E-government security : information security management model for public administration in Kenya William Odongo Oyieyo

By: Contributor(s): Publication details: Nairobi, kenya Strathmore University 2010Description: xi, 75pSubject(s): LOC classification:
  • JF1525.A8O95 2010
Contents:
Table of Contents
Summary: Information security in c-government in public administration in Kenya has not been adequately addressed. In order to develop an Information Security Management Model for Public Administration in Kenya, a questionnaire was used to gather data on egovernment security, access control mechanisms used, presence of ICT policies, customers served, age and Internet use from 77 Public Administration employees from 24 Kenya Government ministries and agencies taking training programmes at Kenya Institute of Administration in August, 2009. The widely accepted ISACA’s Business Model for Information Security and ISO/IEC I 7799 Information Security Management Standard Model were used to derive the research theoretical framework. Cronhach internal consistency test on c-government services security construct of eight independent variables produced an alpha of 0.71 9. Logistic regression was used to test the null hypotheses. IThe preliminary findings indicate that c-government services arc not secure. In government agencies where there is ICT/computer use policies, the Public administration employees were in strong agreement that the c-government services were secure at x(8 N = 77) = 18.249, p = 0.019, Cl s. and in government agencies where the citizens are considered as important customers. the public administration employees are also in strong agreement that the c-government services are secure at N = 77) = 1 8.082, p = 0.021, Cl95. The study also found a significant relationship between age above 40 of the Public Administration employees and secure c-government services at N 77) 17.249, p 0.026, Cl95. The research did not find a significant relationship between the access control mechanisms and secure c-government services at x2(8, N = 77)= 12.812, p 0.118, Cl95. This study suggests that a combination of age of Public Administration employees and presence of computer/ICT use policy can be used to enhance information security in Public Administration in Kenya. This study recommends further research on the contents and comprehensiveness of the ICT/Computer use policies currently existing within the Public Administration in Kenya.
Reviews from LibraryThing.com: List(s) this item appears in: STRATHMORE THESES & DISSERTATIONS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Thesis Thesis Bindery Special Collection Special Collection JF1525.A8O95 2010 In transit from Strathmore University (Main Library) to Bindery since 06/11/2013 Not for loan 87960
Thesis Thesis Strathmore University (Main Library) Open Shelf TH JF1525.A8O95 2010 Not for loan 75687
Total holds: 0

Partial fulfillment for award of the degree of Master of Science in Information technology

Table of Contents

Introduction
Literature Review
Research Methodology
Presentation of Research Findings

Information security in c-government in public administration in Kenya has not been adequately addressed. In order to develop an Information Security Management Model for Public Administration in Kenya, a questionnaire was used to gather data on egovernment security, access control mechanisms used, presence of ICT policies, customers served, age and Internet use from 77 Public Administration employees from 24 Kenya Government ministries and agencies taking training programmes at Kenya Institute of Administration in August, 2009. The widely accepted ISACA’s Business Model for Information Security and ISO/IEC I 7799 Information Security Management Standard Model were used to derive the research theoretical framework. Cronhach internal consistency test on c-government services security construct of eight independent variables produced an alpha of 0.71 9. Logistic regression was used to test the null hypotheses.
IThe preliminary findings indicate that c-government services arc not secure. In government agencies where there is ICT/computer use policies, the Public administration employees were in strong agreement that the c-government services were secure at x(8 N = 77) = 18.249, p = 0.019, Cl s. and in government agencies where the citizens are considered as important customers. the public administration employees are also in strong agreement that the c-government services are secure at N = 77) = 1 8.082, p = 0.021, Cl95. The study also found a significant relationship between age above 40 of the Public Administration employees and secure c-government services at N 77)
17.249, p 0.026, Cl95. The research did not find a significant relationship between the access control mechanisms and secure c-government services at x2(8, N = 77)= 12.812, p
0.118, Cl95.
This study suggests that a combination of age of Public Administration employees and presence of computer/ICT use policy can be used to enhance information security in Public Administration in Kenya. This study recommends further research on the contents and comprehensiveness of the ICT/Computer use policies currently existing within the Public Administration in Kenya.

There are no comments on this title.

to post a comment.

© Strathmore University Library Madaraka Estate Ole, Sangale Road P. O. Box 59857 00200 City Square Nairobi Kenya
Tel.: (+254) (0)703 034000/(0)703 034200/(0)703 034300 Fax.: (+254) (0)20-607498