Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
IJCATR Volume 7 Issue 2
Model for Information Security Governance Prediction in Public Universities in Kenya
Anne Ndolo , Dr. Solomon Ogara , Dr. Samuel Liyala
10.7753/IJCATR0702.1006
keywords : Information Security; Information Security Governance; Risk Assessment; IT; Public Universities;
Information is one of the most important assets in Organizations worldwide. To enable secure business operations, an organization must have an effective security governance strategy. The study focused on Information security governance in Public Universities in Kenya by establishing the current status of information security practices. Purposive sampling used to select seven (7) public Universities. A descriptive survey design, involving questionnaire was conducted to collect quantitative data. 394 respondents participated in the study. Data was analyzed using SPSS software. Correlation and multiple Regression analysis were obtained. The findings reveal that information security management’s participation level is inadequate to deal effectively with information security governance threats, roles and responsibilities not well defined in support of information security governance practices. The research provides a comprehensive model for ensuring alignment of information security objectives with business objectives.
@artical{a722018ijcatr07021006,
Title = "Model for Information Security Governance Prediction in Public Universities in Kenya",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "7",
Issue ="2",
Pages ="63 - 77",
Year = "2018",
Authors ="Anne Ndolo , Dr. Solomon Ogara , Dr. Samuel Liyala "}
The paper proposes an information security governance model for public universities in Kenya
Different information security governance practices are employed by the Public Universities
Regression Analysis was carried out on information security governance practices
Management’s participation level is inadequate to deal effectively with information threats.