Journal of Innovation Information Technology and Application (JINITA)
Vol 4, No 1 (2022): JINITA, June 2022

Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda

Fredrick Kanobe (Kyambogo University)
SP Sambo (Tshwane University of Technology)
Billy Mathias Kalema (University Mpumalanga Sciences)



Article Info

Publish Date
30 Jun 2022

Abstract

The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda. The study was motivated by the continuous information security governance challenges in the Public Cloud.  The theoretical frameworks that underpinned this study included; Contingency management theory,  the Risk Management framework, the Technological Organisational and Environmental (TOE) model and the Information Security Governance model.  This study adopted a quantitative research approach to obtain data through a survey. Five key factors for information security governance were identified: a) Technological factors: flexibility, scalability, availability, agility, data protection governance, trust of cloud, data source, maintenance, data retention and policy.  b) Organisation: size and structure of the organisation, top management support. c) Environmental factors: governance and regulation, marketing, vendor, resource availability, obsoleteness.  d) Individual: user resistance, attitude, skills, belief and learnability. e) Risk management and control factors: risk assessment, disaster recovery, access and authorisation control, monitoring, auditing, and process risk control. The study contributes to theory and practice in information security. The developed framework and its accompanying model helped to inform public departments, organisational top management and information security strategies to avoid excessive information risks and potential regulatory compliance failures in public cloud. The study was inclined on subjective information security, which alone may not fully address all information security problems in a public cloud. Therefore, it is recommendable that future research studies on objective security in public cloud

Copyrights © 2022






Journal Info

Abbrev

jinita

Publisher

Subject

Computer Science & IT Decision Sciences, Operations Research & Management Engineering

Description

Software Engineering, Mobile Technology and Applications, Robotics, Database System, Information Engineering, Interactive Multimedia, Computer Networking, Information System, Computer Architecture, Embedded System, Computer Security, Digital Forensic Human-Computer Interaction, Virtual/Augmented ...