Institutional Repository

Towards an information security framework for government to government transactions : a perspective from East Africa

Show simple item record

dc.contributor.advisor Eloff, M. M.
dc.contributor.advisor Venter, Lucas Wangwe, Carina Kabajunga 2013-05-15T09:37:36Z 2013-05-15T09:37:36Z 2012-10 2013-05-15
dc.identifier.citation Wangwe, Carina Kabajunga (2012) Towards an information security framework for government to government transactions : a perspective from East Africa, University of South Africa, Pretoria, <> en
dc.description.abstract The need for a regional framework for information security in e-Government for the East African Community (EAC) has become more urgent with the signing in 2009 of the EAC Common Market Protocol. This protocol will entail more electronic interactions amongst government agencies in the EAC partner states which are Burundi, Kenya, Rwanda, Tanzania, and Uganda. Government to Government (G2G) transactions are the backbone of e-Government transactions. If a government wants to provide comprehensive services that are easy to use by citizens, employees or businesses, it needs to be able to combine information or services that are provided by different government agencies or departments. Furthermore, the governments must ensure that the services provided are secure so that citizens trust that an electronic transaction is as good as or better than a manual one. Thus governments in the EAC must address information security in ways that take into consideration that these governments have limited resources and skills to use for e-Government initiatives. The novel contribution of this study is an information security framework dubbed the TOG framework, comprising of technical, operational, governance, process and maturity models to address information security requirements for G2G transactions in the EAC. The framework makes reference to standards that can be adopted by the EAC while taking into consideration contextual factors which are resource, legislative and cultural constraints. The process model uses what is termed a ‘Plug and Play’ approach which provides the resource poor countries with a means of addressing information security that can be implemented as and when resources allow but eventually leading to a comprehensive framework. Thus government agencies can start implementation based on the operational and technical guidelines while waiting for governance structures to be put in place, or can specifically address governance requirements where they already exist. Conversely, governments using the same framework can take into consideration existing technologies and operations while putting governance structures in place. As a proof of concept, the proposed framework is applied to a case study of a G2G transaction in Tanzania. The framework is evaluated against critical success factors. en
dc.format.extent 1 online resource (xvii, 242 leaves :ill.)
dc.language.iso en en
dc.rights University of South Africa
dc.subject.ddc 005.809676
dc.subject.lcsh Computer security -- Tanzania -- Case studies
dc.subject.lcsh Data protection -- Africa East
dc.subject.lcsh Internet in public administration -- Africa East
dc.subject.lcsh Computer security -- Africa, East
dc.subject.lcsh Data protection -- Tanzania -- Case studies
dc.title Towards an information security framework for government to government transactions : a perspective from East Africa en
dc.type Thesis en
dc.description.department Computing en D. Phil. (Computer Science)

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


My Account