ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach

The consequences of Information and Communication Technology (ICT) revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes - almost on daily basis; impacting the way we work, learn and li...

Full description

Bibliographic Details
Main Author: Tarimo, Charles N.
Format: Doctoral Thesis
Language:English
Published: Stockholms universitet, Institutionen för data- och systemvetenskap 2006
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-1354
http://nbn-resolving.de/urn:isbn:91-7155-340-1
id ndltd-UPSALLA1-oai-DiVA.org-su-1354
record_format oai_dc
collection NDLTD
language English
format Doctoral Thesis
sources NDLTD
topic Computer and systems science
Data- och systemvetenskap
spellingShingle Computer and systems science
Data- och systemvetenskap
Tarimo, Charles N.
ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach
description The consequences of Information and Communication Technology (ICT) revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes - almost on daily basis; impacting the way we work, learn and live. Following this revolution, governments around the world have recognised that the transformation from traditional government to electronic government is one of the most important public policy issues to embrace. Likewise, organisations and businesses around the world are transforming from traditional organisations and businesses to their electronic equivalent. However, to be a part in this revolution, it is important for the concerned governments and organisations to have an ability to differentiate between implementing a new IT/ICT system and a transformation to e-government, e-organisation, and e-business. E-government is not simply about implementing new ICT systems, but it is about changing business models and processes to do things differently and better. ICT offers the solutions, but e-government, eorganisation, and e-business are about changing the way they operate to achieve their mission objectives.Implicitly there are a number of key issues to be considered in this transformation. One such key issue is security, since many of the technical and social security control mechanisms that are in place today are rendered ineffective by the ICT revolution. As such, we can no longer rely entirely on our traditional security controls—e.g. physical access controls, security guards and locks—to ensure the security of an organisation’s assets, processes and communications. The multiplicity of new technical possibilities gives rise not only to new products, services and more efficient and effective ways of doing things, but also to the possibility of misuse of the technology. Consequently, new social and technical security controls are imperative in this revolution. However, research findings show that, in many cases, security issues come as an-after-thought in the ongoing transformations to ICT-enabled organisational or governmental contexts. In this thesis, the challenges of the process of computerisation and other changes due to ICT are investigated from a security point of view. An explorative study of both theoretical and practical aspects of addressing ICT security in organisations was performed. The findings from some organisations studied show that, organisations—as social-technical systems—are facing a myriad of problems in their effort to adequately and effectively implementing a sound ICT security program. As a result, the organisations, individuals, or nations as a whole; may fail in meeting the challenges of exploiting the benefits of ICT; due, in part, to their failure to manage the risks which ICT presents—not being ‘e-ready’ in ICT security matters. In view of the above, the following are the end products of the research: a Model of Security Knowledge, and a Social-Technical ICT Security Readiness Checklist. These end products draw from the available ICT-security knowledge-body and a practical experience from an empirical study conducted in Tanzania. We believe the model and checklist would serve as a starting point in assisting organisations having a similar security situation as those studied, to meet the security challenges of exploiting the benefits of ICT. By providing means for evaluation, formation and implementation of ICT security controls—both social and technical ones—the checklist can be helpful in managing the risks that ICT presents.
author Tarimo, Charles N.
author_facet Tarimo, Charles N.
author_sort Tarimo, Charles N.
title ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach
title_short ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach
title_full ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach
title_fullStr ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach
title_full_unstemmed ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach
title_sort ict security readiness checklist for developing countries : a social-technical approach
publisher Stockholms universitet, Institutionen för data- och systemvetenskap
publishDate 2006
url http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-1354
http://nbn-resolving.de/urn:isbn:91-7155-340-1
work_keys_str_mv AT tarimocharlesn ictsecurityreadinesschecklistfordevelopingcountriesasocialtechnicalapproach
_version_ 1716508076489572352
spelling ndltd-UPSALLA1-oai-DiVA.org-su-13542013-01-08T13:04:22ZICT Security Readiness Checklist for Developing Countries : A Social-Technical ApproachengTarimo, Charles N.Stockholms universitet, Institutionen för data- och systemvetenskapKista : Institutionen för data- och systemvetenskap (tills m KTH)2006Computer and systems scienceData- och systemvetenskapThe consequences of Information and Communication Technology (ICT) revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes - almost on daily basis; impacting the way we work, learn and live. Following this revolution, governments around the world have recognised that the transformation from traditional government to electronic government is one of the most important public policy issues to embrace. Likewise, organisations and businesses around the world are transforming from traditional organisations and businesses to their electronic equivalent. However, to be a part in this revolution, it is important for the concerned governments and organisations to have an ability to differentiate between implementing a new IT/ICT system and a transformation to e-government, e-organisation, and e-business. E-government is not simply about implementing new ICT systems, but it is about changing business models and processes to do things differently and better. ICT offers the solutions, but e-government, eorganisation, and e-business are about changing the way they operate to achieve their mission objectives.Implicitly there are a number of key issues to be considered in this transformation. One such key issue is security, since many of the technical and social security control mechanisms that are in place today are rendered ineffective by the ICT revolution. As such, we can no longer rely entirely on our traditional security controls—e.g. physical access controls, security guards and locks—to ensure the security of an organisation’s assets, processes and communications. The multiplicity of new technical possibilities gives rise not only to new products, services and more efficient and effective ways of doing things, but also to the possibility of misuse of the technology. Consequently, new social and technical security controls are imperative in this revolution. However, research findings show that, in many cases, security issues come as an-after-thought in the ongoing transformations to ICT-enabled organisational or governmental contexts. In this thesis, the challenges of the process of computerisation and other changes due to ICT are investigated from a security point of view. An explorative study of both theoretical and practical aspects of addressing ICT security in organisations was performed. The findings from some organisations studied show that, organisations—as social-technical systems—are facing a myriad of problems in their effort to adequately and effectively implementing a sound ICT security program. As a result, the organisations, individuals, or nations as a whole; may fail in meeting the challenges of exploiting the benefits of ICT; due, in part, to their failure to manage the risks which ICT presents—not being ‘e-ready’ in ICT security matters. In view of the above, the following are the end products of the research: a Model of Security Knowledge, and a Social-Technical ICT Security Readiness Checklist. These end products draw from the available ICT-security knowledge-body and a practical experience from an empirical study conducted in Tanzania. We believe the model and checklist would serve as a starting point in assisting organisations having a similar security situation as those studied, to meet the security challenges of exploiting the benefits of ICT. By providing means for evaluation, formation and implementation of ICT security controls—both social and technical ones—the checklist can be helpful in managing the risks that ICT presents. Doctoral thesis, monographinfo:eu-repo/semantics/doctoralThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-1354urn:isbn:91-7155-340-1Report Series / Department of Computer & Systems Sciences, 1101-8526 ; No 06/17application/pdfinfo:eu-repo/semantics/openAccess