threats [44]. Second, data theft could be conducted by disgruntled employees who leave their job. Ref. [45] survey found that as many as 87% of employees take the data they have created with them when they leave the company, while 28% would take data that others have created, and 88% take corporate presentations or the company’s strategic presentations documents. For example, five individuals were arrested in India in 2015 for conducting corporate espionage at the Oil Ministry and stealing the Ministry’s trade secrets [46]. In 2021, Joshua Decker confessed to stealing documents and data about valves from the Oil States Piper Valve in Oklahoma [47].
Unaccounted visitors pose a substantial threat to organizations operating in the oil and gas industry for two reasons. First, it is harder to control them and monitor their actions. Second, an organization’s security officers will not be able to determine whether specific unaccounted visitors were responsible for an incident since they are unlikely to possess information on whether these visitors were present on the company’s premises during this incident [48]. Controlling unauthorized visitors could be conducted using various methods, such as swipe cards and visitor passes [49]. However, even these measures cannot entirely prevent the threat of unaccounted visitors unless an influential physical security culture supports them.
Another prevalent physical security threat is employee time theft. Generally, time theft can be described as employees being paid for work they have intentionally not completed [50]. The relationship between time theft and physical security has not received significant attention in the academic literature. Nevertheless, the available evidence provides a compelling reason to believe that time theft could be a disturbing risk for many oil and gas industries fail to address. It is known that employers lose approximately 4.5 hours every week because of employee time theft [51] and that $0.20 of each dollar made by U.S. companies is lost owing to this problem [52]. At the same time, it seems justified to argue that many types of time theft outlined above might expose an organization to physical security threats and affect its performance. This link might be especially true when a less experienced security officer clocks in for a more experienced colleague even though they do not have enough skills and knowledge to use specific security technologies or prevent security threats. In this situation, it seems justified that employee time theft constitutes a disturbing phenomenon from the physical security performance perspective.
Though many mechanisms, such as traditional physical security controls, effective security officers’ patrols, fingerprint technology applications, electronic access control, perimeter intrusion, and CCTV surveillance systems, are already incorporated in highlyrestricted security zones in the oil and gas sector [11,53], these security measures display several weaknesses, such as the risk of unauthorized access to restricted facilities due to the loss of an access card or confusion during rush hours [6,16,17]. The literature indicates that the risk is exceptionally high when multiple individuals pass through doors, such as during rush hours, making it easy for individuals to follow a person who has already used a swipe card or shown identification [54,55]. A small team of security officers could hardly ensure sufficient control, especially when identification and authentication are conducted manually, as human errors are inevitable. Nevertheless, many companies try to use modern technologies, such as biometric authentication, image recognition, and motion sensors, to avoid tailgating and other unauthorized access [56].

2.3. External Factors and Physical Security Performance

The academic literature describes the external environment as a plethora of issues that could critically influence an organization’s operations, including revenues, profits, and security [57]. Whereas internal factors substantially affect an organization’s physical security culture, the significance of external factors should not be underestimated. Therefore, organizations must prepare their employees to handle the unique challenges they face, both internal and external, to achieve success [58]. National legal systems, political stability, economic status, cultural and social background, and technological advancement are among the most significant constituents of an organization’s external environment that contribute to its physical security performance by affecting its resilience to address physical security threats [57].
National legislation could significantly impact physical security performance by determining the minimum standards organizations should apply and introducing constraints in using advanced methods. For example, many government organizations are bound to restrictions concerning sensitive information that have significant implications for physical security [59]. Moreover, as the oil and gas industry substantially contributes to the country’s economy, since petroleum and crude oil have become the primary fuel sources for critical sectors and infrastructure [60], the government could impose standard requirements for the physical security systems in the organizations, including minimum security training requirements. In theory, such a requirement is supposed to increase the competence of security officers working at organizations, thus improving physical security performance. However, ref. [61] identified organizations’ weakest links as the personnel who do not receive adequate security training and knowledge that could help safeguard the organization’s assets.
On the other hand, political stability in the country could influence an organization’s development, even though its effect on physical security might be less explicit. National political stability impacts business environments via investment and consumption channels [62]. Therefore, it seems justified to argue that such an influence manifests through at least three channels. First, national political stability affects enterprise growth at the organizational level, which could hinder the opportunity to build and maintain stable security systems [63]. Second, countries with high political stability are expected to ensure relatively high nationwide security to decrease the likelihood of security incidents [64]. Third, as stated above, political stability often positively influences investments, empowering organizations to collaborate with foreign enterprises specializing in corporate security and installing the latest security technologies [57]. As a result, political uncertainty may lead to a reduction in investment and economic growth.
Moreover, GDP growth and other economic factors might influence the financial performance of organizations and, accordingly, their security budgets. A higher security budget of a firm is likely to correlate with the use of advanced security technologies, such as fingerprint technologies instead of access cards, which could increase the physical security performance level [65]. Furthermore, the economy might also affect physical security performance by increasing or decreasing the significance of various physical security threats. For instance, a challenging economic situation in South Africa translates into unprecedented security threats for multiple organizations [66]. In light of the above, it seems reasonable to argue that economic factors play a significant role in determining security. Ref. [67] has stated that security and economic development are linked. That is almost a platitude. Without security, there can be no sustained economic development. We need to rethink it to include also socio-economic and cultural factors.
Physical security performance is intricately linked to cultural and social backgrounds. According to [68], national culture strongly influences an organizational security culture. For example, people from a culture that encourages communication and openness might be less capable of preventing the tailgating threat than individuals who promote individualism. On the other hand, an organization dedicated to a security culture encourages its employees to be aware of their surroundings, recognize suspicious activities, perform their work effectively, and take responsibility for their actions [69]. The arguments above illustrate that cultural and social background might significantly affect physical security performance. Additionally, it may be worthwhile to consider the relationship between culture and technology from the perspective of continuity, considering the broad sweep of cultural and technological developments from the eighteenth to the twenty-first century [70].
The impact of technological development on physical security is more evident than ever. As [71] posited, technology has the potential to change human behavior and drive the evolution of security cultures, regardless of public concerns about being controlled by technology. The national technological development level positively affects the security market’s supply, allowing organizations to utilize recent security technologies such as facial recognition technology [72]. Furthermore, this issue might also positively impact organizations’ physical security through indirect channels. For example, the technological development level in a country affects people’s attitudes toward technologies, their resistance to implementing new technologies at work, and their willingness to embrace new technologies in daily work activities [73]. Nevertheless, it seems sensible to agree with [28] in their conclusion during a conference on security technology, that “technological developments have resulted in security technologies and whole built environment systems progressing toward increased integration and connectivity”. As a result, the national technological development level might positively influence an organization implementing new physical security technologies, especially to maintain influential physical security culture.

2.4. Integrative Approach to Physical Security Culture

In today’s business environment, diversified strategies are necessary for protection against multiple threats and to reduce the risks organizations might face [35]. Despite [74] observation that more advanced security technologies are being implemented in rapidly changing business environments, including surveillance cameras with facial recognition capabilities, drones for aerial surveillance within integrated security control room command systems provide law enforcement agencies with immediate notification of suspicious activity or individuals. The unfortunate trend is that many organizations in the oil and gas industry are still operating with legacy security habits that are outmoded and vulnerable to physical security threats because they require constant upgrade and review.
Furthermore, available evidence indicates that simple locks or security officers’ presence might not be sufficient for maintaining a desirable level of physical security in the oil and gas industry [13]. Moreover, ref. [75] have noted that the sector has lagged even though the demand for new scientific knowledge and organization of security activities has increased significantly over time. The oil and gas industry has a complex security landscape because the physical security culture requires protection. For instance, physical perimeter barriers are necessary for the protection of physical assets from adverse conditions and unauthorized personnel. As a result, oil and gas industry organizations invest significant resources to establish an effective physical security system due to the criticality of their assets. Therefore, this issue has led to further research into automated technology solutions to assist physical security teams [76]. A typical physical security system would incorporate multiple security measures to deter, detect, and delay physical security threats while providing sufficient time for the security team to respond.
However, physical security is not a one-step, straightforward process to identify where improvements are required; it requires continual refinement, revision, and monitoring to keep pace with evolving modern technology and rapidly changing environments [77]. Furthermore, as the demand for better security infrastructure has grown, the difficulty and challenge of addressing the competing realities of new conditions has intensified. Physical security systems based on new technologies could have weaknesses and account for further research and development to improve their performance. Ref. [71] argue that new technology not only contributes to adequate security but may also create new vulnerabilities. Therefore, the solution calls for switching to an integrated physical security system that utilizes primary security components compared to a legacy and isolated system for assessing, detecting, tracking, and responding to new threats [78]. According to [26], in every organization, regardless of size or industry, physical security must be integrated into the culture, as any security measure taken can significantly impact employee safety and the organization’s success.
An integrated approach essentially utilizes different technologies to optimize performance. In contrast, traditional systems require security personnel to consistently assess the progressions in various screens, identifying and noting suspicious activities. Unless proper monitoring procedures are in place, these security controls may become obsolete and redundant [79]. Furthermore, the company’s management should also strive to develop manageable and reasonable protocols, and any protocol that does not meet this test should not be developed [80]. Finally, it seems sensible to conclude that an organization’s ability to purchase and maintain the necessary technology and equipment predetermines its resilience to physical security threats [78]. Therefore, the current study focused on an integrative approach to physical security culture for the introduction of facial recognition technology in a UAE oil and gas company to enhance its physical security system.
However, this approach should not suggest that facial recognition technology will likely displace human power because personnel must monitor and respond to potential threats. For example, the need for human response to alarms and emergencies will continue as long as assets require physical security protection, at least until the day comes when sophisticated robots can take their place, but human judgment is yet to be effectively replicated through high technology [81]. Integrating facial recognition technology into the physical security system of the current organization in the UAE should align with the underlying technologies and each organization’s function. As a result, an integrated physical security framework is essential for introducing facial recognition technology into the organization’s physical security structure. An integrated approach to physical security protection offers improved security coverage with fewer human operators. Indeed, integrated security systems provide a foundation for applying and implementing security policies and frameworks across the entire organizational domain [82]. Furthermore, ref. [83] suggest that this approach can offer visibility into how the technological, human, and organizational domains interact. Therefore, an integrated security system will likely provide better performance and viable options than conventional systems.

2.5. Managing Physical Security Threats through FRT Integration in a UAE Oil and Gas Company

Preliminary studies have shown that FRT can enhance physical security systems by addressing their vulnerabilities in mitigating physical security threats [32,78,84,85]. Furthermore, studies have proven this technology’s capabilities in different industries, and its implementation has been skyrocketing [86,87,88,89]. With the current trends showing an inclination toward touchless physical security technology, which could be essential in mitigating the risks and challenges brought by the global coronavirus pandemic, integrating facial recognition technology (FRT) into the current UAE oil and gas company’s physical security system will offer extensive benefits to the company. Thomas Norman suggests that integration is reached by comprehending an organization’s system capacities and combining diverse simple components, which collectively actualize higher functions [90].
The UAE is a pioneer in biometric implementation. In the last decade, it has integrated multiple biometric technologies into critical infrastructure systems, such as border control, to strengthen security and protect its citizens [91,92]. Several biometric features, including facial recognition technology, are already used in airports and by the police, which has allowed the UAE government to combat crime and reduce the possibility of security threats. Furthermore, unmanned aerial vehicles (UAVs), also known as drones, are used in UAE law enforcement and field operations to keep up with the latest security technologies [93]. For example, the UAE is testing a facial recognition system equipped in a moving police patrol car to detect the presence of wanted persons in public [94]. Moreover, the Dubai police were able to arrest 319 suspects in 2019 by integrating FRT with video surveillance [95]. As a result, FRT and other biometric features are not new in the Emirate.
Simultaneously, the recent approval in early 2021 by the UAE cabinet, led by Sheikh Mohammed, on facial recognition technology implementation has opened new opportunities to extend to other sectors, such as the oil and gas industry [96,97]. Therefore, FRT has become increasingly popular in the UAE, and government officials anticipate that security technology that utilizes artificial intelligence (AI) will enhance the physical security performance of many private organizations [98]. In light of these innovations, there is no reason to doubt that FRT will continue to expand in the UAE. On the other hand, many oil and gas companies in Abu Dhabi have not utilized advanced security technologies, such as facial recognition, in their physical security systems.
As recommended by [99] in his study, the future of physical security must embrace advanced technology to remain competitive with the ever-changing threat landscape spawned by the digital revolution. However, reviewing the entire Abu Dhabi Safety and Security Planning Manual, it is clear that facial recognition technology is not an essential aspect of physical security [100]. However, the document recommends promoting the use of active systems following a risk assessment for safety and security [100]. Therefore, introducing FRT into the overall physical security system in the UAE oil and gas company will offer a platform for the adoption of an enterprise-class security model’s inherent simplicity, which will result in lower maintenance costs and improved convenience. Particularly with the global coronavirus pandemic, the manual identification and authentication of individuals by security officers has become more challenging.
Moreover, this technology could protect against physical security threats when other methods cannot deter and detect them and enhance the effectiveness of different physical security measures. Unlike access control cards or most other methods, FRT minimizes the risk of tailgating, impersonation, stolen access cards, and other threats related to unauthorized access [101]. While such cards are theoretically sufficient, if a card is stolen, an unauthorized individual may be able to access restricted areas [6]. According to [102], the critical element in designing an organization’s physical protection system is the site entrance, which insiders can cross without any detection due to their authorized access, and outsiders utilize counterfeit authorization techniques, including impersonation and stolen access cards, to gain access.
Furthermore, the existing physical security controls often do not provide effective instruments to prevent impersonation in most organizations. For example, an access control card could be stolen or lost, enabling perpetrators to enter restricted areas and incur substantial losses to an organization [103]. On the other hand, facial recognition technology offers a higher level of security because it makes impersonation highly unlikely [104]. Similarly, fingerprint technology seems more secure from this perspective. At the same time, it could be circumvented with the help of artificial cloning of known fingerprints, severed fingerprints, and even fingerprints of authorized employees who are forced to help criminals enter secure areas [105,106]. However, the onset of the Covid-19 epidemic led to a steep fall in the market for contact fingerprint scanners, leading organizations to shift focus to the development of contactless verification technologies and the improvement of facial recognition technology [107]. In this situation, the oil and gas industry of Abu Dhabi requires a more sophisticated recognition method.
In the past few years, there has been considerable growth in facial recognition detection and analysis development and adoption technologies, which has led to the identification of critical biometric elements used within facial recognition technology [108]. The use of FRT can assist in the identification of individuals gathered at a point of emergency assembly. It is possible, for example, to locate persons who did not reach an emergency assembly point with a CCTV surveillance system with FRT integration [109]. In contrast to using CCTV surveillance alone, this integration would allow an incident management team (IMT) to dispatch response teams as soon as possible at the missing persons’ exact locations identified through real-time tracking to protect them [6]. Furthermore, the emergency response process in physical security is typically reactive, such as reacting after an incident occurs, where time is crucial, rather than proactively mitigating risks [110].
The available evidence provides a compelling reason to believe that the verification and authentication processes based on FRT are more accurate than those based on other technologies [111]. For example, while the best FRT algorithm in 2014 had an error rate of 4.1%, recent applications display accurate rates of 99.97% [112]. The main reason behind the superior capability of FRT solutions to track individual movements is connected with its ability to verify a persons identity early [111], which allows security officers to analyze the behavior of individuals the entire time they are on the company’s premises. As a result, it seems reasonable to conclude that facial recognition technology allows organizations to track and identify criminal activities on a premise, simultaneously alerting them to necessary precautionary practices [113].
Finally, facial recognition technology could be instrumental in monitoring employees’ time attendance. For example, buddy punching or beating the time clock could adversely affect organizations [114,115,116]. The use of facial recognition technology would prevent such scenarios, as an organization would be able to make sure that the time attendance of all the employees is accurately processed. Several organizations have already implemented attendance management systems based on FRT [117,118]. However, while these facial recognition technology elements have proven their effectiveness, it might not be enough to fully address this technology’s implementation amidst the global outbreak of the COVID-19 pandemic, wherein people are required to wear face masks and other face covers to protect themselves.
Nevertheless, FRT utilization could provide significant relief, as it has effectively enhanced security in many sectors, such as public administration, banking, and air travel [91,119]. This is especially true of recent data that show that facial recognition applications’ success rate in identifying persons’ identities is around 95% for people wearing masks and 99.5% for people without them [120]. Furthermore, the COVID-19 pandemic has led to the adoption of touchless technologies that effectively reduce the risks associated with spreading the pandemic while maintaining the required security levels. According to a new study by [121], globally, the biometric technology market size is projected to reach USD 137.5 billion by 2030, growing at a CAGR of 13.05% between 2022 and 2030.

2.6. The Conceptual Framework of Integrative Physical Security Culture

The main concept was depicted by [23] and provided an overview of the key concepts in designing this study’s conceptual framework. Since it was crucial to investigate the physical security in the present organization to understand the gaps existing in its various measures, selecting this framework was ideal as it is characterized by an attempt to conceptualize physical security culture in an integrative approach by measuring it as a whole and describing its various dimensions.
For example, in their research, [23] discussed physical security culture from a perspective that brought physical security threats, external factors, and physical security culture domains together. Its approach, therefore, allows for the development of a more nuanced understanding of physical security and analysis of it as a system [20]. Therefore, with the help of this concept, the study was able to position facial recognition technology within the existing system, examine its interrelationships with other domains of physical security culture and investigate its functionality and influence on physical security performance.
The conceptual framework shown in Figure 1 was constructed because the study focused on the relationship between physical security culture, physical security performance, and the potential of integrating FRT. Therefore, the framework demonstrates the connection between the research variables across the physical security culture and the research hypotheses. The first hypothesis examines the relationship between the physical security culture and the organization’s physical security performance. The second hypothesis focuses on the relationship between facial recognition technology efficiency and FRT integration into the organization’s physical security. Furthermore, the third and fourth hypotheses determine the relationship between physical security threats, external factors, and physical security performance. The final hypothesis examines the relationship between facial recognition technology integration and the physical security performance at the organization.
In this framework, external factors, which have a significant role in the [23] model, are presented by perceived national legal systems, political stability, economic status, cultural and social background, and technological advancement. External factors were quantified in the study based on respondents’ perceptions. Similarly, physical security threats were presented by stolen identification cards, theft of documents, unaccounted visitors, employee time theft, and unauthorized access. Respondents’ evaluations were quantified using a five-point Likert scale. However, the physical security threats and external factors on hypotheses three and four were used to get the respondents’ perceptions on the relationship with the organization’s physical security performance.
Therefore, applying this framework in the current study would allow for the investigation of these changes in detail, covering explicit and implicit transformations. Furthermore, the literature suggests that the physical security culture plays an essential role in all the processes related to physical security [18,19,20,22,23].
Figure 1. The conceptual framework of integrative physical security culture.
Figure 1. The conceptual framework of integrative physical security culture.
Sustainability 14 14915 g001

3. Methodology

Some researchers have argued that understanding research philosophy can help researchers explain their study designs [122]. This indicates that the general framework of the research comprises the sorts of evidence obtained on a particular topic related to the problem under investigation, how they were acquired, and how they would be analyzed. This study’s primary goal was to investigate the potential of facial recognition to address reported security gaps within the physical security system of the UAE oil and gas company. Therefore, to achieve this goal, it was necessary to examine the relationship between the physical security culture and the performance of physical security and explore the relationship between facial recognition technology efficiency and its integration into the physical security system. Additionally, it was necessary to investigate how physical security threats and external factors affect physical security performance. However, it was shown in the literature review that the amount of information on these matters is insufficient. Therefore, one of the few methods to collect necessary data for conducting this study was to retrieve this information from the employees working at the present company. In this situation, it seemed justified to select critical realism as the main research philosophy of this study. As it is known, critical realism allows scholars to explore reality through the analysis of sensations of research phenomena that are shared by humans while also thoroughly addressing and eliminating the biases that inevitably accompany such sensations [123].

3.1. Research Method

Quantitative research methods evaluate specific quantifying parameters of interest [124]. According to [125], selecting the appropriate research methodology is pivotal in ensuring effective research based on finding the connection between research objectives and the attributes of available opportunities for collecting the essential insight for a study. The current research aimed to assess the feasibility of integrating FRT into the physical security system in the UAE oil and gas company. Due to the criticality of the issues identified in the research questions and the need to provide concise insight into the correlation between respondents’ perceptions and the current practices in the company, this study relied on a quantitative research methodology. A quantitative research methodology enables the assessment and quantification of variables, which is mandatory for examining a causal relationship [126]. Therefore, selecting a quantitative research methodology offered a platform for making several estimations through empirical observations that used statistical expressions to define the underlying relationships in the research questions [125]. The author employed a survey strategy in a self-administered questionnaire in this study. The author chose this strategy because surveys are standardized in that respondents are asked the same questions phrased in the same manner, whereas alternative approaches lack this consistency. A survey approach is a quantitative technique in which a researcher asks preset questions to a large group or a random sample of individuals [127]. Therefore, the approach effectively supported the collection, analysis, and presentation of findings on the research problem.

3.2. Survey Instrument Development

The questionnaire used in the study was developed based on the literature review’s findings. Ref. [128] addressed that when researchers seek to collect opinions and sentiments from a large sample, they prefer to create carefully structured and pre-tested questionnaires as a convenient method. The survey questionnaire used in this research included questions about the company’s physical security culture, the projected efficiency of facial recognition technology, the reported significance of physical security threats and external factors for the organization, and the physical security performance and facial recognition technology integration at the organization. As [129] explain, a security survey’s purpose is to determine an organization’s current security status, identify any deficiencies, and make recommendations to enhance the organization’s security. The quantification of all the variables was conducted with the help of Likert’s five-point scale. This scale is one of the most popular methods to quantify survey variables and has been successfully applied in many quantitative studies [130].
The questionnaire had six significant sections that dealt with different aspects of the topic under investigation. The first section of the questionnaire comprised a brief demographic part with questions about the respondent’s age, gender, and work experience, which was necessary for analyzing the validity and reliability of this study. The questionnaire’s second section included questions about the physical security culture at the company and its elements comprising company policy, security procedures, CCTV surveillance, fingerprint technology, perimeter intrusion detection, traditional physical security controls, access control systems, security officers, and employees’ attitudes. The third section focused on the efficiency of facial recognition technology and its integration with the organization’s physical security system. The respondents were asked to evaluate the efficacy of facial recognition technology in processing time attendance, preventing unauthorized access, tracking individual movements, verifying and authenticating individuals, and detecting impersonation. In the fourth section of the questionnaire, the respondents were asked about the relationship between physical security threats and physical security performance in the company. Simultaneously, the respondents were asked about external factors and their relationship to the organization’s physical security level in section five of the questionnaire. The sixth and final section focused on the projected performance of the organization’s physical security after integrating facial recognition technology. The respondents were asked questions to evaluate the company’s physical security performance. Questions regarding the quality of physical security response and the detection of unauthorized access were asked.

3.3. Study Sample (Size) and Data Collection

All statistical analysis relies heavily on sample size to produce valuable results. Ref. [131] have suggested that a larger sample size is required for more sophisticated statistical analyses. This study utilized structural equation modelling (SEM) to conduct various analyses, and as with other statistical techniques, the adequate sample size is essential for valid conclusions to be drawn [132]. Sampling is about choosing from a specific population to draw valid conclusions from research results [133]. Therefore, selecting the appropriate sample that is enough to allow the generalization of the whole population is a basis for a quantitative study. While it was suggested by [134] to include a minimum of five participants for each item (indicator), and the sample size for each analysis should not be less than 100 persons. However, a sample size minimum of 200 was recommended by [132,135] to ensure strong SEM analysis results. Simple random sampling was used because it is the basic selection process, easiest to understand, ensures the least bias, and the results can be generalized [136,137]. The sampling frame listing all the employees working in the company and their complete details was obtained from the management.
Every other research strategy employs a distinct methodology for data collection and analysis, and each methodology has benefits and drawbacks [138]. Among the primary objectives of conducting research is choosing the most helpful strategy. Given the assumptions of a consistent response rate to get the desired sample size, the researcher, following the above recommendations, aimed to achieve more than 200 complete and usable questionnaires. The author selected a self-administered questionnaire as the primary data collection method distributed in-person, owing to its many advantages beyond budget and time constraints [139]. A target of 450 questionnaires was set to get the required sample size. However, only 400 questionnaires were distributed to the population due to various challenges, such as enforced restrictions for COVID-19, where the organization was hesitant to provide time out for the completion of surveys, especially when groups of employees gathered to answer questions or restricted access to some high-security zones. A total of 380 questionnaires were received. Among the 380 questionnaires, 371 were complete and usable, 20 employees did not submit the questionnaire, while the remaining nine were incomplete and had inconsistent responses. As a result, the author prepared the next steps for data preparation and analysis with the dataset from 371 samples.

4. Data Analysis

This section aims to test the research hypotheses developed for the current study by employing various statistical techniques to analyze the quantitative data and present the data analysis findings. The statistical software SPSS version 25 and the structural equation modelling (SEM) Smart-PLS version 3.3.9 were used to analyze the responses to the questionnaires distributed to the participants. In addition, demographic analysis and descriptive statistics were conducted before presenting structural equation modelling (SEM) for the study of measurement and structural model analysis within the Smart-PLS [140].
Given the selected approach of distributing the questionnaires in-person to individual participants, 400 questionnaires were handed out compared to the target of 450. As a result, out of 380 questionnaires received, 371 were complete and usable, reaching a response rate of 97.6%, considered an excellent response rate related to studies using a survey method [141], as shown in Table 1. On the other hand, 20 employees did not turn in their questionnaires, and the remaining nine, constituting 2.4% of the unusable questionnaires, were incomplete and had inconsistent responses.

4.1. Demographic Features of Respondents

This section presents the respondent distribution for all demographic variables and, as illustrated in Table 2, the respondents were predominantly male, comprising 94.1% of the sample, whereas only 5.9% were female. Therefore, the results imply that most employees working at the selected company are male. In addition, according to the data, 33.2% of respondents were aged 35 to 44, the highest frequency, 24.3% were 45 to 54, and 7.8% were over 55. As indicated by the respondents’ work experience results, respondents with four to five years of work experience had the highest frequency of 30.2%, followed by respondents with two to three years of work experience, constituting 29.6%, and respondents with work experience over eight years had the lowest frequency at 3.2%.
Since most respondents had four to five years of experience at the organization, this could indicate a moderate familiarity with the physical security system. On the other hand, most respondents had a bachelor’s degree, representing 38% of the total, showing a high level of knowledge, followed by some college at 25.6%, and the lowest frequency was among those with a Ph.D. degree, standing at 4.3%. Additionally, “job position” results reveal that employees working at the management level were the most frequent, comprising 29.6%, followed by ordinary staff at 26.1%, and executive management being the lowest frequency, represented by 6.5% of the total respondents, again implying that most of the respondents were knowledgeable.
Furthermore, responses questions regarding the frequency of driving company vehicles revealed that the highest frequency is attributed to respondents who sometimes drive, accounting for 29.4%, followed by those who “rarely” drive, at 20.5%. These results show that 29.1% of respondents drove the company vehicle either often or very often. Responses to the question about security procedures and measures used at the company show that the majority of respondents had a moderate level of familiarity, as represented by 34.2% of the total respondents, followed by responses that were “slightly familiar” at 27%, while 25.3% had a very or extremely high level of familiarity. These results suggest that the collected data had a high content validity as the number of respondents unfamiliar with the security procedures and measures used by the company was small, representing 27% of the total.

4.2. Measurement Model

The measurement model specifies the characteristics of the observable variables used to make measurements and the rules that control how latent variables (LV) are measured in terms of the observed variables (items). The initial phase of the study consists of confirming the validity of the measurement model (Figure 2). However, when developing measurement models, paying close attention to the existing relationship between observable (items or indicators) and hidden variables (latent variables) is essential. Confirmatory factor analysis (CFA) is the statistical analysis that confirms the factor structure of a set of observed variables [142]. Moreover, this technique allows the researchers to examine the hypothesized relationship between the latent variables and their measurements. Therefore, confirmatory factor analysis was used to evaluate the measurement model’s reliability (Cronbach’s and composite reliability) and the model’s validity (convergent validity and discriminant validity).
The significance of the measurement model may be attributed to the fact that it evaluates the dependability of the observable variables used in the measurement of the concealed variables. Reliability refers to a measurement instrument’s accuracy, consistency, and stability over time. When the result is consistent, a conclusion can be drawn that the results are not affected by chance [143,144]. This characteristic is known as indicator reliability and may be evaluated using outer loadings. Examining the indicator loadings is the first step in the reflective measurement model evaluation process. This is followed by analyzing the internal consistency reliability via composite reliability and the convergent validity of each construct measured by average variance extracted (AVE) for all items on each construct. The outer loadings must be at least 0.708 or higher as a general rule [145], and based on the results, all loading was above 0.7 and ranged between 0.744 to 0.928, Table 3.
On the other hand, a Cronbach’s alpha test was performed at this early stage of data analysis to ensure all constructs had acceptable Cronbach’s alpha scores before applying other statistical methods, such as factor analysis and structural equation modeling (SEM). However, this method is susceptible to the number of items on the scale, which could result in an underestimation of internal consistency reliability. Nevertheless, a value of 0.7 and above is considered acceptable. Table 3 indicates that Cronbach’s alpha scores for all individual constructs range from 0.846 to 0.931. Hence, all were above the recommended level of 0.7 [137,139,143,146]. In addition, composite reliability (CR), a distinct internal consistency reliability assessment, was used to measure internal consistency based on the interrelationships between observed items. This type of reliability considers the various outer loadings of the indicator variables, according to which a CR of greater than 0.7 is acceptable [147]. The composite reliability (CR) results, shown in column 5 in Table 3, ranged from 0.907 to 0.946, which was above 0.7, indicating an acceptable value for the reliability of all variables.
Furthermore, convergent and discriminant validity are tests performed during the measurement model’s testing phase. The convergent validity was examined using a reflective construct since all research variables in this study were reflective constructs. Convergent validity refers to how the new scale relates to other variables and measures of similar construct, which could be considered a subclass of construct validity [148]. Therefore, the average variation extracted (AVE) metric, which is used to assess the proportion of explained variation by indicators in comparison to measurement errors, receives support from the concept of convergent validity. Based on this concept, it is possible to evaluate the convergent validity of the constructs by calculating the average variance extracted (AVE). This method attempts to quantify the amount of variation that a latent variable component retrieved from its indicators compared to the amount due to measurement. It is proposed that the minimum ideal level of average variance extracted (AVE) be 0.5 to ensure a reasonable degree of convergent validity [147,149,150]. According to the research results in Table 3, the AVE varied between 0.628 and 0.825, confirming their contribution to related constructs.
Consequently, establishing discriminant validity denotes that a construct is distinct and includes occurrences not covered by other constructs in the model [151]. Three criteria can be used to evaluate the discriminant validity of a model, including the Fornell–Larcker criterion [149], the heterotrait–monotrait ratio of correlations (HTMT) criterion, and the cross-loading criterion. According to [149], if the square root of AVE is bigger than the correlations between the latent variables, the two constructs are said to be discriminant. Table 4 represents the results of the square root of each construct’s AVE, which were greater than the correlation of latent variables, indicating that the constructs were strongly related to the corresponding indicators.
However, some methodological experts have criticized the Fornell–Larcker criterion for assessing discriminant validity. As a result, ref. [152] proposed an alternative approach based on the multitrait–multimethod matrix to assess discriminant validity: the heterotrait–monotrait ratio of correlations (HTMT). According to [137], to distinguish between the two structures, the HTMT value must be smaller than 0.90. Therefore, the HTMT values for each construct covered by this investigation are displayed in Table 5. The constructs consequently showed adequate discriminant validity since all values were below 0.9.
Moreover, this study used a third method, cross-loading criteria, to assess discriminant validity at the item level by row and column. This approach seeks to ascertain if indicators (items) loading on a particular latent construct should be greater than the loading on all other associated constructs [153,154]. While the Fornell–Larcker criterion measures discriminant validity on a construct level, the cross-loadings facilitate this assessment on an indicator level. Based on Table 6, the loading of each indicator was more significant than all of its cross-loadings, which indicates that the measuring model’s constructs construct by row and column. This demonstrates that each construct exhibited a high level of unidimensionality, thus sufficient discriminant validity.

4.3. Assessing the Structural Equation Model

Structural equation modeling was applied to assess the research hypotheses. According to the research framework in the path model in Figure 3, the effects of physical security culture, physical security threats, external factors, and facial recognition technology integration (as independent variables) on the performance of physical security (as dependent variables) were studied. Besides that, the relationship between facial recognition technology efficiency and facial recognition technology integration was also included in the path model.
The bootstrapping approach was utilized to evaluate the importance of the proposed research hypotheses for the path model. Bootstrapping comprises generating new samples from the existing dataset by randomly resampling them [147]. Figure 3 illustrates the evaluation of the standardized path coefficients (β), t-statistics (the ratio of estimated beta value to its standard error), and p-values, the significance of the path model based on bootstrapping. The results consider [155] statement that the p-value identifies whether the effect occurs but does not indicate the magnitude of the effect and the R2 for each endogenous component.
Figure 3. Path model with control variables (Bootstrapping).
Figure 3. Path model with control variables (Bootstrapping).
Sustainability 14 14915 g003
According to the results in Table 7, the effect of physical security culture on the performance of physical security was positive and significant (β = 0.163, p < 0.001). Similarly, facial recognition technology integration had a positive and significant effect on the performance of physical security (β = 0.241, p < 0.001). Results also show that the effect of physical security threats on the performance of physical security was positive and significant (β = 0.120, p = 0.006). The last exogenous variable was external factors, and results indicate that external factors had a positive and significant effect on the performance of physical security (β = 0.254, p < 0.001). Furthermore, the results show that facial recognition technology efficiency had a positive and significant relationship with facial recognition technology integration (β = 0.540, p < 0.001).
Since there were four control variables, including work experience, education position, and knowledge, the path model results show that, except for work experience, other control variables had a significant relationship with physical security performance. On the other hand, the relationship between job position and performance of physical security was positive and significant (β = 0.155, p < 0.001), which means a higher level of job position tends to have a higher performance of physical security. Likewise, the educational level also had a positive and significant relationship with the performance of physical security (β = 0.106, p = 0.002), indicating that respondents with higher education levels had a compelling performance of physical security. Furthermore, the results also show a positive and significant relationship between the knowledge level and physical security performance (β = 0.123, p < 0.001).
The R square value is the proportion of the dependent variables’ variance that can be accounted for by the independent variables, otherwise recognized as the coefficient of determination or the coefficient of multiple determination for multiple regression. The Smart-PLS algorithm function was used to calculate this study’s R2 values (Table 8). Ref. [156] have suggested that, for the explained variance of a particular endogenous construct to be considered adequate, R2 values should be equal to or greater than 0.10. The adjusted R2 for facial recognition technology integration as an endogenous variable in the model was 0.290. Ref. [157] has stated that R2 is significant if it exceeds 0.26, which means that 29% of facial recognition technology integration changes among respondents can be explained by facial recognition technology efficiency as a single independent variable. On the other hand, the adjusted R2 for the physical security performance as the main dependent variable in this model was 0.780, indicating 78%, and could be explained by all exogenous variables, including physical security culture, facial recognition technology integration, physical security threats, external factors, and four control variables including work experience, education, position, and knowledge.

5. Discussion on Findings

The study’s main goal revolves around determining whether there is a relationship between physical security culture and the performance of physical security, the efficiency of facial recognition technology and its integration with the physical security system, physical security threats and the performance of physical security, external factors and the performance of physical security, and FRT integration and physical security performance. Therefore, the discussion section aims to answer all these relationships and demonstrate how the study’s findings contribute to the existing knowledge of the problem under investigation.

5.1. The Relationship between Physical Security Culture and the Performance of Physical Security in the Company

Several studies have pointed to the significance of organizational culture for strengthening organizational resilience to physical security threats, as it not only directly affects organizational security policies but also influences employees’ behavior in many domains that are relevant to physical security [5,24,158,159,160,161]. Results of the multicollinearity analysis indicate that the physical security culture has a low VIF value (3.077) which is significantly lower than the cut-off value of 10. Results of hypothesis testing indicate that the effect of physical security culture on the performance of physical security is positive and significant (β = 0.163, p < 0.001). Since the p-value is lower than 0.001, illustrating that a relationship between the variables is statistically significant, and lower than the beta-value of 0.163, the results suggest that a one-unit increase in the physical security culture is likely to induce a one-point increase in reported physical security performance. An effective organizational culture strengthens a firm’s resilience toward external threats, including physical security ones, and simplifies the implementation of effective instruments for the protection of key assets and resources [162].
Based on the study’s results, it seems justified to conclude that a physical security culture turned out to be an important driver of physical security performance at the company. Moreover, the information analyzed in the literature review provides a compelling reason to believe this culture plays a major role in ensuring a high level of physical security in oil and gas facilities [24,60,163]. In particular, one might presume that the physical security culture could reduce uncertainties related to a security system [164]. At the same time, many studies imply that a significant relationship could exist between these variables [24,60,163,164,165,166,167,168]. Another valid assumption is that the facility’s physical security culture helps integrate personnel, information, administrative, technological, and physical security domains, as suggested by [168], thus increasing the overall level of protection.

5.2. The Relationship between Facial Recognition Technology Efficiency and Its Integration with the Company’s Physical Security System

There is a consensus among scholars that facial recognition technology is an example of a biometric technology that could be highly effective in upgrading physical security systems and protecting organizations’ critical assets from physical security threats [103,109]. The literature offers many insights into the efficiency of facial recognition technology. For instance, ref. [169] argue that applications utilizing facial recognition technology could be highly effective for detecting intruders in high-risk areas, thus protecting critical organizational assets from physical security threats. Moreover, ref. [170] insist on implementing biometric technologies into the physical security systems of oil and gas facilities to prevent human errors, which often magnify the security risks these organizations face. Considering the multitude of findings on the efficiency of facial recognition technology, it is not surprising that participants of the research view facial recognition technology as a valuable security solution that can address pressing security threats that the company under study faces.
Statistical tests show a positive and significant relationship between the reported efficiency of facial recognition technology and its integration into the existing physical security system. The p-value for the relationship is less than 0.001, which is below the significance level of 0.05. Furthermore, the beta coefficient for the regression is 0.540. In other words, a one-unit increase in the reported efficiency of facial recognition technology results in a corresponding increase in the ease of integrating FRT into the physical security system by 0.540. A relationship between the reported efficiency of facial recognition technology and its integration with the existing physical security system could be approached from both the technological and human perspectives of physical security culture. For example, many studies have mentioned the importance of improving the education of security officers to increase their competence and qualifications, thus preparing them for the application of modern security measures, such as facial recognition technology [76,158,171]. At the same time, it could be inferred from the findings of this study that officers’ perceptions of the efficiency of new security measures, such as facial recognition technology, could also be instrumental in facilitating their integration into the organization’s physical security system.

5.3. The Relationship between the Perceived Physical Security Threats and the Performance of Physical Security in the Company

The notion of facial recognition technology integration with the current company’s physical security system is based on the assumption and evidence that several physical security gaps exist due to legacy technology currently in use despite inefficiency in detecting and deterring some physical security threats. As a result, the researcher anticipates that the introduction of facial recognition technology will improve the company’s assets from pressing physical security threats, thereby increasing the facility’s overall performance of physical security. Physical security systems are usually created in light of organizations’ existing and potential risks [164]. Moreover, many physical security controls are specifically adjusted to respond to physical security threats that other measures cannot effectively address [167,172]. As such, it is not surprising that there is a statistically significant relationship between the variables.
Both the variables have high Cronbach’s alphas (0.911 and 0.846 for physical security threats and physical security performance, respectively). Therefore, removing any of them is unnecessary before running statistical tests. Results of the regression analysis show that there is a positive and statistically significant relationship between the reported significance of physical security threats and the reported performance of physical security at the company. The p-value for this regression is 0.006, which is higher than the p-values for most other regressions. Furthermore, the beta coefficient for the relationship between these variables is 0.120. In other words, a one-point increase in the reported significance of physical security threats results in a slight increase in physical security performance. Therefore, it is sensible to argue that the promotion of physical security culture requires a thorough understanding of physical security threats and their implications.
For example, the OCTAVE Allegro framework introduced by [173] explicitly addresses 40 security risks facing smart homes in order to deploy customized solutions to prevent each security risk. Additionally, the dataset [102] used in their study consisted of 373 security-related incidents from industrial facilities in the oil and gas sector, where a range of complementary synergistic tools was applied to the structured analysis. Furthermore, in the study by [166], which is dedicated to the methods and techniques for improving the physical security of critical infrastructures, the proposed two-phase security approach took into account 27 parameters related to the significance of various threats, such as the failure rate of certain controls, the number of attackers, the number of security officers on certain points, and many others.

5.4. The Relationship between the External Factors and the Performance of Physical Security in the Company

The academic literature has given insightful knowledge on the plethora of external factors that influence the performance of an organization’s physical security. The literature review’s findings illustrate that external factors are relevant for the evaluation of the protection of organizations’ assets from physical security threats. Unfortunately, none of the studies analyzed in the literature review section, except for the one by [62], directly describes the impact of various external factors on physical security performance. At the same time, the need to consider external factors when designing and implementing physical security strategies has been articulated by many scholars, including [109,163,174,175], and many others.
Results of the multicollinearity analysis indicate the VIF value of 1.98 for external factors. Therefore, measurements of the model’s variability and reliability showed that the researcher could examine a relationship between the variables. It could be inferred from the study’s results that the reported significance of external factors from the physical security perspective plays a significant role in shaping the company’s physical security performance. The p-value for the relationship between the variables is below 0.001, while the beta coefficient is 0.254. A one-point increase in the reported significance of external factors, therefore, results in a slight increase in the level of physical security performance at the company.
External factors often do not directly influence the performance of various physical security controls and the significance of physical security threats, but they create a context in which a relationship occurs between them and physical security controls. For instance, political factors are a primary reason behind the growing attention of relevant stakeholders towards physical security at oil and gas facilities and other objects of critical infrastructure in the Gulf region owing to the importance of the petroleum industry for the progressive development of Gulf Cooperation Council (GCC) countries [92,176]. Therefore, external factors could potentially increase the significance of specific physical security threats, draw the attention of stakeholders toward particular risks, and contribute to the development of new physical security controls.

5.5. The Relationship between Facial Recognition Technology Integration and Physical Security Performance in the Company

Refs. [103,109,119] and many other scientists state that applications based on facial recognition technology are highly effective in preventing physical security threats by introducing a new layer of protection that is not characterized by the inherent flaws of other controls. Furthermore, unlike most other measures, facial recognition technology can be used for various purposes and settings, allowing security officers to process attendants quickly and identify intruders [30,109,119]. Furthermore, ref. [97] recommends that organizations replace their old security techniques with technology based on facial recognition because these instruments have superior performance in access control, especially in mitigating unauthorized access. Therefore, this technology’s potential to improve the physical security performance of the company is evident.
The results of the model’s measurement and the validity and reliability analyses indicate that the relationship between these two variables can be examined using relevant statistical tests. The relationship between these variables was positive and statistically significant (β = 0.241; p-value < 0.001). In other words, a one-point increase in the integration of facial recognition technology leads to a corresponding increase in physical security performance by one point. In this situation, integrating FRT into the physical security system of the company should be considered a chance to reshape the entire physical security framework in a way that redefines the role of various measures and allows the organization to increase the physical security performance significantly. As a first step toward achieving this goal, the company’s management must integrate FRT seamlessly with existing physical security controls, which might prove challenging. Ref. [177] have stated that the achievement of this goal requires a clear definition of “zones of responsibility” for each physical security control and the rules for using them, while [178,179] insist on the need to design holistic physical security frameworks that consist of different protection layers. Therefore, if the company manages to create such a holistic multi-level system, it is likely to leverage the impressive capabilities of FRT to improve its physical security performance.

6. Limitations and Future Research

The first and most significant limitation is that this study relied upon perception data. Given the sensitivity of the topic under investigation, obtaining data on specific physical security threats that impact the organization was impossible. Therefore, the primary source of data was the employees working in the company. As a result, the respondents may have provided general information about physical security without clarifying the company’s particular threats. This inability to compare the study’s results to a true comparison of current threats impacting the organization makes for a significant limitation on the implications of this research as the data only focused on the employees’ perceptions. Nevertheless, it is common for researchers to use perception data to evaluate physical security performance [180,181]. In future studies, researchers may attempt to obtain specific threats to the selected research institution to understand better the impacts of different physical security threats.
The second limitation was that the researcher did not have extensive knowledge of the current physical security threats that impacted the selected company. Furthermore, given the study’s sensitivity, the company was not ready to share critical information about recent vulnerabilities. Therefore, a limited number of physical security threats that are common to oil and gas industries in the MENA region were selected from the literature review. However, it is crucial to consider all the possible physical security threats that face the organization under study if researchers wish to generalize the results to encompass the global oil and gas industry. For example, the dataset [102] used in their study consisted of 373 security-related incidents from industrial facilities in the oil and gas sector, where a range of complementary synergistic tools was applied to the structured analysis. Therefore, the lack of vast knowledge of current physical security threats facing most organizations limited the generalizability of the study to the MENA region.
Finally, data for the current study were collected during the global pandemic, COVID-19, when many employees were relegated to quarantine or to work remotely. Thus, it is reasonable to assume that the participants had fewer experiences and encounters with physical security threats at the organization than when most were on-site during “normal” conditions. In this regard, this is considered a limitation of the study. However, It is important to note that despite the potential impact of COVID-19 conditions on the survey, the results of this study remain unaffected. Future research could attempt to conduct the same study without COVID-19, which would provide helpful information about resilience towards various physical security threats. Although this study provided many positive aspects concerning the applicability of facial recognition in the oil and gas industry to enhance physical security resilience to threats, addressing the above limitations could provide more exciting results for future studies.

7. Conclusions

All five hypotheses have been confirmed in the current study. The study’s results reveal a positive and statistically significant relationship between the physical security culture and physical security performance, facial recognition technology efficiency and its integration within the physical security system, physical security threats and physical security performance, as well as external factors and physical security performance. Moreover, a positive and statistically significant relationship existed between facial recognition technology integration and physical security performance. Furthermore, the literature review confirmed the study’s findings regarding the problem under investigation.
The fact that the reported significance of both external factors and physical security threats was found to affect physical security performance could be explained by the positive influence of these variables on the organization’s readiness to protect its assets using modern physical security controls and the potential impact of employees’ knowledge on physical security performance. In addition, external factors also stimulate oil and gas facilities similar to the company investigated to adopt new technologies that could be highly effective in addressing security risks.
The study confirmed that FRT could be a valuable touchless technology that could be integrated into the existing physical security system of companies operating in the oil and gas industry. Furthermore, its successful integration into the physical security system can introduce a new layer of protection by addressing critical limitations of other security controls, such as CCTV surveillance, access control systems, and fingerprint technology. At the same time, it was found that the success of this integration strongly depends on several employee-related parameters. In particular, employees’ belief in the efficiency of facial recognition technology strongly affects its integration with other controls, which could be explained by the elimination of employees’ resistance to change and their willingness to embrace the new technology. As a result, security experts, practitioners, and scholars could further research the applicability of this technology to address more sophisticated threats in the oil and gas sector.
However, the technology’s efficiency also depends on the benchmark data used in training the algorithms, meaning the more effective a system is, the more data sets are needed, and this trend may significantly impose upon the employees’ privacy and daily routines [182]. Therefore, the company’s management should also strive to develop manageable and reasonable protocols that address privacy issues, and any protocol that does not meet this test should not be developed [80]. This requires the management to establish a privacy policy that explains that facial template information is collected for security purposes, how this information is currently being used, and what physical security procedures and regulations are in place to safeguard this data [183]. The process of facial recognition passes through the stages of capturing a face’s picture, reading the face’s geometry, comparing the facial signature to a database, and determining an individual [108]. All these processes might be completed quickly to facilitate the verification and authentication of individuals.
The present study provides much-needed empirical data for the enhancement of the effectiveness and reliability of integrated physical security systems to assuring adequate protection levels, which is the first contribution of the study. The awareness illuminated by the study contributes to the body of knowledge regarding the implementation of novel security technologies, such as facial recognition technology, in the oil and gas industries, specifically for the Middle East and North Africa region. This is notable given the increased adoption of modern touchless security technologies following the Covid-19 pandemic, limiting physical interaction and queuing or gathering. While the existing literature offers some insights into facial recognition technology [85,184,185], these insights are general and hardly consider oil and gas companies’ specific challenges in the Middle East and North Africa region. Therefore, the current study’s results serve as a foundation for future research into the concept of facial recognition technology integration in the oil and gas industries.
The second contribution is related to the practical implantation of FRT. While many organizations in other sectors, such as airports and law enforcement agencies, have tapped into the benefits of this novel technology, many oil and gas facilities in Abu Dhabi have not implemented advanced security technologies, such as facial recognition, in their physical security systems. A company’s decision to implement protective measures is determined by whether it believes the solution is practical, has a positive attitude toward the protection, and considers itself responsible for its security [186]. However, since physical security threats and vulnerabilities are different in each industry setting, organizations should take considerable time to understand any significant physical security threats prevailing in such an industry at that particular time to integrate security technology that addresses these vulnerabilities effectively. According to [165], a physical security culture could be instrumental in mapping physical security elements toward creating a holistic physical security system capable of responding effectively to physical security threats. As a result, security specialists, scholars, policymakers, regulatory specialists, and corporate managers may use this study to support the development of further research into facial recognition technology integration in the oil and gas industries rather than in airport settings, which has the prospect of widening the knowledge of the technology’s applicability.

Author Contributions

Conceptualization, S.H.A.Z.; Data curation, S.H.A.Z.; Formal analysis, S.H.A.Z.; Investigation, S.H.A.Z.; Methodology, S.H.A.Z.; Supervision, R.Z.; Writing—original draft, S.H.A.Z.; Writing—review & editing, R.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Ethical review and approval were waived for this study due to sensitivity of the topic under investigation.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The study did not report any data.

Acknowledgments

We thank Universiti Teknikal Malaysia Melaka (UTeM) for facilitating this study and continuous support.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wilson, G. The Nigerian state and oil theft in the Niger Delta region of Nigeria. J. Sustain. Dev. Afr. 2014, 16, 69–81. [Google Scholar]
  2. Barnes, W.; Goydan, P.; Berns, M. Protecting Oil Infrastructure in an Era of New and Emerging Threats; BCG Global. 2019. Available online: https://www.bcg.com/publications/2019/protecting-oil-infrastructure-in-era-of-new-and-emerging-threats (accessed on 28 May 2021).
  3. Jacobs, G.; Suojanen, I.; Horton, K.E.; Bayerl, P.S. (Eds.) International Security Management; Springer International Publishing: Cham, Switzerland, 2021. [Google Scholar]
  4. Čakija, D.; Ban, Ž.; Golub, M.; Čakija, D. Optimizing physical protection system using domain experienced exploration method. Automatika 2020, 61, 207–218. [Google Scholar] [CrossRef]
  5. Cordner, L. Offshore Oil and Gas Safety and Security in the Asia Pacific: The Need for Regional Approaches to Managing Risks; S. Rajaratnam School of International Studies: Singapore, 2013; Available online: https://www.rsis.edu.sg/wp-content/uploads/2014/07/Monograph2613.pdf (accessed on 26 July 2021).
  6. Hutter, D. Physical Security and Why It Is Important; SANS Institute Reading Room: Rockville, MD, USA, 2016. [Google Scholar]
  7. Yasseri, S. A Systems Engineering Approach to Physical Security of Oil & Gas Installations. Int. J. Coast. Offshore Eng. 2019, 3, 17–31. [Google Scholar] [CrossRef]
  8. Willett, K.D. Aligning Security to General Systems Theory. In Handbook of Security Science; Masys, A.J., Ed.; Springer International Publishing: Cham, Switzerland, 2022; pp. 527–551. [Google Scholar] [CrossRef]
  9. Alelyani, S.; Kumar, G.R.H. Overview of Cyberattack on Saudi Organizations. J. Inf. Secur. Cybercrimes Res. 2018, 1, 32–39. [Google Scholar] [CrossRef] [Green Version]
  10. Turk, J.V.; Scanlan, L.H. (Eds.) The Evolution of Public Relations: Case Studies from Countries in Transition, 2nd ed.; Institute for Public Relations: Gainesville, FL, USA, 2004. [Google Scholar]
  11. Al-Fedaghi, S.; Alsumait, O. Towards a conceptual foundation for physical security: Case study of an IT department. Int. J. Saf. Secur. Eng. 2019, 9, 137–156. [Google Scholar] [CrossRef]
  12. Kingsley-Hefty, J. (Ed.) Chapter 1—Physical Security Concepts. In Physical Security Guidelines; Elsevier: Boston, MA, USA, 2013; pp. 1–25. [Google Scholar] [CrossRef]
  13. Lee, S.Z. A Basic Principle of Physical Security and Its Link to Cybersecurity. Int. J. Cyber Criminol. 2020, 14, 203–219. [Google Scholar] [CrossRef]
  14. Walton, H. Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation, 1st ed.; Routledge: London, UK, 2016. [Google Scholar] [CrossRef]
  15. Norman, T.L. Chapter 6—Electronics Elements: A Detailed Discussion. Originally from Integrated Security Systems Design. Thomas Norman: Butterworth-Heinemann, 2015. In Effective Physical Security, 5th ed.; Fennelly, L.J., Ed.; Butterworth-Heinemann: Burlington, NY, USA, 2017; pp. 95–137. [Google Scholar] [CrossRef]
  16. Interagency Security Committee. Best Practices for Planning and Managing Physical Security Resources: An Interagency Security Committee Guide. CISA. 2015. Available online: https://www.cisa.gov/sites/default/files/publications/isc-planning-managing-physical-security-resources-dec-2015-508.pdf (accessed on 12 September 2021).
  17. Rouse, M. Physical Security. Search Security. 2016. Available online: https://searchsecurity.techtarget.com/definition/physical-security (accessed on 26 September 2021).
  18. Jore, S.H. The Conceptual and Scientific Demarcation of Security in Contrast to Safety. Eur. J. Secur. Res. 2019, 4, 157–174. [Google Scholar] [CrossRef]
  19. Li, J.; Goerlandt, F.; Nunen, K.; Reniers, G. Identifying common grounds for safety and security research: A comparative scientometric analysis focusing on development patterns, similarities, and differences. J. Integr. Secur. Saf. Sci. 2021, 1, 5–33. [Google Scholar] [CrossRef]
  20. Sas, M.; Hardyns, W.; van Nunen, K.; Reniers, G.; Ponnet, K. Measuring the security culture in organizations: A systematic overview of existing tools. Secur. J. 2020, 34, 340–357. [Google Scholar] [CrossRef] [Green Version]
  21. Campbell, G. The Manager’s Handbook for Business Security, 2nd ed.; Elsevier: Amsterdam, The Netherlands, 2014. [Google Scholar]
  22. Landucci, G.; Khakzad, N.; Reniers, G. 5—Security Culture and Security Management models. In Physical Security in the Process Industry; Landucci, G., Khakzad, N., Reniers, G., Eds.; Elsevier: Amsterdam, The Netherlands, 2020; pp. 125–160. [Google Scholar] [CrossRef]
  23. Van Nunen, K.; Sas, M.; Reniers, G.; Vierendeels, G.; Ponnet, K.; Hardyns, W. An integrative conceptual framework for physical security culture in organisations. J. Integr. Secur. Sci. 2018, 2, 25–32. [Google Scholar] [CrossRef]
  24. Al Mazrouei, M.; Khalid, K.; Davidson, R.; Abdallah, S. Impact of Organizational Culture and Perceived Process Safety in the UAE Oil and Gas Industry. Qual. Rep. 2019, 24, 3215–3238. [Google Scholar] [CrossRef]
  25. Rahman, F. Fire Breaks Out at Adnoc Refinery; Gulf News: 2017. Available online: https://gulfnews.com/business/energy/fire-breaks-out-at-adnoc-refinery-1.1960552 (accessed on 26 September 2021).
  26. Tan, W.H.; Abas, H. Systematic Literature Review Crime Prevention through Environmental Design (CPTED) in Physical Security for IT Organization. Open Int. J. Inform. 2022, 10, 68–83. [Google Scholar]
  27. Baggett, R.K.; Stout, A.L. Critical Infrastructure Risk Analysis and Management. In Handbook of Security Science; Masys, A.J., Ed.; Springer International Publishing: Cham, Switzerland, 2022; pp. 3–22. [Google Scholar] [CrossRef]
  28. Coole, M.; Evans, D.; Brooks, D. A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System. In Proceedings of the 2022 IEEE International Carnahan Conference on Security Technology (ICCST), Valeč, Czech Republic, 7–9 September 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–6. [Google Scholar] [CrossRef]
  29. Vuletic, A.; Ivkovic, N.; Kalinie, P. Business Information Security as a Part of Corporate Security. In Proceedings of the 79th International Scientific Conference on Economic and Social Development, Rabat, Morocco, 25–26 March 2022; pp. 35–40. [Google Scholar]
  30. Alhussain, T.; Drew, S. Towards User Acceptance of Biometric Technology in E-Government: A Survey Study in the Kingdom of Saudi Arabia. In IFIP Advances in Information and Communication Technology; Springer: Berlin/Heidelberg, Germany, 2009; Volume 305. [Google Scholar] [CrossRef] [Green Version]
  31. Yang, W.; Wang, S.; Hu, J.; Zheng, G.; Valli, C. Security and Accuracy of Fingerprint-Based Biometrics: A Review. Symmetry 2019, 11, 141. [Google Scholar] [CrossRef] [Green Version]
  32. Lambrechts, D.; Blomquist, L.B. Political–security risk in the oil and gas industry: The impact of terrorism on risk management and mitigation. J. Risk Res. 2017, 20, 1320–1337. [Google Scholar] [CrossRef]
  33. Borck, J.R. Advice for a secure enterprise: Implement the basics and see that everyone uses them. InfoWorld 2000, 22, 90. [Google Scholar]
  34. Carpenter, P.; Roer, K. The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer, 1st ed.; John Wiley & Sons Inc: Hoboken, NJ, USA, 2022. [Google Scholar]
  35. Sullivant, J. 4—The Evolving Threat Environment. In Building a Corporate Culture of Security; Sullivant, J., Ed.; Butterworth-Heinemann: Boston, MA, USA, 2016; pp. 33–50. [Google Scholar] [CrossRef]
  36. Khaleej Times. UAE: 3 Killed, 6 Wounded in Abu Dhabi Fuel Tankers Explosion after Suspected Drone Attack. Khaleej Times. 2022. Available online: https://www.khaleejtimes.com/emergencies/uae-3-killed-6-wounded-in-abu-dhabi-fuel-tankers-explosion (accessed on 16 April 2022).
  37. Naar, I.; Reynolds, R. Abu Dhabi Confirms Explosion of Petrol Tankers in Mussaffah and Minor Fire at Airport. Gulf News: 2022. Available online: https://www.thenationalnews.com/uae/2022/01/17/abu-dhabi-confirms-explosion-of-petrol-tankers-in-musaffah-and-minor-fire-at-airport/ (accessed on 27 March 2022).
  38. Yuan, S.; Yang, M.; Reniers, G.; Chen, C. An approach for identification of integrated safety and security barriers in the chemical process industries. Chem. Eng. Trans. 2022, 90, 571–576. [Google Scholar] [CrossRef]
  39. Kaili, K.A.; Pathirage, C.; Amaratunga, D. Vulnerability of the Emirati Energy Sector for Disaster: A Critical Review. Procedia Econ. Financ. 2014, 18, 701–709. [Google Scholar] [CrossRef] [Green Version]
  40. Kashmar, N.; Adda, M.; Atieh, M. From Access Control Models to Access Control Metamodels: A Survey. In Advances in Information and Communication; Arai, K., Bhatia, R., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 892–911. [Google Scholar]
  41. McCrie, R.D. 10—Operating Physical- and Technology-Centered Programs. In Security Operations Management, 2nd ed.; McCrie, R.D., Ed.; Butterworth-Heinemann: Burlington, NY, USA, 2007; pp. 285–318. [Google Scholar] [CrossRef]
  42. Purpura, P.P. Chapter 8—Internal Threats and Countermeasures. Security and Loss Prevention 6e. Boston, Butterworth-Heinemann. 2013. In Effective Physical Security, 5th ed.; Fennelly, L.J., Ed.; Butterworth-Heinemann: Burlington, NY, USA, 2017; pp. 181–218. [Google Scholar] [CrossRef]
  43. Sulaiman, F.; Ramayah, T.; Omar, A. ICT Security Policy in a Higher Education Institution in Malaysia. In Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements; Adomi, E.E., Ed.; IGI Global: Hershey, PA, USA, 2011; pp. 354–372. [Google Scholar] [CrossRef]
  44. Vacca, J.R. Computer and Information Security Handbook; Morgan Kaufmann: Burlington, MA, USA, 2009. [Google Scholar]
  45. Biscom Enterprise Data Protection. Biscom: The World Leading Fax & Secure File Transfer Provider. 2021. Available online: https://www.biscom.com/employee-departure-creates-gaping-security-hole-says-new-data/ (accessed on 11 September 2021).
  46. Sikdar, S.; Mishra, L. Policy Papers Smuggled Out of Oil Ministry, 5 Held; The Hindu: Chennai, Tamil Nadu, India, 2016; Available online: https://www.thehindu.com/news/national/two-petroleum-ministry-employees-arrested-for-leaking-information/article6913161.ece?__cf_chl_captcha_tk__=yMyBkK3U8Ncg06plWhiVFZsanFm0P_tRdDrx1dHAkNE-1639484366-0-gaNycGzNCL0 (accessed on 26 September 2021).
  47. Dulaney, J. “Better Wipe Your Phone”: Man Pleads Guilty to Stealing Trade Secrets from OKC Oil and Gas Employer; The Oklahoman. 2021. Available online: https://www.oklahoman.com/story/news/2021/06/04/man-pleads-guilty-stealing-trade-sectrets-okc-oil-gas-company/7525181002/ (accessed on 20 February 2022).
  48. Fischer, R.J.; Halibozek, E.P.; Walters, D.C. 9—The Outer Defenses: Building and Perimeter Protection. In Introduction to Security, 10th ed.; Fischer, R.J., Halibozek, E.P., Walters, D.C., Eds.; Butterworth-Heinemann: Burlington, NY, USA, 2019; pp. 199–221. [Google Scholar] [CrossRef]
  49. Philpott, D. Public School Emergency Preparedness, 2nd ed.; Bernan Press: Lanham, MD, USA, 2019. [Google Scholar]
  50. Crossman, J.; Perera, S. Time Theft: An Integrity Based Approach to Its Management. In Integrity in Business and Management; Orlitzky, M., Monga, M., Eds.; Routledge: New York, NY, USA, 2017; pp. 40–66. [Google Scholar]
  51. Robert Half Technology. Wasted Workday: Employees Lose over Two Weeks Each Year Due to IT-Related Issues; PRNewswire: New York, NY, USA, 2016; Available online: https://www.prnewswire.com/news-releases/wasted-workday-employees-lose-over-two-weeks-each-year-due-to-it-related-issues-300239058.html (accessed on 26 September 2021).
  52. Bell, R. Employee Time Theft: How to Uncover and Prevent It. WorkForce. 2021. Available online: https://workforce.com/news/time-theft (accessed on 19 February 2022).
  53. Kingsley-Hefty, J. Physical Security Strategy and Process Playbook, 1st ed.; Elsevier Science: Amsterdam, The Netherlands, 2013. [Google Scholar]
  54. Aurigemma, S.; Mattson, T. Generally Speaking, Context Matters: Making the Case for a Change from Universal to Particular ISP Research. J. Assoc. Inf. Syst. 2019, 20, 1700–1742. [Google Scholar] [CrossRef]
  55. Guyer, J.P. An Introduction to Petroleum Fuel Facilities: General Design Information, 2nd ed.; The Clubhouse Press: Boston, MA, USA, 2018. [Google Scholar]
  56. Akati, J.; Conrad, M. Anti-Tailgating Solution Using Biometric Authentication, Motion Sensors and Image Recognition. In Proceedings of the 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), AB, Canada, 25–28 October 2021; pp. 825–830. [Google Scholar] [CrossRef]
  57. Gitman, L.J.; McDaniel, C.; Shah, A.J.; Reece, M.; Koffel, L.; Talsma, B.; Hyatt, J.C. Introduction to Business; OpenStax. 2018. Available online: https://openstax.org/books/introduction-business/pages/1-introduction (accessed on 26 July 2021).
  58. Clark, R.E.; Estes, F. Turning Research into Results: A Guide to Selecting the Right Performance Solutions; Information Age Pub Inc.: Charlotte, NC, USA, 2008. [Google Scholar]
  59. Lewis, N.; Campbell, M.J.; Baskin, C.R. Information security for compliance with select agent regulations. Health Secur. 2015, 13, 207–218. [Google Scholar] [CrossRef]
  60. Ali, M.; Kasim, R.; Adaji, A.A. Sustainability of Supply Chain Management Factors for the UAE Oil & Gas Industry. Psychol. Educ. J. 2020, 57, 5533–5540. [Google Scholar] [CrossRef]
  61. Heller, M. NSA Breach Leads to Theft of Government Spy Software. Data Security & Privacy; SearchSecurity: Newton, MA, USA, 2017. [Google Scholar]
  62. Mark, J.; Nwaiwu, J. Impact of Political Environment on Business Performance of Multinational Companies in Nigeria. Afr. Res. Rev. 2015, 9, 1. [Google Scholar] [CrossRef] [Green Version]
  63. Sammut-Bonnici, T.; Galea, D. PEST Analysis. In Wiley Encyclopedia of Management; John Wiley & Sons: Hoboken, NJ, USA, 2015. [Google Scholar] [CrossRef]
  64. Raleigh, C.; Linke, A.; O’Loughlin, J. Extreme temperatures and violence. Nat. Clim. Chang. 2014, 4, 76–77. [Google Scholar] [CrossRef]
  65. Magyar, G.; Knapp, G.; Wojtkowski, G.; Zupancic, J. Advances in Information Systems Development: New Methods and Practice for the Networked Society Volume 1; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2007; Volume 1. [Google Scholar]
  66. Fields, Z.; van Niekerk, B.; Patrick, H. Security-Information Flow in the South African Public Sector. J. Inf. Warf. 2016, 15, 68–85. [Google Scholar]
  67. The German Office of the Federal President. Economic Development and Security—Speech by Federal President Horst Köhler on the occasion of the 41st Munich Conference on Security Policy “Economic Development and Security”; The German Federal President: Munich, Germany, 2005; Available online: https://www.bundespraesident.de/SharedDocs/Reden/EN/HorstKoehler/Reden/2005/02/20050211_Rede.html (accessed on 26 September 2021).
  68. Govender, S.; Kritzinger, E.; Loock, M. The influence of national culture on information security culture. In Proceedings of the 2016 IST-Africa Week Conference, Durban, South Africa, 11–13 May 2016; pp. 1–9. [Google Scholar]
  69. Volders, B.; Sauer, T. Nuclear Terrorism: Countering the Threat, 1st ed.; Routledge: London, UK, 2016. [Google Scholar]
  70. Murphie, A.; Potts, J. Chapter 2—Art and Technology. In Culture and Technology; Palgrave Macmillan: London, UK, 2003; p. 62. [Google Scholar]
  71. Jerković, A.; Siedschlag, A. Ethical, Legal, and Social Issues (ELSI). In Handbook of Security Science; Masys, A.J., Ed.; Springer International Publishing: Cham, Switzerland, 2022; pp. 225–242. [Google Scholar] [CrossRef]
  72. Buhalis, D.; Harwood, T.; Bogicevic, V.; Viglia, G.; Beldona, S.; Hofacker, C. Technological disruptions in services: Lessons from tourism and hospitality. J. Serv. Manag. 2019, 30, 484–506. [Google Scholar] [CrossRef]
  73. Knight, R. Convincing Skeptical Employees to Adopt New Technology. Harvard Business Review: 2015. Available online: https://hbr.org/2015/03/convincing-skeptical-employees-to-adopt-new-technology (accessed on 28 May 2021).
  74. Minnaar, A. Border Security: An Essential but Effective Tool in Combatting Cross-Border Crime. In The Handbook of Security; Gill, M., Ed.; Springer International Publishing: Cham, Switzerland, 2022; pp. 357–378. [Google Scholar] [CrossRef]
  75. Prochazkova, D.; Bartosova, H. Science on Safety and Security Is Interdisciplinary and Multidisciplinary Discipline. In Trends and Future Directions in Security and Emergency Management; Tušer, I., Hošková-Mayerová, Š., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 3–28. [Google Scholar] [CrossRef]
  76. Coole, M.; Brooks, D.; Treagust, D. The Physical Security Professional: Formulating a Novel Body of Knowledge. J. Appl. Secur. Res. 2015, 10, 385–410. [Google Scholar] [CrossRef]
  77. Breidenbach, S. How Secure Are You? In InformationWeek; Informa Tech: London, UK, 2000; pp. 71–78. [Google Scholar]
  78. Velasquez, S.M. Implementation of an Obsolescence Management Framework to Improve Physical Security System Performance. In ProQuest Dissertations and Theses (2185756361). ProQuest Dissertations & Theses Global; New Jersey City University: Ann Arbor, MA, USA, 2017; Available online: https://libproxy.utem.edu.my/login?url=https://www.proquest.com/dissertations-theses/implementation-obsolescence-management-framework/docview/2185756361/se-2?accountid=34984 (accessed on 10 August 2021).
  79. Martins, A.; Elofe, J. Information Security Culture. In Security in the Information Society: Visions and Perspectives; Ghonaimy, M.A., El-Hadidi, M.T., Aslan, H.K., Eds.; Springer: Boston, MA, USA, 2002; pp. 203–214. [Google Scholar] [CrossRef]
  80. Sullivant, J. 13—A User-Friendly Protocol Development Model. In Building a Corporate Culture of Security; Sullivant, J., Ed.; Butterworth-Heinemann: Burlington, NY, USA, 2016; pp. 180–189. [Google Scholar] [CrossRef]
  81. Kovacich, G.L.; Halibozek, E.P. Security Metrics Management: How to Manage the Costs of an Assets Protection Program, 1st ed.; Butterworth-Heinemann: Burlington, NY, USA, 2005. [Google Scholar]
  82. DiMase, D.; Collier, Z.A.; Heffner, K.; Linkov, I. Systems engineering framework for cyber physical security and resilience. Environ. Syst. Decis. 2015, 35, 291–300. [Google Scholar] [CrossRef]
  83. Dotsenko, S.; Illiashenko, O.; Kamenskyi, S.; Kharchenko, V. Integrated Security Management System for Enterprises in Industry 4.0. Inf. Secur. Int. J. 2019, 43, 294–304. [Google Scholar] [CrossRef] [Green Version]
  84. Nilsson, N.J. The Quest for Artificial Intelligence: A History of Ideas and Achievements, 1st ed.; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  85. Wójcik, W.; Gromaszek, K.; Junisbekov, M. Face Recognition: Issues, Methods and Alternative Applications. In Face Recognition; Ramakrishnan, S., Ed.; IntechOpen: Rijeka, Croatia, 2016. [Google Scholar] [CrossRef] [Green Version]
  86. Future of Privacy Forum. Privacy Principles for Facial Recognition Technology. 2015. Available online: https://fpf.org/wp-content/uploads/2015/12/Dec9Working-Paper-FacialRecognitionPrivacyPrinciples-For-Web.pdf (accessed on 22 October 2021).
  87. Martinez, B.; Valstar, M.F. Advances, Challenges, and Opportunities in Automatic Facial Expression Recognition. In Advances in Face Detection and Facial Image Analysis; Kawulok, M., Celebi, M.E., Smolka, B., Eds.; Springer International Publishing: Cham, Switzerland, 2016; pp. 63–100. [Google Scholar] [CrossRef]
  88. NEC Corporation. NEC Technology Recognizes People Based on Partial Images; NEC Corporation: Tokyo, Japan, 2019; Available online: https://www.nec.com/en/press/201902/global_20190208_01.html (accessed on 15 July 2021).
  89. Shepard, S. Biometric Technology Market to Grow to $59.31 Billion by 2025. Security Today. 2019. Available online: https://securitytoday.com/articles/2019/04/22/biometric-technology-market-to-grow-to-59.31-billion-by-2025.aspx (accessed on 26 September 2021).
  90. Norman, T. 2—Integrated Security System Design Benefits and Philosophy. In Integrated Security Systems Design, 2nd ed.; Norman, T., Ed.; Butterworth-Heinemann: Boston, MA, USA, 2014; pp. 11–17. [Google Scholar] [CrossRef]
  91. Al Ramahi, N. Cameras with Facial Recognition Software Will Identify Wrongdoers in Dubai; The National: New York, NY, USA, 2018; Available online: https://www.thenationalnews.com/uae/cameras-with-facial-recognition-software-will-identify-wrongdoers-in-dubai-1.699321 (accessed on 15 May 2022).
  92. Al-Raisi, A.N.; Al-Khouri, A.M. Iris recognition and the challenge of homeland and border control security in UAE. Telemat. Inform. 2008, 25, 117–132. [Google Scholar] [CrossRef]
  93. Ali, A. Watch: Ajman Police Deploy Drones for Security and Traffic Missions. Gulf News: 2022. Available online: https://gulfnews.com/uae/crime/watch-ajman-police-deploy-drones-for-security-and-traffic-missions-1.91411432 (accessed on 22 October 2022).
  94. George, J. Patrol Cars Will Now Scan Your Face. 2015. Available online: https://www.emirates247.com/news/emirates/patrol-cars-will-now-scan-your-face-2015-11-01-1.608819 (accessed on 15 July 2021).
  95. Al Shouk, A. How Dubai’s AI Cameras Helped Arrest 319 Suspects Last Year. Gulf News. 2019. Available online: https://gulfnews.com/uae/how-dubais-ai-cameras-helped-arrest-319-suspects-last-year-1.62750675 (accessed on 5 April 2020).
  96. Kohli, S.A. Facial Recognition in UAE: How Will It Change Lives. Khaleej Times: 2021. Available online: https://www.khaleejtimes.com/tech/facial-recognition-in-uae-how-will-it-change-lives (accessed on 28 May 2021).
  97. Nasrallah, T. UAE to Use Facial Identification in Some Sectors: Cabinet Led by Sheikh Mohammed Decides. Gulf News: 2021. Available online: https://gulfnews.com/uae/government/uae-to-use-facial-identification-in-some-sectors-cabinet-led-by-sheikh-mohammed-decides-1.1613315910160 (accessed on 15 July 2021).
  98. Al Shouk, A. Watch: Facial Recognition at Dubai Metro Stations to Identify Wanted Criminals. Gulf News. 2020. Available online: https://gulfnews.com/uae/government/watch-facial-recognition-at-dubai-metro-stations-to-identify-wanted-criminals-1.75309516 (accessed on 22 July 2021).
  99. Tajali, F. Utilizing Data Analytics in the Field of Physical Security: An Exploratory Study. In ProQuest Dissertations and Theses (2532659806). ProQuest Dissertations & Theses Global; University of Southern California: Ann Arbor, MA, USA, 2021; Available online: https://libproxy.utem.edu.my/login?url=https://www.proquest.com/dissertations-theses/utilizing-data-analytics-field-physical-security/docview/2532659806/se-2?accountid=34984 (accessed on 16 February 2022).
  100. Abu Dhabi Urban Planning Council. Abu Dhabi Safety and Security Planning Manual; Abu Dhabi Urban Planning Council: Abu Dhabi, United Arab Emirates, 2014; Available online: https://jawdah.qcc.abudhabi.ae/en/Registration/QCCServices/Services/STD/ISGL/ISGL-LIST/DP-305.pdf (accessed on 2 October 2021).
  101. Bragdon, C. Transportation Security; Butterworth-Heinemann: Burlington, NY, USA, 2011. [Google Scholar]
  102. Iaiani, M.; Moreno, V.C.; Reniers, G.; Tugnoli, A.; Cozzani, V. Analysis of events involving the intentional release of hazardous substances from industrial facilities. Reliab. Eng. Syst. Saf. 2021, 212, 107593. [Google Scholar] [CrossRef]
  103. Jackson, L.A. Biometric technology: The future of identity assurance and authentication in the lodging industry. Int. J. Contemp. Hosp. Manag. 2009, 21, 892–905. [Google Scholar] [CrossRef]
  104. Kostka, G.; Steinacker, L.; Meckel, M. Between security and convenience: Facial recognition technology in the eyes of citizens in China, Germany, the United Kingdom, and the United States. Public Underst. Sci. 2021, 30, 671–690. [Google Scholar] [CrossRef] [PubMed]
  105. McClellan, E. Facial Recognition Technology: Balancing the Benefits and Concerns. J. Bus. Tech. L. 2020, 15, 363. [Google Scholar]
  106. Mishu, T.I.; Rahman, M.D.M. Vulnerabilities of Fingerprint Authentication Systems and Their Securities. Int. J. Comput. Sci. Inf. Secur. 2018, 16, 99. [Google Scholar]
  107. Lunter, J. Everyday biometrics: Can face replace fingerprint recognition? Biom. Technol. Today 2021, 2021, 7–10. [Google Scholar] [CrossRef]
  108. Ramakrishnan, S. Face Recognition—Semisupervised Classification, Subspace Projection and Evaluation Methods; InTech: London, UK, 2016. [Google Scholar] [CrossRef]
  109. Albattat, A.; Mat Som, A.P. Biometric Technologies in Emergency Management: The Case of Hotels. Int. J. Tour. Hosp. Rev. 2014, 1, 44–50. [Google Scholar] [CrossRef] [Green Version]
  110. Campbell, G. Chapter 2—Quantifying & Communicating on Enterprise Risk. In Measuring and Communicating Security’s Value; Campbell, G., Ed.; Elsevier: Amsterdam, The Netherlands, 2015; pp. 45–116. [Google Scholar] [CrossRef]
  111. Cavazos, J.G.; Phillips, P.J.; Castillo, C.D.; O’Toole, A.J. Accuracy Comparison Across Face Recognition Algorithms: Where Are We on Measuring Race Bias? IEEE Trans. Biom. Behav. Identity Sci. 2021, 3, 101–111. [Google Scholar] [CrossRef]
  112. Symanovich, S. What Is Facial Recognition? How Facial Recognition Works 2021. Available online: https://us.norton.com/internetsecurity-iot-how-facial-recognition-software-works.html (accessed on 16 February 2022).
  113. Wang, L.; Siddique, A.A. Facial recognition system using LBPH face recognizer for anti-theft and surveillance application based on drone technology. Meas. Control 2020, 53, 1070–1077. [Google Scholar] [CrossRef]
  114. Brock Baskin, M.; Martin, L.; Buckley, M. Time Theft in Organizations: The development of the Time Banditry Questionnaire. Int. J. Sel. Assess. 2013, 21, 309–321. [Google Scholar] [CrossRef]
  115. Ding, Z.; Wenxing, L.; Zhang, G.; Wang, H. Supervisor Narcissism and Time Theft: Investigating the Mediating Roles of Emotional Exhaustion and the Moderating Roles of Attachment Style. Front. Psychol. 2018, 9, 2215. [Google Scholar] [CrossRef]
  116. Harold, C.M.; Hu, B.; Koopman, J. Employee time theft: Conceptualization, measure development, and validation. Pers. Psychol. 2021, 75, 347–382. [Google Scholar] [CrossRef]
  117. Aware, M.; Labade, P.; Tambe, M.; Jagtap, A.; Beldar, C. Attendance Management System Using Face-Recognition. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2021, 7, 336–341. [Google Scholar] [CrossRef]
  118. Smitha; Hegde, P. Afshin Face Recognition Based Attendance Management System. Int. J. Eng. Res. 2020, 9, 1190–1192. [Google Scholar] [CrossRef]
  119. Nasiorowska, B. Improving Safety and Security in Platinum Mining by Utilizing the Newest Facial Recognition Technology. In The 4th International Platinum Conference, Platinum in transition “Boom or Bust”; The Southern African Institute of Mining and Metallurgy: Johannesburg, South Africa, 2010; Available online: https://www.platinum.org.za/Pt2010/Papers/129-136_Nasiorowska.pdf (accessed on 16 September 2021).
  120. Pollard, M. Even Mask-Wearers Can Be ID’d, China Facial Recognition Firm Says; Reuters: London, UK, 2020; Available online: https://www.reuters.com/article/us-health-coronavirus-facial-recognition-idUSKBN20W0WL (accessed on 10 May 2021).
  121. Precedence Research. Biometric Technology Market Size to Surpass USD 137.5 Bn by 2030; GlobeNewswire: Los Angeles, CA, USA, 2022; Available online: https://www.globenewswire.com/en/news-release/2022/09/16/2517716/0/en/Biometric-Technology-Market-Size-to-Surpass-USD-137-5-Bn-by-2030.html (accessed on 14 October 2022).
  122. Easterby-Smith, M.; Thorpe, R.; Lowe, A. Management Research: An Introduction, 2nd ed.; SAGE Publication Ltd.: Thousand Oaks, CA, USA, 2004. [Google Scholar]
  123. Saunders, M.N.K.; Lewis, P. Doing Research in Business & Management: An Essential Guide to Planning Your Project, 2nd ed.; Pearson: Harlow, UK; Louisville, KY, USA, 2018. [Google Scholar]
  124. Creswell, J.W. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 4th ed.; SAGE Publications: Thousand Oaks, CA, USA, 2014. [Google Scholar]
  125. Basias, N.; Pollalis, Y. Quantitative and qualitative research in business & technology: Justifying a suitable research methodology. Rev. Integr. Bus. Econ. Res. 2018, 7, 91–105. [Google Scholar]
  126. Crowther, D.; Lancaster, G. Research methods: A Concise Introduction to Research in Management and Business Consultancy, 2nd ed.; Butterworth-Heinemann: Burlington, NY, USA, 2009. [Google Scholar]
  127. Blackstone, A. Chapter 8—Survey Research: A Quantitative Technique. In Principles of Sociological Inquiry: Qualitative and Quantitative Methods; Saylor Foundation: Arlington, VA, USA, 2014; pp. 90–91. Available online: https://resources.saylor.org/wwwresources/archived/site/textbooks/Principles%20of%20Sociological%20Inquiry.pdf (accessed on 26 July 2021).
  128. Collis, J.; Hussey, R. Business Research, 3rd ed.; Palgrave Macmillan: London, UK, 2009. [Google Scholar]
  129. Sennewald, C.A.; Baillie, C. 21—The security survey. The author of this chapter is James Broder CFE, CPP, FACFE. In Effective Security Management, 7th ed.; Sennewald, C.A., Baillie, C., Eds.; Butterworth-Heinemann: Burlington, NY, USA, 2021; pp. 207–212. [Google Scholar] [CrossRef]
  130. Sullivan, G.; Artino, A. Analyzing and Interpreting Data from Likert-Type Scales. J. Grad. Med. Educ. 2013, 5, 541–542. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  131. Luck, D.J.; Rubin, R.S. Marketing Research, 7th ed.; Prentice-Hall International: Hoboken, NJ, USA, 1987. [Google Scholar]
  132. Anderson, R.E.; Babin, B.J.; Black, W.C.; Hair, J.E.; Tatham, R.L. Multivariate Data Analysis, 6th ed.; Prentice Hall: Hoboken, NJ, USA, 2006. [Google Scholar]
  133. Adams, J.; Khan, H.T.A.; Raeside, R.; White, D. Chapter 5: Sampling. In Research Methods for Graduate Business and Social Science Students; SAGE publications India: New Delhi, India, 2007; p. 87. [Google Scholar]
  134. Gorsuch, R.L. Factor Analysis, 2nd ed.; Lawrence Erlbaum Associates: Hillsdale, NJ, USA, 1983. [Google Scholar]
  135. Kline, R.B. Principles and Practice of Structural Equation Modeling; Methodology in the Social Sciences, 2nd ed.; Guilford Publications: New York, NY, USA, 2005. [Google Scholar]
  136. Amin, M.E. Social Science Research: Conception, Methodology and Analysis; Makerere University: Kampala, Uganda, 2005. [Google Scholar]
  137. Hair, J., Jr.; Anderson, R.E.; Black, W.C.; Babin, B.J. Multivariate Data Analysis, 7th ed.; Pearson Education Limited: Edinburgh, UK, 2010. [Google Scholar]
  138. Yin, R.K. Case Study Research: Design and Methods, 5th ed.; Sage Publication: Thousand Oaks, CA, USA, 2015. [Google Scholar]
  139. Sekaran, U.; Bougie, R.J. Research Methods for Business: A Skill Building Approach, 7th ed.; John Wiley & Sons: Hoboken, NJ, USA, 2016. [Google Scholar]
  140. Ringle, C.M.; Wende, S.; Becker, J.-M. Others SmartPLS 3. Boenningstedt; SmartPLS GmbH: Boenningstedt, Germany, 2015; Volume 584. [Google Scholar]
  141. Baruch, Y. Response rate in academic studies—A comparative analysis. Hum. Relat. 1999, 52, 421–438. [Google Scholar] [CrossRef]
  142. Suhr, D. Exploratory or Confirmatory Factor Analysis. In Proceedings of the 31st Annual SAS Users Group International Conference, San Francisco, CA, USA, 26–29 March 2006; SAS Institute Inc.: Cary, NC, USA, 2006. [Google Scholar]
  143. Field, A.P. Discovering Statistics Using SPSS, 3rd ed.; SAGE: Newcastle upon Tyne, UK, 2009. [Google Scholar]
  144. Saunders, M.; Lewis, P.; Thornhill, A. Research Methods for Business Students, 5th ed.; Financial Times Prentice Hall: New York, NY, USA, 2009. [Google Scholar]
  145. Hair, J.F., Jr.; Sarstedt, M.; Ringle, C.M.; Gudergan, S.P. Advanced Issues in Partial Least Squares Structural Equation Modeling; SAGE Publications, Inc.: Thousand Oaks, CA, USA, 2017. [Google Scholar]
  146. Nunnally, J.C.; Bernstein, I.H. The Assessment of Reliability. In Psychometric Theory, 3rd ed.; McGraw-Hill, Inc.: New York, NY, USA, 1994; pp. 248–292. [Google Scholar]
  147. Hair, J.F., Jr.; Matthews, L.M.; Matthews, R.L.; Sarstedt, M. PLS-SEM or CB-SEM: Updated guidelines on which method to use. Int. J. Multivar. Data Anal. 2017, 1, 107–123. [Google Scholar] [CrossRef]
  148. Krabbe, P.F.M. Chapter 7—Validity. In The Measurement of Health and Health Status; Krabbe, P.F.M., Ed.; Academic Press: San Diego, CA, USA, 2017; pp. 113–134. [Google Scholar] [CrossRef]
  149. Fornell, C.; Larcker, D.F. Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
  150. Gefen, D.; Straub, D.; Boudreau, M.-C. Structural Equation Modeling and Regression: Guidelines for Research Practice. Commun. Assoc. Inf. Syst. 2000, 4, 1–77. [Google Scholar] [CrossRef] [Green Version]
  151. Hair, J., Jr.; Sarstedt, M.; Hopkins, L.G.; Kuppelwieser, V. Partial least squares structural equation modeling (PLS-SEM). Eur. Bus. Rev. 2014, 26, 106–121. [Google Scholar] [CrossRef]
  152. Henseler, J.; Ringle, C.M.; Sarstedt, M. A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. Acad. Mark. Sci. 2015, 43, 115–135. [Google Scholar] [CrossRef]
  153. Chin, W.W. The Partial Least Squares Approach for Structural Equation Modeling. In Modern Methods for Business Research; Methodology for Business and Management; Lawrence Erlbaum Associates Publishers: Mahwah, NJ, USA, 1998; pp. 295–336. [Google Scholar]
  154. Götz, O.; Liehr-Gobbers, K.; Krafft, M. Evaluation of Structural Equation Models Using the Partial Least Squares (PLS) Approach. In Handbook of Partial Least Squares: Concepts, Methods and Applications; Esposito Vinzi, V., Chin, W.W., Henseler, J., Wang, H., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 691–711. [Google Scholar] [CrossRef]
  155. Sullivan, G.; Feinn, R. Using Effect Size—Or Why the p Value Is Not Enough. J. Grad. Med. Educ. 2012, 4, 279–282. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  156. Falk, R.; Miller, N. A Primer for Soft Modeling. The University of Akron Press: Akron, OH, USA, 1992. [Google Scholar]
  157. Cohen, J.D. Noncentral chi-square: Some observations on recurrence. Am. Stat. 1988, 42, 120–122. [Google Scholar]
  158. Brooks, D.J. What is security: Definition through knowledge categorization. Secur. J. 2010, 23, 225–239. [Google Scholar] [CrossRef]
  159. Button, M. Security Officers and Policing: Powers, Culture and Control in the Governance of Private Space; Taylor and Francis: Abingdon, UK, 2016. [Google Scholar]
  160. Goldstein, P. Why Physical Security Should Be as Important as Cybersecurity. In Technology Solutions That Drive Business; Biztech: Vernon Hills, IL, USA, 2016; Available online: https://biztechmagazine.com/article/2016/10/why-physical-security-should-be-important-cybersecurity (accessed on 21 September 2021).
  161. Habib, S.; Aslam, S.; Hussain, A.; Yasmeen, S.; Ibrahim, M. The Impact of Organizational Culture on Job Satisfaction, Employess Commitment and Turn over Intention. Adv. Econ. Bus. 2014, 2, 215–222. [Google Scholar] [CrossRef]
  162. Prayag, G.; Spector, S.; Orchiston, C.; Chowdhury, M. Psychological resilience, organizational resilience and life satisfaction in tourism firms: Insights from the Canterbury earthquakes. Curr. Issues Tour. 2019, 23, 1216–1233. [Google Scholar] [CrossRef]
  163. Alqahtani, F.H. Developing an Information Security Policy: A Case Study Approach. Procedia Comput. Sci. 2017, 124, 691–697. [Google Scholar] [CrossRef]
  164. Lichte, D.; Wolf, K.-D. A Study on the Influence of Uncertainties in Physical SECURITY Risk Analysis; CRC Press: Trondheim, Norway, 2018; pp. 1387–1394. [Google Scholar] [CrossRef]
  165. Alach, Z.J. Mapping the Elements of Physical Security Towards the Creation of a Holistic Physical Security Model; Edith Cowan University. 2007. Available online: https://ro.ecu.edu.au/theses/1 (accessed on 9 September 2021).
  166. Drago, A. Methods and Techniques for Enhancing Physical Security of Critical Infrastructures; University of Naples “Federico II”: Naples, Italy, 2015. [Google Scholar] [CrossRef]
  167. Titu, A.M.; Pop, A.; Ceocea, C. Risk Assessment of Physical Security within a Technologized Knowledge Based Organization. MATEC Web Conf. 2019, 299, 04005. [Google Scholar] [CrossRef] [Green Version]
  168. Virtanen, T. The Security Model to Combine the Corporate and Information Security. In Trusted Information; Dupuy, M., Paradinas, P., Eds.; Springer: Boston, MA, USA, 2001; Volume 65, pp. 305–316. [Google Scholar]
  169. Owayjan, M.; Dergham, A.; Haber, G.; Fakih, N.; Hamoush, A.; Abdo, E. Face Recognition Security System. In New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering; Elleithy, K., Sobh, T., Eds.; Springer International Publishing: Cham, Switzerland, 2015; pp. 343–348. [Google Scholar]
  170. Alkhaldi, M.; Pathirage, C.; Kulatunga, U. The Role of Human Error in Accidents within Oil and Gas Industry in Bahrain. In Proceedings of the 13th International Postgraduate Research Conference (IPGRC), Salford, UK, 14–15 September 2017; pp. 822–834. Available online: http://usir.salford.ac.uk/id/eprint/43983/ (accessed on 12 November 2021).
  171. Fennelly, L.J. Effective Physical Security, 5th ed.; Elsevier Science and Technology Books, Inc.: Amsterdam, The Netherlands, 2017. [Google Scholar]
  172. Timbs, N.H. Physical Security Assessment of a Regional University Computer Network. In Electronic Theses and Dissertations; East Tennessee State University: Johnson City, TN, USA, 2013; Available online: https://dc.etsu.edu/etd/2280 (accessed on 10 August 2021).
  173. Ali, B.; Awad, A.I. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors 2018, 18, 817. [Google Scholar] [CrossRef]
  174. Horne, C.; Ahmad, A.; Maynard, S. Information Security Strategy in Organisations: Review, Discussion and Future Research Directions. arXiv 2015, arXiv:1606.03528. [Google Scholar]
  175. Yaacoub, J.-P.A.; Salman, O.; Noura, H.N.; Kaaniche, N.; Chehab, A.; Malli, M. Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsyst. 2020, 77, 103201. [Google Scholar] [CrossRef]
  176. Al Shamsi, O.O.; Gunson, C.D. Security Passes for ADNOC Facilities. 2012. Available online: https://www.lexology.com/library/detail.aspx?g=591b3d2e-d656-4c3d-acab-aff1f783307c (accessed on 3 June 2021).
  177. Oluwafemi, J.A.; Princess, A. Simulation of an Authorization System Using Access Cards with Chips and Fingerprint. Int. J. Res. Inf. Technol. 2014, 2, 601–610. [Google Scholar]
  178. Graves, G.H. Analytical Foundations of Physical Security System Assessment. In Doctoral Dissertation; Texas A & M University: Brazos County, TX, USA, 2006; Available online: https://hdl.handle.net/1969.1/4166 (accessed on 12 September 2021).
  179. Moses, S.; Rowe, D. Physical Security and Cybersecurity: Reducing Risk by Enhancing Physical Security Posture through Multi-Factor Authentication and other Techniques. Int. J. Inf. Secur. Res. 2016, 6, 667–676. [Google Scholar] [CrossRef]
  180. Johnson, V.L.; Woolridge, R.W.; Wang, W.; Bell, J.R. The impact of perceived privacy, accuracy and security on the adoption of mobile self-checkout systems. J. Innov. Econ. Manag. 2020, 31, 221–247. [Google Scholar] [CrossRef]
  181. Sunny, P.; George, A. Determinants of Behavioral Intention to Use Mobile Wallets—A Conceptual Model. J. Manag. 2018, 5, 52–62. [Google Scholar]
  182. Raji, I.D.; Gebru, T.; Mitchell, M.; Buolamwini, J.; Lee, J.; Denton, E. Saving Face: Investigating the Ethical Concerns of Facial Recognition Auditing. In Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society, New York, NY, USA, 7–9 February 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 145–151. [Google Scholar] [CrossRef] [Green Version]
  183. Smith, M.; Miller, S. The ethical application of biometric facial recognition technology. AI Soc. 2021, 37, 167–175. [Google Scholar] [CrossRef] [PubMed]
  184. Hassaballah, M.; Aly, S. Face recognition: Challenges, achievements and future directions. IET Comput. Vis. 2015, 9, 614–626. [Google Scholar] [CrossRef]
  185. Kashwani, G.A. Enhancing the Implementation of Safety Engineering Systems in Oil and Gas Construction Projects in the UAE. Ph.D. Thesis, Heriot-Watt University, Edinburgh, UK, 2017. Available online: https://www.ros.hw.ac.uk/bitstream/handle/10399/3251/KashwaniGA_0917_egis.pdf?sequence=1 (accessed on 11 September 2021).
  186. Jansen, J.; Veenstra, S.; Zuurveen, R.; Stol, W. Guarding against online threats: Why entrepreneurs take protective measures. Behav. Inf. Technol. 2016, 35, 368–379. [Google Scholar] [CrossRef]
Figure 2. The measurement model.
Figure 2. The measurement model.
Sustainability 14 14915 g002
Table 1. Response rate.
Table 1. Response rate.
QuestionnaireNumberPercentage
Distributed40089%
Received38095%
Usable37197.6%
Unusable92.4%
Table 2. Frequency distribution of demographic characteristics.
Table 2. Frequency distribution of demographic characteristics.
VariableLevelFrequencyPercent
GenderFemale225.9
Male34994.1
Age18–24 years4913.2
25–34 years8021.6
35–44 years12333.2
45–54 years9024.3
Above 55 years297.8
Work experienceLess than 1 year3810.2
2–3 years11029.6
4–5 years11230.2
6–7 years9926.7
More than 8 years123.2
EducationHigh School5815.6
Some College9525.6
Bachelor’s Degree14138
Master’s Degree6116.4
Ph.D.164.3
PositionAssistant5013.5
Ordinary Staff Position9726.1
Management11029.6
Middle Management9024.3
Executive Management246.5
KnowledgeNot familiar at all5013.5
Slightly Familiar10027
Moderately Familiar12734.2
Very Familiar6918.6
Extremely Familiar256.7
DrivingNever7821
Rarely7620.5
Sometimes10929.4
Often7319.7
Very Often359.4
Table 3. The result of convergent validity.
Table 3. The result of convergent validity.
ConstructItemOuter LoadingCronbach’s AlphaComposite ReliabilityAVE
EFEF10.7960.8810.9100.628
EF20.756
EF30.796
EF40.818
EF50.822
EF60.764
FRTEFRTE10.8570.9280.9460.777
FRTE20.922
FRTE30.883
FRTE40.878
FRTE50.866
FRTIFRTI10.8900.8940.9340.825
FRTI20.928
FRTI30.906
PSCPSC10.8070.9310.9420.645
PSC20.827
PSC30.823
PSC40.832
PSC50.827
PSC60.744
PSC70.789
PSC80.785
PSC90.791
PSPPSP10.8650.8460.9070.764
PSP20.871
PSP30.886
PSTPST10.8180.9110.9340.738
PST20.850
PST30.896
PST40.867
PST50.861
PSC: physical security culture, PSP: performance of physical security, FRTE: facial recognition technology efficiency, PST: physical security threats, EF: external factors, FRTI: facial recognition technology integration.
Table 4. Correlation of latent variables and discriminant validity (Fornell–Larcker).
Table 4. Correlation of latent variables and discriminant validity (Fornell–Larcker).
EFFRTEFRTIPSCPSPPST
EF0.792
FRTE0.5170.881
FRTI0.6110.540.908
PSC0.650.580.6760.803
PSP0.7280.5720.7450.7580.874
PST0.5790.5450.5940.7270.6910.859
Bolded numbers are the square root of AVE, PSC: physical security culture, PSP: performance of physical security, FRTE: facial recognition technology efficiency, PST: physical security threats, EF: external factors, FRTI: facial recognition technology integration.
Table 5. Correlation of latent constructs and discriminant validity (HTMT method).
Table 5. Correlation of latent constructs and discriminant validity (HTMT method).
EFFRTEFRTIPSCPSP
EF
FRTE0.565
FRTI0.6850.59
PSC0.7140.6220.74
PSP0.840.6420.8560.852
PST0.6430.590.6570.7880.786
PSC: physical security culture, PSP: performance of physical security, FRTE: facial recognition technology efficiency, PST: physical security threats, EF: external factors, FRTI: facial recognition technology integration.
Table 6. Loading and cross-loading of constructs for discriminant validity assessment.
Table 6. Loading and cross-loading of constructs for discriminant validity assessment.
EFFRTEFRTIPSCPSPPST
EF10.7960.3150.4410.4860.5260.407
EF20.7560.3590.4380.4260.550.414
EF30.7960.3760.4760.4950.5750.429
EF40.8180.4270.4670.5030.5610.451
EF50.8220.4720.5370.550.6420.509
EF60.7640.4920.5330.6160.5920.528
FRTE10.4010.8570.4090.4710.4450.424
FRTE20.4620.9220.4710.5320.5160.51
FRTE30.5060.8830.4980.540.5340.513
FRTE40.4530.8780.4790.4920.4970.463
FRTE50.4490.8660.510.5130.5160.482
FRTI10.5440.4820.890.5660.6540.514
FRTI20.5650.4930.9280.6290.6970.539
FRTI30.5540.4970.9060.6460.6770.564
PSC10.5180.4620.5380.8070.5810.559
PSC20.5010.4970.5410.8270.5920.59
PSC30.5220.4380.5110.8230.6080.546
PSC40.4980.4770.5680.8320.6220.604
PSC50.5820.4540.5610.8270.6570.642
PSC60.5350.4590.5720.7440.6150.596
PSC70.5240.4730.5280.7890.5810.561
PSC80.4980.4610.5180.7850.5970.556
PSC90.5130.4710.5470.7910.6180.589
PSP10.6450.4690.6290.6250.8650.597
PSP20.6180.530.660.6930.8710.625
PSP30.6460.4980.6630.6670.8860.589
PST10.5010.4550.5010.6280.5890.818
PST20.5080.4870.5470.6240.620.85
PST30.4830.4650.5050.6440.5830.896
PST40.50.4710.5110.5980.5910.867
PST50.4930.4580.4810.6260.580.861
Bolded numbers are significant loading for each indicator. PSC: physical security culture, PSP: performance of physical security, FRTE: facial recognition technology efficiency, PST: physical security threats, EF: external factors, FRTI: facial recognition technology integration.
Table 7. List of hypotheses and relative paths for a path model.
Table 7. List of hypotheses and relative paths for a path model.
PathΒSET Valuep Values
PSC -> PSP0.1630.0453.662<0.001
FRTI -> PSP0.2410.0396.139<0.001
PST -> PSP0.1200.0432.7620.006
EF -> PSP0.2540.0357.323<0.001
FRTE -> FRTI0.5400.03814.081<0.001
Position -> PSP0.1550.0324.832<0.001
Work Experience -> PSP0.0390.0271.4450.149
Education -> PSP0.1060.0343.090.002
Knowledge -> PSP0.1230.0264.721<0.001
PSC: physical security culture, PSP: performance of physical security, FRTE: facial recognition technology efficiency, PST: physical security threats, EF: external factors, FRTI: facial recognition technology integration.
Table 8. Results of coefficient of determination (R2).
Table 8. Results of coefficient of determination (R2).
Endogenous Latent VariableR2Adj R2
FRTI0.2920.29
PSP0.7850.78
PSP: performance of physical security, FRTI: facial recognition technology integration.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Al Zaabi, S.H.; Zamri, R. Managing Security Threats through Touchless Security Technologies: An Overview of the Integration of Facial Recognition Technology in the UAE Oil and Gas Industry. Sustainability 2022, 14, 14915. https://doi.org/10.3390/su142214915

AMA Style

Al Zaabi SH, Zamri R. Managing Security Threats through Touchless Security Technologies: An Overview of the Integration of Facial Recognition Technology in the UAE Oil and Gas Industry. Sustainability. 2022; 14(22):14915. https://doi.org/10.3390/su142214915

Chicago/Turabian Style

Al Zaabi, Saeed Hasan, and Ruzaidi Zamri. 2022. "Managing Security Threats through Touchless Security Technologies: An Overview of the Integration of Facial Recognition Technology in the UAE Oil and Gas Industry" Sustainability 14, no. 22: 14915. https://doi.org/10.3390/su142214915

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop