Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3209415.3209425acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article

Information Systems Security Audits in Cameroon's Public Administration

Published: 04 April 2018 Publication History

Abstract

A few decades ago, most of the Sub-Saharan African countries such as the Republic of Cameroon joined the rest of the world in adopting ICTs to improve the delivery of government services. The Government of Cameroon regards e-Government with numerous benefits including greater efficiency, improved public services, reduced corruption and enhanced engagement with citizens. In spite of significant considerations on information security in Cameroon's Public Administration, their information systems still face huge challenges due to cyber security related issues such as systems vulnerabilities to internal or external attacks.
This paper presents an exploratory study on IT security audits in Cameroon's Public Administration in compliance with the legal and regulatory framework in place.

References

[1]
Quinta Nven-akeng Nkohkwo and M. Sirajul Islam. 2013. "Challenges to the Successful Implementation of e-Government Initiatives in Sub-Saharan Africa: A Literature Review", Electronic Journal of e-Government Volume 11 Issue 2, 253--267.
[2]
Costas Lambrinoudakis, Stefanos Gritzalis, Fredj Dridi, Gunther Pernul. 2003. "Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy", ELSEVIER Computer Communications 26, 1873--1883.
[3]
Sapanjeet Kaur, Dinesh Kumar. 2016. "Analysis of Cloud Computing Security Framework in E-governance", Electronic International Journal Computer Science and Technology Volume 7 Issue 1, 99--102.
[4]
Cameroon. 2010. "Law relating to Cyber-security and Cyber-criminality in Cameroon", Official Gazette in Cameroon.
[5]
Cameroon. 2010. "Law governing Electronic Communication in Cameroon", Official Gazette in Cameroon.
[6]
The Institute of Internal Auditors, USA. 2012."The role of auditing in the public sector governance". www.global.theiia.org/standards-guidance
[7]
Cameroon. 2011. EGOV National Strategy (July 2011).
[8]
Heeks, R. 2003. Causes of e-Government Success and Failure: Factor Model. Institute for Development Policy and Management, University of Manchester.
[9]
Ahmed Al-Omari and Hussein Al-Omari. 2006. "E-Government Readiness Assessment Model". Journal of Computer Science, Vol. 11, No. 2, 841--845.
[10]
ANTIC. 2016. "Cameroon's Cyber Security Report", http://www.antic.cm.
[11]
Ana-Maria SUDUC, Mihai BÎZOI, Florin Gheorghe FILIP. 2010. "Audit for Information Systems Security", Informatica Economică vol. 14, no. 1, 43--48.
[12]
ISO. The ISO 27000 Directory. 2009. www.27000.org.
[13]
A. Calder. 2009. Information Security Based on ISO 27001/ISO 27002. A ManagementGuide (2nd ed.), Zaltbommel: Van HarenPublishing.
[14]
Teresa Susana Mendes Pereira and Henrique Santos. 2010. "Conceptual Framework to Manage and Audit Information Systems Security", IEEE/WIC/ACM.
[15]
Terry T. Kidd and Robert K. Hiltbrand. 2007. "Intrusion Detection and Information Security Audits", IGI Global.
[16]
Onwubiko. 2009. "A Security Audit Framework for Security Management in the Enterprise", Proceeding of the International Conference on Global Security, Safety and Sustainability (ICGS3), 1--2, Sept. 2009, London, UK.
[17]
Eugen Munteanu. 2016. "A Systematic Literature Review of Information Systems Auditing in Developing Countries", Stockholm University, Sweden.
[18]
Petter Lovaas and Suzanne Wagner. 2012. "IT Audit Challenges for Small and MediumSized Financial Institutions", Annual Symposium on Information Assurance & Secure Knowledge Management, June 5-6, 2012, ALBANY, NY

Index Terms

  1. Information Systems Security Audits in Cameroon's Public Administration

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICEGOV '18: Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance
        April 2018
        739 pages
        ISBN:9781450354219
        DOI:10.1145/3209415
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 04 April 2018

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Information System Security
        2. Public Administration
        3. Security Audits
        4. e-Government

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICEGOV '18

        Acceptance Rates

        ICEGOV '18 Paper Acceptance Rate 104 of 184 submissions, 57%;
        Overall Acceptance Rate 350 of 865 submissions, 40%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 178
          Total Downloads
        • Downloads (Last 12 months)8
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 14 Dec 2024

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media