Transforming information security governance in India (A SAP-LAP based case study of security, IT policy and e-governance)

2018 ◽  
Vol 26 (1) ◽  
pp. 58-90 ◽  
Author(s):  
Rashmi Anand ◽  
Sanjay Medhavi ◽  
Vivek Soni ◽  
Charru Malhotra ◽  
D.K. Banwet

Purpose Digital India, the flagship programme of Government of India (GoI) originated from National e-Governance Project (NeGP) in the year 2014. The programme has important aspect of information security and implementation of IT policy which supports e-Governance in a focused approach of Mission Mode. In this context, there is a need to assess situation of the programme which covers a study of initiatives and actions taken by various actor involved and processes which are responsible for overall e-Governance. Therefore, the purpose of this case study is to develop a Situation-Actor-Process (SAP), Learning-Action-Performance (LAP) based inquiry model to synthesize situation of information security governance, IT policy and overall e-Governance. Design/methodology/approach In this case study both systematic inquiry and matrices based SAP-LAP models are developed. Actors are classified who are found responsible and engaged in IT policy framing, infrastructure development and also in e-Governance implementation. Based on a synthesis of SAP components, various LAP elements were then synthesized then which further led to learning from the case study. Suitable actions and performance have also been highlighted, followed by a statement of the impact of the efficacy i.e. transformation of information security, policy and e-Governance on the Digital India programme. Findings On developing the SAP-LAP framework, it was found that actors like the Ministry of Electronics and Information Technology of the Govt. of India secures a higher rank in implementing various initiatives and central sector schemes to accelerate the agenda of e-Governance. Actions of other preferred actors include more investments in IT infrastructure, policy development and a mechanism to address cyber security threats for effective implementation of e-Governance. It was found that actors should be pro-active on enhancing technical skills, capacity building and imparting education related to ICT applications and e-Governance. Decision making should be based on the sustainable management practices of e-Governance projects implementation to manage change, policy making and the governmental process of the Indian administration and also to achieve Sustainable Development Goals by the Indian economy. Research limitations/implications The SAP-LAP synthesis is used to develop the case study. However, few other qualitative and quantitative multi criteria decision making approaches could also be explored for the development of IT security based e-Governance framework in the Indian context. Practical implications The synthesis of SAP leads to LAP components which can bridge the gaps between information security, IT policy governance and e-Governance process. Based on the learning from the Situation, it is said that the case study can provide decision making support and has impact on the e-Governance process i.e. may enhance awareness about e-services available to the general public. Such work is required to assess the transparency and accountability on the Government. Social implications Learning based on the SAP-LAP framework could provide decision making support to the administrators, policy makers and IT sector stakeholders. Thus, the case study would further help in addressing the research gaps, accelerating e-Governance initiatives and in capturing cyber threats. Originality/value The SAP-LAP model is found as an intuitive approach to analyze the present status of information security governance, IT policy and e-Governance in India in a single unitary model.

Author(s):  
Winfred Yaokumah

The purpose of this empirical study is to evaluate the extent to which information security governance domain practices: strategic alignment, value delivery, resource management, risk management, and performance measurement relate to information security governance effectiveness. Random sampling technique was employed and data were collected via web survey from Ghanaian organizations. Employing three multiple regression models, the results showed there were statistically significant positive linear relationship between information security governance domain practices and information security governance effectiveness. Overall, the model produced R2 = .505, indicating that 50.5% of the variance in information security governance effectiveness was explained by information security governance domain practices. The results highlighted resource management, performance measurement and risk management practices as the predictors of organizational information security governance effectiveness while strategic alignment contributed only marginally to the models. Therefore, to attain higher information security governance effectiveness, organizations should focus on strategic alignment between the business and information security attributes.


2016 ◽  
Vol 7 (1) ◽  
pp. 26-42 ◽  
Author(s):  
Avinash Ramtohul ◽  
K.M.S. Soyjaudah

Purpose – Highly sensitive information pertaining to citizens and government transactions is processed in an electronic format, making information security a critical part of e-Government applications and architectures. Information security measures should ideally span from authentication to authorisation and from logical/physical access control to auditing of electronic transactions and log books. The lack of such measures compromises confidentiality, integrity and availability of information. Today, most e-Government projects in developing countries in Southern Africa Developing Community (SADC) face challenges in two main areas, namely, information security and application software integration. This paper aims to discuss and analyse the information security requirements for e-Government projects and proposes an information security governance model for service-based architectures (SBAs). Design/methodology/approach – The current state of information security in emerging economies in SADC countries was researched. The main problems identified were the lack of software integration and information security governance, policy and administration. The design consists of three basic layers: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures, implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study. Findings – The main problems identified were the lack of software integration and information security governance, policy and administration. These challenges are causing e-government projects to stagnate. Practical implications – The proposed approach for implementing information security in e-Government systems will ensure a holistic approach to ensuring confidentiality, integrity and non-repudiation, allowing e-Government maturity to progress from “interaction” to “online transaction” stage in emerging economies. Originality/value – Research has not focused on developing a solution for emerging economies which are facing difficulties in integration software applications to deploy end-to-end e-services and to produce an underlying identity management architecture and information security governance to secure the e-services developed and deployed using an SBA. The work produced in this paper is specific to SBAs in e-government environments where legacy systems already exist. The work includes: information security governance defined at the strategic level of the government; information security policy/management defined at the management/operational level; and information security measures implemented at the technical level. This section also proposes a policy for implementing public key infrastructures to protect information, transactions and e-services. A Token-Ring-based mechanism for implementing Single-Sign-On has also been developed as part of this study.


2020 ◽  
Vol 16 (2) ◽  
pp. 43-56
Author(s):  
Bob Hardian Syahbuddin ◽  
Wachid Yoga Afrida ◽  
Fatimah Azzahro ◽  
Achmad Nizar Hidayanto ◽  
Kongkiti Phusavat

Oil and gas industry are among the largest contributor to the Indonesia’s foreign exchange. Many believe that information technology will be major driver for economic wealth in the oil and gas Industry. However, implementing information technology to support corporate business process brings vast information security risks. There is a need of comprehensive information security governance that can comply to information security standards and regulations. This research is conducted to evaluate the use of multiple ISG frameworks for implementing information security governance in a multinational oil and gas company. In detail, we evaluate the effectiveness of such framework, assess its implementation maturity level, and identify the success and inhibiting factors for implementing ISG frameworks. This study shows that framework XYZ, as a multiple ISG framework, is effective to cover the controls of ISO 17799, COSO, and IT Risk Framework at once. Meanwhile, the observed case study indicated lack of compliancy of Framework XYZ followed by the invention of gap between current ISG implementation efforts and company visions. Lastly, several success and inhibiting factors are identified in the ISG framework implementation at PT X.


2021 ◽  
Vol 13 (13) ◽  
pp. 7007
Author(s):  
Habtamu Nebere ◽  
Degefa Tolossa ◽  
Amare Bantider

In Ethiopia, the practice of land management started three decades ago in order to address the problem of land degradation and to further boost agricultural production. However, the impact of land management practices in curbing land degradation problems and improving the productivity of the agricultural sector is insignificant. Various empirical works have previously identified the determinants of the adoption rate of land management practices. However, the sustainability of land management practices after adoption, and the various factors that control the sustainability of implemented land management practices, are not well addressed. This study analyzed the factors affecting the sustainability of land management practices after implementation in Mecha Woreda, northwestern Ethiopia. The study used 378 sample respondents, selected by a systematic random sampling technique. Binary logistic regression was used to analyze the quantitative data, while the qualitative data were qualitatively and concurrently analyzed with the quantitative data. The sustained supply of fodder from the implemented land management practices, as well as improved cattle breed, increases the sustainability of the implemented land management practices. While lack of agreement in the community, lack of enforcing community bylaws, open cattle grazing, lack of benefits of implemented land management practices, acting as barrier for farming practices, poor participation of household heads during planning and decision-making processes, as well as the lack of short-term benefits, reduce the sustainability of the implemented land management practices. Thus, it is better to allow for the full participation of household heads in planning and decision-making processes to bring practical and visible results in land management practices. In addition, recognizing short-term benefits to compensate the land lost in constructing land management structures must be the strategy in land management practices. Finally, reducing the number of cattle and practicing stall feeding is helpful both for the sustainability of land management practices and the productivity of cattle. In line with this, fast-growing fodder grass species have to be introduced for household heads to grow on land management structures and communal grazing fields for stall feeding.


Energies ◽  
2021 ◽  
Vol 14 (14) ◽  
pp. 4100
Author(s):  
Mariana Huskinson ◽  
Antonio Galiano-Garrigós ◽  
Ángel Benigno González-Avilés ◽  
M. Isabel Pérez-Millán

Improving the energy performance of existing buildings is one of the main strategies defined by the European Union to reduce global energy costs. Amongst the actions to be carried out in buildings to achieve this objective is working with passive measures adapted to each type of climate. To assist designers in the process of finding appropriate solutions for each building and location, different tools have been developed and since the implementation of building information modeling (BIM), it has been possible to perform an analysis of a building’s life cycle from an energy perspective and other types of analysis such as a comfort analysis. In the case of Spain, the first BIM environment tool has been implemented that deals with the global analysis of a building’s behavior and serves as an alternative to previous methods characterized by their lack of both flexibility and information offered to designers. This paper evaluates and compares the official Spanish energy performance evaluation tool (Cypetherm) released in 2018 using a case study involving the installation of sunlight control devices as part of a building refurbishment. It is intended to determine how databases and simplifications affect the designer’s decision-making. Additionally, the yielded energy results are complemented by a comfort analysis to explore the impact of these improvements from a users’ wellbeing viewpoint. At the end of the process the yielded results still confirm that the simulation remains far from reality and that simulation tools can indeed influence the decision-making process.


2006 ◽  
Vol 22 (2) ◽  
pp. 161-168 ◽  
Author(s):  
Florence Bodeau-Livinec ◽  
Emmanuelle Simon ◽  
Catherine Montagnier-Petrissans ◽  
Marie-Eve Joël ◽  
Elisabeth Féry-Lemonnier

Objectives: The objective of this study is to assess the impact of CEDIT (French Committee for the Assessment and Dissemination of Technological Innovations) recommendations on the introduction of technological innovations within the AP-HP (Assistance Publique–Hôpitaux de Paris), the French hospital network to which this body is attached.Methods: In 2002, a study based on semidirective interviews of fourteen people affected by these recommendations and a case study relating to thirteen recommendations issued between 1995 and 1998 were conducted.Results: The CEDIT is very scientifically reputable among interviewees. There is generally widespread interest for the recommendations. They are used as decision-making tools by administrative staff and as negotiating instruments by doctors in their dealings with management. Based on the case study, ten of thirteen recommendations had an impact on the introduction of the technology in health establishments. One recommendation appears not to have had an impact. Furthermore, the impact of two technologies was impossible to assess.Conclusions: This study highlights the significant impact of recommendations arising from a structure that is attached to a hospital network and the good match between CEDIT's objectives and its assignments.


Sign in / Sign up

Export Citation Format

Share Document