Information System Security Effectiveness Attributes: A Tanzanian Company Case Study

Nerey H. Mvungi, Mosses Makoko
2012 Zenodo  
In today-s highly globalised and competitive world access to information plays key role in having an upper hand between business rivals. Hence, proper protection of such crucial resource is core to any modern business. Implementing a successful information security system is basically centered around three pillars; technical solution involving both software and hardware, information security controls to translate the policies and procedure in the system and the people to implement. This paper
more » ... ows that a lot needs to be done for countries adapting information technology to process, store and distribute information to secure adequately such core resource.
doi:10.5281/zenodo.1055633 fatcat:rcbaooluxjbqpduigjm2j4dyf4