Abstract
As a result of the growing reliance by public sector organisations on technological resources for capturing and processing information, protection of information in the public sector has become an issue of national concern. While considering the South African national strategy for protecting this state asset (‘information’) this paper contrasts existing local, provincial or national e-Government information security policies against the adopted national guidelines. The paper postulates that with sound policies and guidelines in place ‘interpretation and application’ remain as two barriers that pose a threat to state information. The main question addressed in this paper is whether e-Government information security policies adequately address prescribed key security components. To achieve a comprehensive understanding of the pillars underpinning the protection of national information security in South Africa, the authors followed systematic procedures for reviewing and evaluating existing e-Government information security policies. The objective of this paper is to investigate whether existing government information security policies are aligned to national policy or guidelines. This paper will contribute empirical evidence which supports the notion observed by the South African Auditor General that (Auditor-General 2012) security weaknesses in government departments and state entities are attributed to the lack of formally designed and implemented information security policies and standards. The results of this preliminary investigation indicate that although information security policies exist in the majority of state entities, there is no consistency in the application of the ‘security controls’, as outlined in the national guidelines.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179–211 (1991)
Alotaibi, M., Furnell, S., Clarke, N.: Information security policies: a review of challenges and influencing factors. In: Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITS-2016), 5–7 December 2016, Barcelona, Spain (2016). ISBN 978-1-908320-73-5
Auditor-General South Africa: The Drivers of Internal Control: Information Technology Management as a Driver of Audit Outcomes. Consolidated General report on the 2011–12 national and provincial audit outcomes (2012). https://www.agsa.co.za/Portals/0/MFMA2011-12Extracts/MFMA_2011-12_consolidated_reports/AGSA_MFMA_CONSOLIDATED_REPORT_2011_12.pdf. Accessed 12 July 2016
Cloete, F.: E-government lessons from South Africa 2001–2011: institutions, state of progress and measurement. Afr. J. Inf. Commun. 12, 128–142 (2012)
Crous, M.: Service delivery in the South African public service: implementation of the Batho Pele principles by statistics South Africa. J. Publ. Adm. 39(4.1) (2004)
Da Veiga, A.: Comparing the information security culture of employees who had read the information security policy and those who had not Illustrated through an empirical study. Inf. Comput. Secur. 24(2), 139–151 (2016)
Etsebeth, V.: Information security policies - the legal risk of uninformed personnel. In: Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5–7 July 2006, Sandton, South Africa (2006). ISBN 1-86854-636-5
Hsieh, H., Shannon, S.E.: Three approaches to qualitative content analysis. Qual. Health Res. 15(9), 1277–1288 (2005)
Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. South Afr. Comput. J. (SACJ) 52, 29–41 (2014)
Maiwald, E.: Fundamentals of Network Security. McGraw-Hill Education, New York (2004)
Mbowe, J.E., Zlotnikova, I., Msanjila, S.S., Oreku, G.S.: A conceptual framework for threat assessment based on organization’s information security policy. J. Inf. Secur. 5, 166–177 (2014)
Mutula, S.M., Mostert, J.: Challenges and opportunities of E-Government in South Africa. Electron. Libr. 28(1), 38–53 (2010)
Ngobeni, S.J., Grobler, M.M.: Information security policies for governmental organisations: the minimum criteria. In: Proceedings of ISSA, 6–8 July 2009, Johannesburg, South Africa, pp. 455–466 (2009)
Njotini, M.N.: Protecting critical databases: towards risk based assessment of Critical Information Infrastructures (CIIS) in South Africa. Potchefstroomse Elektroniese Regsblad (PER) 16(1), 451–481 (2013)
Rosengren, K.E.: Advances in Content Analysis. Sage Publications, Beverly Hills (1981)
Shava, F.B., Van Greunen, D.: Designing user security metrics for security awareness at higher and tertiary institutions. In: Proceedings of the 8th International Development Informatics Association Conference, 3–4 November 2014, Port Elizabeth, South Africa, pp. 280–296 (2014)
South Africa. Department of Communications: National Integrated ICT Policy. Government Gazette, No. 37261, 24 January 2014
South Africa. Department of Public Service and Administration: Draft position Paper on Information Security. Version 0.3 (2015)
Tuyikeze, T., Pottas, D.: An information security policy development life cycle. In: Proceedings of the South African Information Security Multi-Conference (SAISMC), Port Elizabeth, South Africa, pp. 165–176, 17–18 May 2010. ISBN 978-1-84102-256-7
Whitman, M.E., Mattord, H.J.: Principles of Information Security. Course Technology, Boston (2003)
World Bank: New-Economy Sector Study: Electronic Government and Governance: Lessons for Argentina (2002). http://documents.worldbank.org/curated/en/527061468769894044/pdf/266390WP0E1Gov1gentina1Final1Report.pdf. Accessed 17 Feb 2017
Zhao, F., Scavarda, A.J., Waxin, M.: Key issues and challenges in e-Government development: an integrative case study of the number one eCity in the Arab world. Inf. Technol. People 25(4), 395–422 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ngoqo, B., Njenga, K. (2018). The State of e-Government Security in South Africa: Analysing the National Information Security Policy. In: Odumuyiwa, V., Adegboyega, O., Uwadia, C. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 250. Springer, Cham. https://doi.org/10.1007/978-3-319-98827-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-98827-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98826-9
Online ISBN: 978-3-319-98827-6
eBook Packages: Computer ScienceComputer Science (R0)