The application of e-government in corporate governance to improve efficiency and effectiveness of the public sector agencies and delivery of services to the users has increased extensively, due to its result oriented in accountability, transparency and availability of governance to the citizen. The viability of e-governance is not assured without the element of information security. Hence, E-government security is a vital prerequisite in the adoption and the attainment of a standard corporate e-governance in the public sector to secure the inflow of data and information. (Alfawaz et al., 2008).
The adoption and sustainability of e-government security in developing countries has been faced with challenges, irrespective of existing information security models, blue print and existing benchmark as seen from the case study of information security management in Zanzibar’s public sector (Shaaban, et al., 2012). “The feasibility of having a successful e-government is directly depended on the government overall ability and readiness to spend on the necessary information technology and related costs “(SUBHAJIT BASU 2004).
The cost of infrastructures required to set up information technology in developing countries is greatly influence by donor coun...
... middle of paper ...
...', Reinventing Government in the Information Age: International Practice in IT-Enabled Public Sector Reform, 1 pp.49.
Heeks, R. (2002) 'e-government in Africa: Promise and practice', Information Polity, 7 (2), pp.97-114.
Jin-Fu, W. (2009) 'E-government security management: Key factors and countermeasures', Ieee Research Paper, .
Picanso, K.E. (2006) 'Protecting information security under a uniform data breach notification law', Fordham L.Rev., 75 pp.355.
Shaaban, H., Conrad, M. & French, T. ( 2012). State of information security in Zanzibar’s public sector. Zanzibar, IST-Africa.
Siponen, M.T. (2000) 'A conceptual foundation for organizational information security awareness', Information Management & Computer Security, 8 (1), pp.31-41.
Stanforth, C. & O'Flynn, M. (2008) 'The promotion of e-governance in developing countries: Reflections on e-government in two Asia
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Institutions of higher learning are increasingly using Information and Communication systems in administration, teaching, learning and research. This infrastructure needs to be available, secure and well protected. It therefore becomes crucial for information security practitioners in public universities to implement effective information security programs. Information security focuses on technological issues and important elements of an organization such as people, process, business strategies etc., which also mandates the need for information security.... [tags: Information security, Security, Computer security]
1097 words (3.1 pages)
- Introduction: Business today retains a variety of problems, a major one of these problems are breaches in information and consequently society has come up with Information security to help secure peoples privacy. In order to understand why we have information security, one has to first apprehend the value of information. Typical information stored by different businesses and individuals will consist of an assortment of hypersensitive information that revolves around their employees, financial status, earnings, plans for the future, personal information etc.... [tags: Information Security]
1469 words (4.2 pages)
- The famous cryptographer Bruce Schneier once said that “[p]eople often represent the weakest link in the security chain and are chronically responsible for the failure of security systems” (Schneier, 2000). The practice of Information Security Management is employed by businesses through a variety of standards, best practices, and frameworks to combat this issue. Their adoption of best practices in the public domain allows businesses to strive for improvements through their own interpretation. These best practices are sourced from standards such as ISO/IEC 27000, proprietary knowledge and public frameworks such as COBIT, Six Sigma, or ITIL.... [tags: Information security, Security]
1160 words (3.3 pages)
- The rapid development of automation processes and penetration of computers in all areas of life have led to a number of specific problems. One of these problems is the need to ensure effective protection of personal information. Different ways to access information, a large number of qualified professionals, the overwhelming use of special technologies in social production allows violators to conduct activities that pose a threat to information security almost any time and anywhere. A special role in this process was played by the emergence of the personal computer in our daily live, which made computers, software and other information technology accessible to the general public.... [tags: Information security, Computer security]
701 words (2 pages)
- With the increase of digital communications and transactions, a stronger level of security is required to protect the user and their data transactions. Systems, servers, personal computers, mobile devices, tokens and smart cards are all being used ubiquitously to view protected communications. With the influx of data management, there is an ever-apparent contest between the two adversaries in the game of Information Security: the developers and the hackers. PKI was designed to leverage the Internet infrastructure for communications (CITE Samuelle 2009).... [tags: Information Technology ]
2562 words (7.3 pages)
- Since the beginning of technology, the security levels have dramatically increased making the computers and information technology very secure places to store information. In the beginning computer security focused mainly on securing the computer and the physical system. But with everything becoming more and more mobile, security isn’t just about the physical system anymore…it’s also about securing the information that is constantly running between systems and being stored in clouds. This is information security.... [tags: Computer security, Information security, Security]
732 words (2.1 pages)
- Information security refers to all of the approaches and policies designed to protect a corporation’s information and facts machine from unauthorized access, use, disclosure, disruption modification, or destruction. it 's a standard term that may be used regardless of the shape the data might also take. As for information protection, people typically divided it into two components, which are the IT safety and facts assurance. Sometimes referred as computer security, information technology security has been information security applied to technology, which most often some form of computer system.... [tags: Computer, Computer security, Information security]
983 words (2.8 pages)
- Introduction As the African proverb denotes, “It takes a village to raise a child”, it will take that same communal effort in today’s society to keep that child safe in school and higher education facilities. This village must consist of parents, law enforcement, federal government, personnel, and the general public for protection. As preponderant challenges emerges in this wicked society related to public mass shootings, higher education institutions are placing more accentuation than ever upon risk mitigation.... [tags: Information security, Security, Computer security]
1483 words (4.2 pages)
- Why do we need management’s support for information security. Doesn’t IT own information security. The technical side is important, but management’s role cannot be overlooked. Thornton states that management has to drive information security. Why does management need to drive this policy. The management team is legally responsible for any breaches that occur. Plus, senior management has a fiduciary responsibility to the company’s assets. Our management can provide the necessary resources, including finances and personnel, needed to implement policy.... [tags: Information Security Essays]
2590 words (7.4 pages)
- Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad.... [tags: IT Security]
2693 words (7.7 pages)