scispace - formally typeset
Open AccessJournal ArticleDOI

A sustainable information security framework for e-Government – case of Tanzania

TLDR
A case study of an e-Government interaction between a ministry and a government agency and the information security challenges identified in the implementation is presented.
Abstract
The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at improving efficiency in government and providing better services to citizens. Information security is identified as one of the requirements for the successful e-Government implementation although the government has not adopted any standards or issued guidelines to government agencies with regards to information security. Comprehensive addressing of information security can be an expensive undertaking and without guidelines information security implementations may be more prone to failure. In a resource poor country such as Tanzania, there is a need for a cost effective and sustainable means of addressing information security in e-Government implementations. In this paper the authors present a case study of an e-Government interaction between a ministry and a government agency and the information security challenges identified in the implementation. In order to address these challenges an information security fram...

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Future-oriented eGovernance : The sustainability concept in eGov research, and ways forward

TL;DR: EGov (eGovernment/eGovernance) is a complex endeavor involving many actors, ambitions, and perspectives and the field has, in research and in practice, over the years expanded its focus from service to service.
Journal ArticleDOI

Success factors influencing implementation of e-government at different stages of maturity: a literature review

TL;DR: In this article, the authors give an overview of the e-government literature and identify digitisation success factors at different stages of eGovernment maturity using Lee's synthesised eGovernment development model.
Dissertation

The role of internal stakeholders and influencing factors during the phases of e-government initiative implementation

TL;DR: AlRashidi et al. as discussed by the authors proposed a framework that can be used to enhance the implementation process of e-government initiative throughout the different phases of the implementation cycle, and contributes to the body of knowledge by extending the literature.
Journal ArticleDOI

Cyberterrorism and Cyber Attacks in the Public Sector: How Public Administration Copes with Digital Threats

TL;DR: This study investigates public employees’ attitudes toward cybersecurity in the public sector, as well as the arrangements and measures in place to protect sensitive governmental data and securely manage it for privacy and regulatory compliance.
Journal ArticleDOI

Inter-organisational information security: a systematic literature review

TL;DR: The findings suggest that future research should address a broader set of research topics, focusing especially on employees/non-staff and their use of processes and technology in inter-organisational settings, as well as on cultural aspects, which are lacking currently.
References
More filters

The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management

TL;DR: The Critical Success Factor (CSF) method as mentioned in this paper was originally developed by the Survivable Enterprise Management (SEM) team at the Software Engineering Institute to align information technology planning with the strategic direction of an organization.
Journal ArticleDOI

Securing e-Government and e-Voting with an open cloud computing architecture

TL;DR: This paper explores increasing participation and sophistication of electronic government services, through implementing a cloud computing architecture, and proposes a high level electronic governance and electronic voting solution, supported by cloud Computing architecture and cryptographic technologies.
Journal ArticleDOI

Towards the development of privacy-aware systems

TL;DR: The objective of this work is to provide a reference base for the development of methodologies tailored to design privacy-aware systems to be compliant with data protection regulations.

The Innovative Use of Mobile Applications in East Africa

TL;DR: The Sida Review report as discussed by the authors gives an overview of the current state of mobile phone use and services in East Africa and outlines major trends and main obstacles for increased use as well as key opportun...
Related Papers (5)