The information security challenges faced in Zanzibar are persistent in transitional countries as could be seen in the case study “state of Information Security in Zanzibar’s public sector” (Shaaban, et al., 2012). Most of these challenges are partly attributed to lack of proper budgeting for ICT infrastructures, cultural gap awareness, political instability, trust, business continuity plan, and inadequate human resource management to effectively manage this technology (Dada, 2006).
The application of e-government in corporate governance to improve efficiency and effectiveness of the public sector agencies and delivery of services to the users has increased extensively, due to its result oriented in accountability, transparency and availability of governance to the citizen. The viability of e-governance is not assured without the element of information security. Hence, E-government security is a vital prerequisite in the adoption and the attainment of a standard corporate e-governance in the public sector to secure the inflow of data and information. (Alfawaz et al., 2008).
ANS 1The adoption and sustainability of e-government security in developing countries has been faced with challenges, irrespective of existing information security models, blue print and existing benchmark as seen from the case study of information security management in Zanzibar’s public sector (Shaaban, et al., 2012). “The feasibility of having a successful e-government is directly depended on the government overall ability and readiness to spend on the necessary information technology and related costs “(SUBHAJIT BASU 2004).The cost of infrastructures required to set up information technology in developing countries is greatly influence by donor coun…
…’, Reinventing Government in the Information Age: International Practice in IT-Enabled Public Sector Reform, 1 pp.49.Heeks, R. (2002) ‘e-government in Africa: Promise and practice’, Information Polity, 7 (2), pp.97-114.Jin-Fu, W. (2009) ‘E-government security management: Key factors and countermeasures’, Ieee Research Paper, .
Picanso, K.E. (2006) ‘Protecting information security under a uniform data breach notification law’, Fordham L.Rev., 75 pp.355.
Shaaban, H., Conrad, M. & French, T. ( 2012). State of information security in Zanzibar’s public sector. Zanzibar, IST-Africa.
Siponen, M.T. (2000) ‘A conceptual foundation for organizational information security awareness’, Information Management & Computer Security, 8 (1), pp.31-41.Stanforth, C. & O’Flynn, M. (2008) ‘The promotion of e-governance in developing countries: Reflections on e-government in two Asia