AN EXAMINATION OF THE EFFECTS OF CYBER SECURITY IN ENHANCING PERFORMANCE OF THE PUBLIC SECTOR INSTITUTIONS LITERATURE REVIEW
Main Article Content
Abstract
The anticipated outcomes of this study was to gain a deeper understanding of the current state of cyber security adoption by the public sector institutions, especially in Kenya. The study reviewed on different literature on the status of cyber security adoption in regard to the enhancement on the performance of these institutions, identified challenges that the institutions faced in adopting and implementing such cyber security technologies, and the strategies needed to improve on cyber security applications. The review also pointed out cyber security measures that can lead to improved service delivery, increased operational efficiency, and more secure digital environment for the country's citizens. Thus, by identifying the challenges and barriers faced by these institutions, the study could help inform policy and decision-making processes, guiding future investments in cyber security and other related technologies. Further, the findings of this research could contribute to the enhancement of cyber security measures and their implementation in Kenya's public sector institutions. This, in turn, could lead to improved service delivery, increased operational efficiency, and a more secure digital environment for the country's citizens. By identifying the challenges and barriers faced by these institutions, the study could also help inform policy and decision-making processes, guiding future investments in cyber security technologies.
Article Details
References
Bougaardt, G and Kyobe, M. “Investigating the Factors Inhibiting SMEs from Recognizing and Measuring Losses from Cyber Crime in South Africa” The Electronic Journal Information Systems Evaluation Volume 14 Issue 2 2011, (pp167-178),
Brenner, S., W. (2002b). The privacy privilege: Law enforcement, technology and the constitution. Journal of Technology Law and Policy 7 (2) 123-94.
Brenner, S.,W. (2004). Toward a criminal law for cyberspace, Distributed Security. Boston University Journal of Science & Technology Law 10 (2).
Bulgurcu, B., Cavusoglu, H., &Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,MIS Quarterly34(3), 523-548.
Chang and C-S. Lin (2007) "Exploring organizational culture forinformation security management," Industrial Management & DataSystems, vol. 107, no. 3, pp. 438-458.
Chau, P. Y., Kuan, K. K., & Liang, T. (2007). Research on IT value: What we Have Done in Asia and Europe. European Journal of Information Systems,16(3), 196.
Cooper, D.R., & Schindler, P.S. (2003). Business Research Methods. (8th ed.). Boston: 15 McGraw-Hill Irwin.
Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. Sage.
Dacin, M. T., Goodstein, J., & Scott, W. R. (2002). Institutional Theory and institutional Change: Introduction to the Special Research Forum. Academy of Management Journal, 45(1), 45-56.
Dhillon, G., &Torkzadeh, G. (2006). Value-focused Assessment of Information Systems Security in Organizations, Information Systems Journal16(3), 293314.
Einhorn, H. J., & Hogarth, R. M. (1981). Behavioral Decision Theory: Processes of Judgment and Choice. Journal of Accounting Research, 1-31.
Glenny, M., Glick, B., & Wainwright, R. (2010). Cybercrime, cybersecurity and the future of the internet.
Herath, T., & Rao, H. R. (2009). Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organizations.European Journal of Information Systems18(2), 106-125.
Hulme, G. V. (2011). SCADA Insecurity-Stuxnet put the Spotlight on Critical Infrastructure Protection but Will Efforts to Improve it come too late?Information Security Magazine, 13(1), 38-44.
International Telecommunication Union (2004). Understanding Cybercrime: A Guide for Developing Country.
Jin, X. Q. Z. G. C. (2006). Theoretical Trace and Framework of Overall Innovation Management. Chinese Journal of Management, 2, 002.
Kankanhallia, A., Teo, H., Tan, B., & Wei, K. (2003). An Integrative Study of Information Systems Security Effectiveness, International Journal of Information Management (23), 139-154.
Kimutai, J. K. (2014). Social media and national security threats: a case study of Kenya. (Doctoral dissertation, University of Nairobi).
King'ori, P. M. (2014). Assessment of Awareness and Preparedness of Cyber cafe Internet Users to deal with threats of cyber-crimes: A case of Nairobi County (Doctoral dissertation, University of Nairobi).
Kothari, C. R. (2004). Research Methodology: Methods and Techniques. New Age International.
Kyobe, M. (2008). Evaluating Information Security within SMEs engaged in Ecommerce in South Africa. Institute for Small Business & Entrepreneurship, 5-7.
Magutu, P.A., Ondimu, G.M., &Ipu, C.J. (2011) Effects of Cybercrime on State Security: Types, Impact and Mitigations with the Fiber Optic Deployment in Kenya, Journal of Information Assurance & Cyber security.
Mugenda, A. G. (2008). Social Science Research: Theory and Principles Nairobi: Applied.
Nerey H.M.M. (2012). Information System Security Effectiveness Attributes: A Tanzanian Company Case Study. World Academy of Science, Engineering and Technology (70), 551-557.
Nyawanga, J. O. (2015). Meeting the challenge of cyber threats in emerging electronic transaction technologies in in Kenyan banking sector (Doctoral dissertation, University of Nairobi).
Olayemi, O. J. (2014). A socio-Technological Analysis of Cybercrime and Cyber Security in Nigeria, International Journal of Sociology and Anthropology, 6(3), 116-125.
Osang, F. B., Ngole, J. &. Tsuma C (2013). Prospects and Challenges of M-learning Implementation In Nigeria: Case Study National Open University Of Nigeria (NOUN). International Conference on ICT for Africa.
Rajkumar, R. R., Lee, I., Sha, L., & Stankovic, J. (2010, June). Cyber-physical systems: the next computing revolution. In Proceedings of the 47th Design Automation Conference (pp. 731-736). ACM.
Ruighaver, A. B., Maynard, S., B. & Chang, S. (2007). Organizational Security Culture: Extending the End-User Perspective. Computers & Security, 26 (1), 56-62.
Santos, T. P. (2010). A Security Audit Framework to Manage Information System Security. ICGS(3),
Serianu Consultants in Cyber Security (2015); available at ahttp://www.usiu.ac.ke/oncampus/news/296-serianu-usiu-africa-pkf-consulting-launch-kenya-cybersecurity-report-2015
Sharma, R. (2012). Study of Latest Emerging Trends on Cyber Security and its Challenges to Society, International Journal of Scientific & Engineering Research, 3(6), 124-132
Siponen, Pahnila, and Mahmood (2010). Compliance with Information Security Policies: An Empirical Investigation. Computer 43(2), 64-71.
Slovic, P., Fischhoff, B., & Lichtenstein, S. (1977). Behavioral Decision Theory. Annual Review of Psychology, 28(1), 1-39.
Solms R. and Solms B. (2004). "From policies to culture," Computers & Security, vol. 23, no. 4, pp. 275-279, 2004.
Straub, D. (1990). "Effective IS Security," Information Systems Research, vol. 1, no. 3, pp. 255-273.
Straub, D. (1990). Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly 22(8), 441-465.
Tarimo, C. (2006): ICT Security Readiness Checklist for Developing countries: A Social-Technical Approach. Ph.D thesis. Stockholm University, Royal Institute of Technology.
Tonge, A. M., Kasture, S. S., and Chaudhari, S. R. (2013). Cyber Security: Challenges for Society- Literature Review, Journal of Computer Engineering, 12(2), 67-75
Wechuli A. (2014) on Cyber Security Assessment Framework: Case of government Ministries in Kenya; International Journal of Technology in Computer Science and Engineering, 1(3).
Wekundah, R. N. (2015). The effects of cyber-crime on e-commerce; a model for SMEs in Kenya (Doctoral dissertation, University of Nairobi).
Zanoon, N., Albdour, N., & Hamatta, H. S. (2015) Security challenges as a factor affecting the security of manet: attacks, and security solutions. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
Zhu, K., Kraemer, K. L., &Xu, S. (2002). A Cross-Country Study of Electronic Business Adoption Using the Technology-Organization-Environment Framework.