Essay about Information Security In Zanziabar Public Sector

Essay about Information Security In Zanziabar Public Sector

Length: 1456 words (4.2 double-spaced pages)

Rating: Powerful Essays

Open Document

Essay Preview

The information security challenges faced in Zanzibar are persistent in transitional countries as could be seen in the case study “state of Information Security in Zanzibar’s public sector” (Shaaban, et al., 2012). Most of these challenges are partly attributed to lack of proper budgeting for ICT infrastructures, cultural gap awareness, political instability, trust, business continuity plan, and inadequate human resource management to effectively manage this technology (Dada, 2006).

The application of e-government in corporate governance to improve efficiency and effectiveness of the public sector agencies and delivery of services to the users has increased extensively, due to its result oriented in accountability, transparency and availability of governance to the citizen. The viability of e-governance is not assured without the element of information security. Hence, E-government security is a vital prerequisite in the adoption and the attainment of a standard corporate e-governance in the public sector to secure the inflow of data and information. (Alfawaz et al., 2008).

The adoption and sustainability of e-government security in developing countries has been faced with challenges, irrespective of existing information security models, blue print and existing benchmark as seen from the case study of information security management in Zanzibar’s public sector (Shaaban, et al., 2012). “The feasibility of having a successful e-government is directly depended on the government overall ability and readiness to spend on the necessary information technology and related costs “(SUBHAJIT BASU 2004).
The cost of infrastructures required to set up information technology in developing countries is greatly influence by donor coun...

... middle of paper ...

...', Reinventing Government in the Information Age: International Practice in IT-Enabled Public Sector Reform, 1 pp.49.
Heeks, R. (2002) 'e-government in Africa: Promise and practice', Information Polity, 7 (2), pp.97-114.
Jin-Fu, W. (2009) 'E-government security management: Key factors and countermeasures', Ieee Research Paper, .
Picanso, K.E. (2006) 'Protecting information security under a uniform data breach notification law', Fordham L.Rev., 75 pp.355.
Shaaban, H., Conrad, M. & French, T. ( 2012). State of information security in Zanzibar’s public sector. Zanzibar, IST-Africa.
Siponen, M.T. (2000) 'A conceptual foundation for organizational information security awareness', Information Management & Computer Security, 8 (1), pp.31-41.
Stanforth, C. & O'Flynn, M. (2008) 'The promotion of e-governance in developing countries: Reflections on e-government in two Asia

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Information Security : A Comprehensive Security Framework Essay

- Institutions of higher learning are increasingly using Information and Communication systems in administration, teaching, learning and research. This infrastructure needs to be available, secure and well protected. It therefore becomes crucial for information security practitioners in public universities to implement effective information security programs. Information security focuses on technological issues and important elements of an organization such as people, process, business strategies etc., which also mandates the need for information security....   [tags: Information security, Security, Computer security]

Powerful Essays
1097 words (3.1 pages)

Information Security in America and Sweden Essay example

- Introduction: Business today retains a variety of problems, a major one of these problems are breaches in information and consequently society has come up with Information security to help secure peoples privacy. In order to understand why we have information security, one has to first apprehend the value of information. Typical information stored by different businesses and individuals will consist of an assortment of hypersensitive information that revolves around their employees, financial status, earnings, plans for the future, personal information etc....   [tags: Information Security]

Powerful Essays
1469 words (4.2 pages)

The Practice Of Information Security Management Essay example

- The famous cryptographer Bruce Schneier once said that “[p]eople often represent the weakest link in the security chain and are chronically responsible for the failure of security systems” (Schneier, 2000). The practice of Information Security Management is employed by businesses through a variety of standards, best practices, and frameworks to combat this issue. Their adoption of best practices in the public domain allows businesses to strive for improvements through their own interpretation. These best practices are sourced from standards such as ISO/IEC 27000, proprietary knowledge and public frameworks such as COBIT, Six Sigma, or ITIL....   [tags: Information security, Security]

Powerful Essays
1160 words (3.3 pages)

The Problem Of Poor Information Security Essay

- The rapid development of automation processes and penetration of computers in all areas of life have led to a number of specific problems. One of these problems is the need to ensure effective protection of personal information. Different ways to access information, a large number of qualified professionals, the overwhelming use of special technologies in social production allows violators to conduct activities that pose a threat to information security almost any time and anywhere. A special role in this process was played by the emergence of the personal computer in our daily live, which made computers, software and other information technology accessible to the general public....   [tags: Information security, Computer security]

Powerful Essays
701 words (2 pages)

Information Security: Public Key Infrastructure Essay

- With the increase of digital communications and transactions, a stronger level of security is required to protect the user and their data transactions. Systems, servers, personal computers, mobile devices, tokens and smart cards are all being used ubiquitously to view protected communications. With the influx of data management, there is an ever-apparent contest between the two adversaries in the game of Information Security: the developers and the hackers. PKI was designed to leverage the Internet infrastructure for communications (CITE Samuelle 2009)....   [tags: Information Technology ]

Powerful Essays
2562 words (7.3 pages)

Information Security And Computer Security Essay

- Since the beginning of technology, the security levels have dramatically increased making the computers and information technology very secure places to store information. In the beginning computer security focused mainly on securing the computer and the physical system. But with everything becoming more and more mobile, security isn’t just about the physical system anymore…it’s also about securing the information that is constantly running between systems and being stored in clouds. This is information security....   [tags: Computer security, Information security, Security]

Powerful Essays
732 words (2.1 pages)

Essay about Information Security And Information Technology

- Information security refers to all of the approaches and policies designed to protect a corporation’s information and facts machine from unauthorized access, use, disclosure, disruption modification, or destruction. it 's a standard term that may be used regardless of the shape the data might also take. As for information protection, people typically divided it into two components, which are the IT safety and facts assurance. Sometimes referred as computer security, information technology security has been information security applied to technology, which most often some form of computer system....   [tags: Computer, Computer security, Information security]

Powerful Essays
983 words (2.8 pages)

Essay Human Centered Information Security Management

- Introduction As the African proverb denotes, “It takes a village to raise a child”, it will take that same communal effort in today’s society to keep that child safe in school and higher education facilities. This village must consist of parents, law enforcement, federal government, personnel, and the general public for protection. As preponderant challenges emerges in this wicked society related to public mass shootings, higher education institutions are placing more accentuation than ever upon risk mitigation....   [tags: Information security, Security, Computer security]

Powerful Essays
1483 words (4.2 pages)

Information Security Essay

- Why do we need management’s support for information security. Doesn’t IT own information security. The technical side is important, but management’s role cannot be overlooked. Thornton states that management has to drive information security. Why does management need to drive this policy. The management team is legally responsible for any breaches that occur. Plus, senior management has a fiduciary responsibility to the company’s assets. Our management can provide the necessary resources, including finances and personnel, needed to implement policy....   [tags: Information Security Essays]

Free Essays
2590 words (7.4 pages)

Essay Information Security

- Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad....   [tags: IT Security]

Powerful Essays
2693 words (7.7 pages)