Skip to main content
Top

2018 | OriginalPaper | Chapter

The State of e-Government Security in South Africa: Analysing the National Information Security Policy

Authors : Bukelwa Ngoqo, Kennedy Njenga

Published in: e-Infrastructure and e-Services for Developing Countries

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As a result of the growing reliance by public sector organisations on technological resources for capturing and processing information, protection of information in the public sector has become an issue of national concern. While considering the South African national strategy for protecting this state asset (‘information’) this paper contrasts existing local, provincial or national e-Government information security policies against the adopted national guidelines. The paper postulates that with sound policies and guidelines in place ‘interpretation and application’ remain as two barriers that pose a threat to state information. The main question addressed in this paper is whether e-Government information security policies adequately address prescribed key security components. To achieve a comprehensive understanding of the pillars underpinning the protection of national information security in South Africa, the authors followed systematic procedures for reviewing and evaluating existing e-Government information security policies. The objective of this paper is to investigate whether existing government information security policies are aligned to national policy or guidelines. This paper will contribute empirical evidence which supports the notion observed by the South African Auditor General that (Auditor-General 2012) security weaknesses in government departments and state entities are attributed to the lack of formally designed and implemented information security policies and standards. The results of this preliminary investigation indicate that although information security policies exist in the majority of state entities, there is no consistency in the application of the ‘security controls’, as outlined in the national guidelines.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179–211 (1991)CrossRef Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179–211 (1991)CrossRef
2.
go back to reference Alotaibi, M., Furnell, S., Clarke, N.: Information security policies: a review of challenges and influencing factors. In: Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITS-2016), 5–7 December 2016, Barcelona, Spain (2016). ISBN 978-1-908320-73-5 Alotaibi, M., Furnell, S., Clarke, N.: Information security policies: a review of challenges and influencing factors. In: Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITS-2016), 5–7 December 2016, Barcelona, Spain (2016). ISBN 978-1-908320-73-5
4.
go back to reference Cloete, F.: E-government lessons from South Africa 2001–2011: institutions, state of progress and measurement. Afr. J. Inf. Commun. 12, 128–142 (2012) Cloete, F.: E-government lessons from South Africa 2001–2011: institutions, state of progress and measurement. Afr. J. Inf. Commun. 12, 128–142 (2012)
5.
go back to reference Crous, M.: Service delivery in the South African public service: implementation of the Batho Pele principles by statistics South Africa. J. Publ. Adm. 39(4.1) (2004) Crous, M.: Service delivery in the South African public service: implementation of the Batho Pele principles by statistics South Africa. J. Publ. Adm. 39(4.1) (2004)
6.
go back to reference Da Veiga, A.: Comparing the information security culture of employees who had read the information security policy and those who had not Illustrated through an empirical study. Inf. Comput. Secur. 24(2), 139–151 (2016)CrossRef Da Veiga, A.: Comparing the information security culture of employees who had read the information security policy and those who had not Illustrated through an empirical study. Inf. Comput. Secur. 24(2), 139–151 (2016)CrossRef
7.
go back to reference Etsebeth, V.: Information security policies - the legal risk of uninformed personnel. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5–7 July 2006, Sandton, South Africa (2006). ISBN 1-86854-636-5 Etsebeth, V.: Information security policies - the legal risk of uninformed personnel. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5–7 July 2006, Sandton, South Africa (2006). ISBN 1-86854-636-5
8.
go back to reference Hsieh, H., Shannon, S.E.: Three approaches to qualitative content analysis. Qual. Health Res. 15(9), 1277–1288 (2005)CrossRef Hsieh, H., Shannon, S.E.: Three approaches to qualitative content analysis. Qual. Health Res. 15(9), 1277–1288 (2005)CrossRef
9.
go back to reference Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. South Afr. Comput. J. (SACJ) 52, 29–41 (2014) Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. South Afr. Comput. J. (SACJ) 52, 29–41 (2014)
10.
go back to reference Maiwald, E.: Fundamentals of Network Security. McGraw-Hill Education, New York (2004) Maiwald, E.: Fundamentals of Network Security. McGraw-Hill Education, New York (2004)
11.
go back to reference Mbowe, J.E., Zlotnikova, I., Msanjila, S.S., Oreku, G.S.: A conceptual framework for threat assessment based on organization’s information security policy. J. Inf. Secur. 5, 166–177 (2014) Mbowe, J.E., Zlotnikova, I., Msanjila, S.S., Oreku, G.S.: A conceptual framework for threat assessment based on organization’s information security policy. J. Inf. Secur. 5, 166–177 (2014)
12.
go back to reference Mutula, S.M., Mostert, J.: Challenges and opportunities of E-Government in South Africa. Electron. Libr. 28(1), 38–53 (2010)CrossRef Mutula, S.M., Mostert, J.: Challenges and opportunities of E-Government in South Africa. Electron. Libr. 28(1), 38–53 (2010)CrossRef
13.
go back to reference Ngobeni, S.J., Grobler, M.M.: Information security policies for governmental organisations: the minimum criteria. In: Proceedings of ISSA, 6–8 July 2009, Johannesburg, South Africa, pp. 455–466 (2009) Ngobeni, S.J., Grobler, M.M.: Information security policies for governmental organisations: the minimum criteria. In: Proceedings of ISSA, 6–8 July 2009, Johannesburg, South Africa, pp. 455–466 (2009)
14.
go back to reference Njotini, M.N.: Protecting critical databases: towards risk based assessment of Critical Information Infrastructures (CIIS) in South Africa. Potchefstroomse Elektroniese Regsblad (PER) 16(1), 451–481 (2013) Njotini, M.N.: Protecting critical databases: towards risk based assessment of Critical Information Infrastructures (CIIS) in South Africa. Potchefstroomse Elektroniese Regsblad (PER) 16(1), 451–481 (2013)
15.
go back to reference Rosengren, K.E.: Advances in Content Analysis. Sage Publications, Beverly Hills (1981) Rosengren, K.E.: Advances in Content Analysis. Sage Publications, Beverly Hills (1981)
16.
go back to reference Shava, F.B., Van Greunen, D.: Designing user security metrics for security awareness at higher and tertiary institutions. In: Proceedings of the 8th International Development Informatics Association Conference, 3–4 November 2014, Port Elizabeth, South Africa, pp. 280–296 (2014) Shava, F.B., Van Greunen, D.: Designing user security metrics for security awareness at higher and tertiary institutions. In: Proceedings of the 8th International Development Informatics Association Conference, 3–4 November 2014, Port Elizabeth, South Africa, pp. 280–296 (2014)
17.
go back to reference South Africa. Department of Communications: National Integrated ICT Policy. Government Gazette, No. 37261, 24 January 2014 South Africa. Department of Communications: National Integrated ICT Policy. Government Gazette, No. 37261, 24 January 2014
18.
go back to reference South Africa. Department of Public Service and Administration: Draft position Paper on Information Security. Version 0.3 (2015) South Africa. Department of Public Service and Administration: Draft position Paper on Information Security. Version 0.3 (2015)
19.
go back to reference Tuyikeze, T., Pottas, D.: An information security policy development life cycle. In: Proceedings of the South African Information Security Multi-Conference (SAISMC), Port Elizabeth, South Africa, pp. 165–176, 17–18 May 2010. ISBN 978-1-84102-256-7 Tuyikeze, T., Pottas, D.: An information security policy development life cycle. In: Proceedings of the South African Information Security Multi-Conference (SAISMC), Port Elizabeth, South Africa, pp. 165–176, 17–18 May 2010. ISBN 978-1-84102-256-7
20.
go back to reference Whitman, M.E., Mattord, H.J.: Principles of Information Security. Course Technology, Boston (2003) Whitman, M.E., Mattord, H.J.: Principles of Information Security. Course Technology, Boston (2003)
22.
go back to reference Zhao, F., Scavarda, A.J., Waxin, M.: Key issues and challenges in e-Government development: an integrative case study of the number one eCity in the Arab world. Inf. Technol. People 25(4), 395–422 (2012)CrossRef Zhao, F., Scavarda, A.J., Waxin, M.: Key issues and challenges in e-Government development: an integrative case study of the number one eCity in the Arab world. Inf. Technol. People 25(4), 395–422 (2012)CrossRef
Metadata
Title
The State of e-Government Security in South Africa: Analysing the National Information Security Policy
Authors
Bukelwa Ngoqo
Kennedy Njenga
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-98827-6_3

Premium Partner