@inproceedings{fe297f1ac83f4531bbdf953d4c8d158f,
title = "The state of e-Government security in South Africa: Analysing the national information security policy",
abstract = "As a result of the growing reliance by public sector organisations on technological resources for capturing and processing information, protection of information in the public sector has become an issue of national concern. While considering the South African national strategy for protecting this state asset ({\textquoteleft}information{\textquoteright}) this paper contrasts existing local, provincial or national e-Government information security policies against the adopted national guidelines. The paper postulates that with sound policies and guidelines in place {\textquoteleft}interpretation and application{\textquoteright} remain as two barriers that pose a threat to state information. The main question addressed in this paper is whether e-Government information security policies adequately address prescribed key security components. To achieve a comprehensive understanding of the pillars underpinning the protection of national information security in South Africa, the authors followed systematic procedures for reviewing and evaluating existing e-Government information security policies. The objective of this paper is to investigate whether existing government information security policies are aligned to national policy or guidelines. This paper will contribute empirical evidence which supports the notion observed by the South African Auditor General that (Auditor-General 2012) security weaknesses in government departments and state entities are attributed to the lack of formally designed and implemented information security policies and standards. The results of this preliminary investigation indicate that although information security policies exist in the majority of state entities, there is no consistency in the application of the {\textquoteleft}security controls{\textquoteright}, as outlined in the national guidelines.",
keywords = "Information security legislation, Information security policy, National information security, Security controls, e-Government",
author = "Bukelwa Ngoqo and Kennedy Njenga",
note = "Publisher Copyright: {\textcopyright} 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.; 9th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2017 ; Conference date: 11-12-2017 Through 12-12-2017",
year = "2018",
doi = "10.1007/978-3-319-98827-6_3",
language = "English",
isbn = "9783319988269",
series = "Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST",
publisher = "Springer Verlag",
pages = "29--46",
editor = "Victor Odumuyiwa and Ojo Adegboyega and Charles Uwadia",
booktitle = "e-Infrastructure and e-Services for Developing Countries - 9th International Conference, AFRICOMM 2017, Proceedings",
address = "Germany",
}