Abstract
The lack of planning, business re-engineering, and coordination in the whole process of computerisation, is the most pronounced problem facing organisations in developing countries. These problems often lead to a discontinuous link between technology and the business processes. As a result, the introduced technology poses some critical risks to the organisations due to the different perceptions of the management and technical staff in viewing the ICT security problem. This paper discusses a practical experience of bridging the gap between the general management and ICT technicians.
Chapter PDF
Similar content being viewed by others
References
Bakari, J. K., Magnusson, C., Tarimo, C. and Yngström, L.: Ensuring ICT Risks Using EMitL Tool: An Empirical Study, IFIP, Springer, USA. (2005) 157–173.
Bakari, J.K.: Towards A Holistic Approach for Managing ICT Security in Developing Countries: A Case Study Of Tanzania”, Ph.L thesis, SU-KTH, Stockholm. (2005).
Magnusson, C. Hedging Shareholders Value in an IT dependent Business Society, THE FRAMEWORK BRITS, Ph.D Thesis, SU-KTH, Stockholm, (1999).
ITIL, (April, 2005); http://www.itil.org.uk/.
COBIT, (20th October, 2005); http://www.isaca.org/cobit/.
ISO 17799 Standards.
Solms, B. V. Information Security governance: COBIT or ISO 17799 or both? Computer & Security Vol 24 (2005) 99–104.
Solms, B. V. and Solms, R. V. The 10 deadly sins of information security management, Computers & Security, Vol.23 No 5 ISSN 0167-4048, (2004) 371–376.
Wilson, M. & Hash, J. ‘Building an Information Technology Security Awareness and Training Program’ NIST Special publication 800-50, USA, (2003).
Blakley, B. McDermott, E. & Geer, D.: Information Security is Information Risk Management, ACM Press New York, NY, USA, (2001).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Bakari, J.K., Tarimo, C.N., Magnusson, C., Yngström, L. (2006). Bridging the Gap between General Management and Technicians — A Case Study in ICT Security. In: Fischer-Hübner, S., Rannenberg, K., Yngström, L., Lindskog, S. (eds) Security and Privacy in Dynamic Environments. SEC 2006. IFIP International Federation for Information Processing, vol 201. Springer, Boston, MA. https://doi.org/10.1007/0-387-33406-8_39
Download citation
DOI: https://doi.org/10.1007/0-387-33406-8_39
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-33405-9
Online ISBN: 978-0-387-33406-6
eBook Packages: Computer ScienceComputer Science (R0)