A Secure Maturity Model for Protectinge-Government Services: A Case of Tanzania
Publish Year: 1393
Type: Journal paper
Language: English
View: 683
This Paper With 9 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
JR_ACSIJ-3-5_014
Index date: 3 November 2014
A Secure Maturity Model for Protectinge-Government Services: A Case of Tanzania abstract
E-Government Maturity Models (eGMMs) are widelyused in the implementation and development of e-Government services. These models outline variousstages for e-Government development. Informationsecurity and privacy are considered as the mostsignificant challenges in implementing e-Governmentservices, but unfortunately very few designs of eGMMshave considered security as a specific issue. However,even these few security responsive models considersecurity mostly at the transaction stage, and as such it isinsecure to depend on security mechanisms provided attransaction stage only. This paper develops a four-stageholistic secured eGMM for protecting e-Governmentservices with Tanzania used as a case study. Theproposed secured e-Government maturity model has beendesigned by including the security layers which consistof technical and non-technical security related aspects ineach of its four maturity stages. The model designprocess is based on the ISO/ IEC 27002 security standardand is guided by a design science research methodology.The paper main contribution is the proposed securedeGMM that addresses both technical and non-technicalsecurity related aspects at its maturity stages
A Secure Maturity Model for Protectinge-Government Services: A Case of Tanzania Keywords:
A Secure Maturity Model for Protectinge-Government Services: A Case of Tanzania authors
Mohamed D. Wazir
The Nelson Mandela African Institution of Science and Technology (NM-AIST)School of Computational and Communication Science and Engineering