Read academic paper - state of information security in


State of information security in Zanzibar's public sector

Abstract: Information systems (IS) have become important tools in the developing countries, it is vital to provide measures to protect them as threats are much closer to developing countries than ever before. The purpose of this paper is to investigate the current state of information systems security management (ISSM) in Zanzibar's public sector. The investigation involves ten public organisations and six public websites in Zanzibar and is underpinned by a survey and field observations. The results show that organisations involve the citizen registration and finance has better security. Physical and environmental controls are somewhat better managed. However, improvement is needed concerning business continuity plans. Furthermore, the results show that relevant staff skills in ISSM are inadequate. Hence, Zanzibar's public sector needs to invest in information security management capacity building as well as to adopt whole information security management standards throughout the public sector.

ASSIGNMENT BRIEF

Please read the academic paper "State of Information Security in Zanzibar's public sector"

Hussein SHAABAN, Marc CONRAD, Tim FRENCH

IRAC, University of Bedfordshire, Park Square, Luton, Bedfordshire, United Kingdom

Q1 Provide an overview of the challenges faced in Zanzibar as well as in one other exemplar "developing country" as regards the evolution, and adoption of IT/Corporate Governance standards in the public sector.

Q2 To what extend can Corporate Governance operate as a reliable "proxy" for trust as regards E-Governance? You are expected to refer specifically to the details provided in the attached academic paper as well as other suitable sources.

Q3 What role might International E-Governance standards have to play in the future evolution of E-Governance both in developed and in developing countries? Refer to evolving standards in your answer as necessary.

Brief Notes of Guidance:

1. Carefully check your answer in terms of the dangers of plagiarism and also for spelling and grammatical errors. Give all Figures / Tables a number and label.

2. Use the Harvard system of referencing and provide a full and complete set of references at the end of your assignment.

3. To achieve more than a pass mark you need to offer critique as well as elaborate an argument that is evidentially based.

4. Carefully structure your answers using the word limits for guidance. Excessively lengthy submissions will be penalised as will short submissions that nominally address the questions above.

Attachment:- Case Study Assignment.rar

Solution Preview :

Prepared by a verified Expert
Risk Management: Read academic paper - state of information security in
Reference No:- TGS02445910

Now Priced at $60 (50% Discount)

Recommended (98%)

Rated (4.3/5)