• No results found

En litteraturstudie av informationssystem säkerhet i utvecklingsländer

N/A
N/A
Protected

Academic year: 2022

Share "En litteraturstudie av informationssystem säkerhet i utvecklingsländer"

Copied!
43
0
0

Loading.... (view fulltext now)

Full text

(1)

A Comprehensive Literature Review of Information Systems Security in

Developing Countries

Samar Fumudoh Usha Viswanathan

2014

Master (120 credits)

Master of Science in Information Security

Luleå University of Technology

Department of Computer Science, Electrical and Space Engineering

(2)

A C OMPREHENSIVE L ITERATURE R EVIEW OF

I NFORMATION S YSTEMS S ECURITY IN

D EVELOPING C OUNTRIES

Authors: Samar Fumudoh & Usha Viswanathan

2014 Master Program

Master of Science in Information Security Luleå University of Technology

Department of Computer Science, Electrical and Space Engineering

(3)

2

COPYRIGHT

Copyright of this thesis is retained by the authors and the Luleå University of Technology. Ideas contained in this thesis remain the intellectual property of the authors and their supervisor, except where explicitly otherwise referenced.

All rights reserved. The use of any part of this thesis reproduced, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise or stored in a retrieval system without the prior written consent of the author and the Luleå University of Technology (Department of Computer Science, Electrical and Space Engineering) is not permitted.

Contact Information:

Project Member(s):

Samar Fumudoh Usha Viswanathan

E-mail: samfum-2@student.ltu.se E-mail: ushvis-2@student.ltu.se

University Advisor:

Devinder Thapa

E-Mail: devinder.thapa@ltu.se LULEÅ UNIVERSITY

(4)

3

ACKNOWLEDGEMENTS

A big thanks goes to Dr Devinder Thapa for suggesting the topic for this thesis and also for guiding Usha and me through the whole process of completing the thesis. Also, a big thanks and acknowledgement goes to Usha who has been an exceptional study partner throughout this program and particularly in completing this thesis. Much gratitude goes to my mother who has supported me tremendously during the whole MSc Programme and finally I dedicate my hard work to my two girls, Josephine and Isabelle.

Samar Fumudoh

First and foremost, I would like to thank my supervisor Dr. Devinder Thapa for the suggestions and support provided throughout the thesis work. His guidance helped us in our research and writing the thesis greatly. Secondly, I would like to thank Samar for being an excellent study partner, not just during the thesis phase, but also during the whole masters program. I would also specially thank my son Aditya and my husband Viswanathan for being constant pillars of support during the two years of my studies.

Usha Viswanathan

(5)

4

ABSTRACT

This literature review explores the current state of Information Systems Security in developing countries and suggests a way forward. A systematic literature review was conducted utilizing the approach suggested by Okoli and Schabram (2010). In total 41 articles were evaluated, 17 of which were analysed as part of the review. Although developing countries are gaining the technology they still lack the infrastructure, education and availability of skilled manpower. The research showed that while most of the technologies created are for the organisations in the developed world, developing countries blindly implement the same technology without considering their own limitations resulting from lack of resources combined with unique cultural and social set-ups.

KEYWORDS

Literature review, Information Systems Security, Developing Countries, Cyber Security, Technology

(6)

5

ABBREVATIONS

ICT Information and Communication Technology IS Information Security

ISS Information Systems Security IT Information Technology

(7)

6

T ABLE OF C ONTENTS

COPYRIGHT ... 2

ACKNOWLEDGMENTS ... 3

ABSTRACT ... 4

KEYWORDS ... 4

ABBREVATIONS ... 5

CHAPTER 1: INTRODUCTION ... 8

1.1 What is Information Systems Security? ... 9

1.2 ISS in the context of developing countries ... 9

1.2 Problem Area ... 9

1.2 Motivation ... 11

1.3 Research Objective ... 12

1.4 Assumptions ... 12

1.5 Delimitations ... 12

CHAPTER 2: METHODOLOGY ... 13

2.1 Literature Review Methodology ... 13

2.2 Search For the Literature ... 14

2.2.1 Literature Search ... 14

2.2.2 Search Results ... 15

2.2.3 Practical Screen ... 15

2.2.4 Quality Appraisal ... 16

2.2.5 Analysing the Data ... 18

CHAPTER 3: FINDINGS ... 21

3.1 Legislation ... 21

3.2 Policy ... 22

3.3 Education ... 25

3.4 Culture ... 26

3.5 Dependencies ... 28

CHAPTER 4: DISCUSSION ... 29

CHAPTER 5: CONCLUSION & FURTHER RESEARCH ... 31

REFERENCES ... 34

APPENDIX 1: Screening of Literature 38

(8)

7

...

LIST OF FIGURES

Figure 1: A sample of the search results ... 15

Figure 2: Literature Overview... 16

Figure 3: Timescale of publications ... 16

Figure 4: Analysis of Relevant Literature ... 17

Figure 5: Analysis of Relevant Literature by Type of Publication ... 17

Figure 6: Analysis of Relevant Literature by Year of Publication ... 18

Figure 7: Screenshot of NVivo workspace ... 19

(9)

8

CHAPTER 1

INTRODUCTION

1.1 What is Information Systems Security?

Information Systems Security (ISS) is the protection of information and other critical elements both hardware and software from unauthorized use, access, disclosure, disruption, modification or destruction so as to ensure the confidentiality, integrity and availability of the information being stored (Whitman & Mattord, 2011; ISACA, 2008). ISS is the collection of activities that protect the information system and the data that is stored within it (Kim &

Solomon, 2010). ISS could also be defined as a process of protecting the intellectual property of any organisation (Pipkin, 2000).

The practice of Information security (IS) is critical and has been around for some time.

In the early 1960s IS was mainly about the physical security of information but as the Internet was born and the ability to connect networks to networks emerged, securing information has become more complex. With the advances in technology, the dependence on electronic transactions and communications has increased (Kankanhallli et. al, 2003). With that said, the necessity of securing information physically has shifted to securing information technically.

Nowadays, an information system consists of the hardware, operating systems and application software that work together to collect, process and store data for individuals and organisations (Kim & Solomon, 2010). These information systems play a vital role in supporting business operations, managerial decision making and strategic competitive advantages, and it is the framework around which today’s knowledge based organisations are formed (Adeleye et. al, 2004).

(10)

9

While, organizations are increasingly relying on information systems to enhance business operations and facilitate management decision-making (Kankanhallli et. al, 2003), the ability to implement efficient ISS, requires increased financial resources and also people who have the skills and the abilities to implement various security measures to protect these electronic assets. Together with the fact that the internet today is used not only by organisations to increase their competitiveness, but also by criminals, ISS is crucial to protect and ensure the safety and integrity of the assets at hand (Rezgui & Marks 2008).

1.2 ISS in the context of developing countries

The growth of information systems has come together with the advancements in Information Technology (IT) and these two are in a way reliant on one another. Today we are practically dependent on IT Networks and, the development of these networks has led us to an information revolution. The methods of creating and sharing knowledge have become dependent on concrete and stable IT Networks. Developing countries should not be left out of this information revolution and measures need to be put into place to address the digital divide between different nations.

Information systems have transcended organizational and national boundaries and now support both global economic and political activities (Avgerou, 2008), it is no surprise that countries, both developed and developing, must be vigilant and take necessary steps to protect their information assets.

Developing countries compared to developed countries, have their own bespoke limitations. Developing countries lack resources, technical and scientific capabilities to develop and implement modern information systems (Avgerou, 2000). Also, there appears to be a lack of local context in adapting the global IT-based practices while implementing them in developing countries (Bada, 2002; Sahay & Avgerou, 2002). It is important that these problems do not prevent developing countries from acquiring the capabilities for using new ICT applications, so that they can participate in the global information society (Mansell, 1999).

1.3 Problem Area

(11)

10

In a developing country, health and education systems are poor and technological innovation is scarce. Developing countries have far more pressing issues which make the implementation of adequate IS measures less important. Simply providing information and communication technology (ICT) to developing countries will not solve their problems, while providing new technologies to people who do not have the knowledge or skill to manipulate, it is meaningless. As rightly pointed out by Ahmad, in developing countries, IT is developing faster than the knowledge, skill and awareness of the people (Ahmad, 2007). That is to say, implementation of sufficient ISS goes hand in hand with raising the awareness and educating the people who will be using it. It is therefore paramount that the implementation of ISS in developing countries is instigated in hindsight of other pressing issues the countries might be facing.

In an article published in the New Scientist, it is clear to see that the lack of IS within developing countries is a concern. In this article it was noted that a current worry among computer security experts is the legal vacuum within developing countries. This vacuum is a vulnerability which might make developing countries susceptible to cyber crime (Reilly, 2007). The lack of legal backdrop relating to IS or even Internet usage can be a burden, not just for the developing countries, but for many other developed nations. If a hacker is indeed based in a developing country where there are no laws in relation to Internet usage, it would be troublesome for developed countries that might consequently become targets.

In another article published by the BBC in 2009, it is clear to see how people in Africa are now using their mobile phones to do all their money transactions (Greenwood, 2009). It is therefore obvious that the effortless and simple things that the Internet can be used for is being grasped by developing countries. As such, the governments need to act and begin implementing robust IS measures before vulnerabilities are attacked.

In order for developing countries to progress, it is important that the issue of IS is addressed seriously and sufficiently. According to the Insight Report on Global Risks by World Economic Forum, Cyber-attacks are the 4th highest Global risk in terms of likelihood.

Given this figure together with the borderless nature of today’s information, in order for solutions to work, all nations must act together. With nearly 80% of the world's population

(12)

11

living in developing countries (Alfawaz et. al, 2008), good security measures would lead to trustworthiness and thereby more business opportunities and further economic growth for the developing nations.

The problem area driving the research for this literature review is the current state of knowledge with regards to ISS within developing countries. It is clear that plenty of research has been done been in this field but each piece of work seems to look at a different aspect of IS within developing countries. It is difficult for researchers, businesses, governments or nations to clearly understand the current situation as there seems to have been little effort to combine all the relevant studies into one single holistic viewpoint and it is this problem which this review will address.

1.4 Motivation

While searching for the research on information systems in general, Chrisanthi Avgerou made a striking argument. That is that the nature of research happening in developing countries is well understood by only by a limited group of people who are aware of the social, cultural and infrastructure limitations of the developing world (Avgerou, 2008).

Furthermore, a study noted that IT in developing countries is generally under- represented in the open literature and while a few publications concede that there can be major issues with transitional countries developing their systems, the subject is not treated in any depth or breadth (Alfawaz et. al, 2008). Also, in a study conducted by Whitman, the top two threats faced by IS were deliberate acts of espionage and trespass (Whitman, 2003). This is perhaps another reason why developing countries, although faced with other pressing issues, should make securing their information assets a high priority.

For developing countries to gain the same degree of trust they must be able to show that they too have sturdy security measures in place protecting their assets and are ready, knowledgeable and capable. Furthermore, if developing countries are to be able to grow their economy, improve their health services, education and other services to become an industrialised and developed nation, they will need to address the IS and IT vulnerabilities that they face.

(13)

12

The current state and growth of ISS is of significant importance. In order to assist or advise developing nations on implementing robust ISS measures, one must understand where the developing countries are and where they should be going in terms of technological advancements. Countries which fail to embrace and use Information Technology will suffer significant disadvantages in the form of information poverty that could further widen the gap in economic status and competitiveness (Ndou, 2004). It is also important that developing countries are given focus and assisted in their efforts of developing their ISS in order to catch up with industrial nations and improve their prospects.

1.4 Research Objective

The purpose of this study will be to conduct a comprehensive literature review of ISS in the context of developing countries. The aim is to assess the literature currently available from an analytical standpoint. Given that this is a current topic and there are various different documents that set out what should be done, how it should be done and where the gaps might be, the goal of this study is to evaluate the current available literature with the view of identifying areas of research while providing a holistic viewpoint of the current situation and providing some recommendations in terms of further research.

1.5 Assumptions

This literature review will be carried out with the assumption that there is a lack of research in this area i.e. in relation to ISS in the context of developing countries.

1.6 Delimitations

This study will only be reviewing published research, in English, which is accessible through the Internet. It is also worth noting that in order to prevent the research from overrunning, a time limit was set for the various stages of data collection and also evaluation.

(14)

13

CHAPTER 2

METHODOLOGY

2.1 Literature Review Methodology

This literature review will be based on a qualitative approach and the methodology will be loosely tied with the eight step plan to conduct a literature review suggested by Okoli and Schabram (2010). Considering the complexity of the topic and the time available, the research will be guided by the following five step process:

Step 1: Define the purpose of literature review

The purpose of this literature review is to highlight work that has been carried out by other researchers in this field. The review will seek to identify, the areas where extensive research is carried out and the fields which are yet to be explored extensively.

Step 2: Collect the relevant literature

In this step, we plan to collect information from various sources like journal papers, conference proceedings, articles etc. We expect a major source of this information will be obtained from the Internet.

Step 3: Do quality check and group according to the theme

A checklist will be created that will help us decide upon the quality of the collected resources. After the quality check, the information resources will be grouped according to themes that are amassed in the process of the review.

Step 4: Evaluate the collected data

Once the relevant information is grouped, the resources will be critically

(15)

14

evaluated and compared. The fields where extensive research has been conducted will be identified while other fields where research still needs to be done will be identified.

Step 5: Report submission with relevant conclusions and suggestions

The findings of the research will be presented in a report. The report will present the length and breadth of the current research in the field of information security in the context of developing countries as well as scope for further research.

2.2 Searching For the Literature

2.2.1 Literature Search

To help ease and narrow down the process of the literature search, a number of research questions were put together. While the aim of the review is to put forward a holistic viewpoint in terms of the current knowledge relating to ISS in developing countries, the following research questions were used as a backdrop and to help maintain the focus of the review:

1. What are the setbacks or vulnerabilities affecting developing countries in terms of ISS?

2. What considerations need to be made in terms of the future aspirations of developing countries??

(16)

15

2.2.2 Search Results

A key part of this stage was to identify the relevant literature. The literature search was carried out primarily via the databases available at the Luleå University of Technology Library as well as Google scholar. The search was focused on finding existing research that is relevant to this study. Books and newspaper articles were omitted from the search. This was mainly because we sought to include only academic research. In addition, we narrowed the search down even more by including only peer reviewed journals, articles and conference proceedings. The idea was to prioritise quality over quantity.

Figure 1: A sample of the search results

Search keyword EbscoHost Scopus IEEE Explore Google Scholar

Information Security, Developing Countries

15 846 233 1320000

Cyber Security, Developing Countries

4 8 7 16500

2.2.3 Practical Screen

Once this initial stage was complete, the search results were scanned to find the most relevant studies for this review. To do this, the following 3 questions were used for general guidance:

1. Is the title of the document related to the topic of this review?

2. At first glance, does this document appear to be an academic study?

3. When was this document published?

In total we were able to obtain 41 articles that we felt were applicable to our topic. As shown in the graph below, the majority of the selected documents were published in journals while the remainder were made up of a selection of conference proceedings, articles, implementation reports as well as 2 academic theses.

(17)

16

Figure 2: Literature Overview

Out of the 41 articles that were selected for this review, the majority were published after 2000. This is understandable given that ISS in developing countries is still an emerging field; nevertheless, we felt the need to include 2 documents that were published prior to 2000 as they were considered pertinent to this study.

Figure 3: Timescale of publications

2.2.4 Quality Appraisal

Following on from the practical screening, the 41 articles were examined in further detail to determine their quality and if they were suitable for inclusion in the review. That is, the abstract and the summary of the articles were scrutinised and only those that met a set of predefined criteria were put aside for the next phase of the review. The predefined criteria were as follows:

1 5

31

1 1 2

0 5 10 15 20 25 30 35

Articles Conference Proceedings

Journal Papers Implelemtation Report

Editorial Introduction

Thesis

Number of Publications

Type of Publication

1 1 1

4 4 9

1 3

1

3 3

2 2 1

5

0 2 4 6 8 10

1992 1999 2000 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013

Number of Publications

Year of Publication

(18)

17

1. The document had to be related to developing countries, and, 2. The document had to be related specifically to IS.

Out of the initial 41 articles that were selected, 17 were able to fully meet the aforementioned criteria, while 23 were related to developing countries but not IS and 1 was found to be related to IS but not developing countries. A comprehensive list setting out which documents met which criteria can be found in Appendix 1.

Figure 4: Analysis of Relevant Literature

From the 17 articles which were selected and considered relevant for inclusion in the review, 11 were Journal papers and the remainder were made up of a selection of conference proceedings, theses, and an implementation report all of which were published between 2004 and 2013.

Figure 5: Analysis of Relevant Literature by Type of Publication 23

1

17 Related to Developing Countries but not

information security

Related to Information Security but NOT developing Countries

Rlated to BOTH

11

2 3

1 0

2 4 6 8 10 12

Journal Paper Thesis Conference Proceedings

Implementation Report

Number of Publications

Type of Publication

(19)

18

Figure 6: Analysis of Relevant Literature by Year of Publication

2.2.5 Analysing the Data

Once the initial phases of the literature review were complete, the next step was to analyse the 17 articles that were selected in the Quality Appraisal. Given the quantity of data that was gathered, the grounded theory approach was used as a backdrop to examine and scrutinise the data. That is to say, grounded theory data analysis techniques were borrowed and loosely followed in analysing the data.

Developed by Glaser and Strauss (1967), grounded theory is a set of iterative techniques designed to identify categories and concepts within text that are then linked into theoretical models (Corbin & Strauss, 2008). This approach was seen as most suitable for evaluating the data as it was systematic yet flexible in nature. It allowed the data to be evaluated in an open manner and also for themes to be created as the data was examined and the review progressed.

To assist in the evaluation, qualitative research software was used. This allowed for the data to be managed, and provided the necessary workspace and tools to easily work through the information. Given that there were two of us working on this review, both based in different locations, we felt that Nvivo would help in keeping track of the analysis and also to ascertain that we were using the same coding patterns.

4

1 1 1

2

3

2 2

1

3

0 1 2 3 4 5

2004 2005 2006 2007 2008 2009 2010 2011 2012 2013

Number of Publications

Year of Publication

(20)

19

Figure 7: Screenshot of NVivo workspace

To maintain consistency throughout the review, we divided the 17 articles between us and commenced the work by scanning the documents independently. While screening and coding, the following themes emerged:

 Policy – this included anything in the dataset relating to polices

 Legislation – this included anything in the dataset relating to laws or legal frameworks

 Education – this included anything in the dataset relating to the education, skills and awareness of the people

 Culture – this included anything in the dataset relating to the cultural or social factors that might be influencing the implementation of efficient ISS

 Dependencies – this included anything in the dataset that was considered relevant in terms of positively or negatively influencing ISS but did not fit into any of the 4 main categories.

It is worth noting that the process of selecting and coding relevant text throughout each

(21)

20

document was done repeatedly and exhaustively until it was evident that there was no more data available that could be included in the respective codes. The data that was coded was then individually extracted into separate word documents allowing for the text to then be structured accordingly. On a positive note, software always linked extracted data back to its original source which made for easier and more concise referencing.

(22)

21

CHAPTER 3

FINDINGS

3.1 Legislation

The formation of a concrete legal framework relating to information security systems in developing countries is still somewhat lacking and more needs to be done to address this issue. In fact, many developing countries have yet to consider adopting adequate legislation related to information security management, laws that criminalize cyber attacks and enable police to adequately investigate and prosecute such activities (UN, 2005).

The lack of laws and legal frameworks means that not only are developing countries limited in taking action against intruders who are targeting their information assets but also against intruders who might use their country’s information network as a base to perform illegal activities globally (Alfawaz et. al, 2008). While IS laws exist in some developing countries, these need to be enhanced to effectively address the legal challenges of the present borderless cyber environment (Shamir b Hashim, 2011).

While little research has been done on the overall situation surrounding IS legislation within developing countries, one can draw some form of understanding from the fragments of studies that have been done. For instance, Rezgui et al. noted, users were unaware of IS legislations (Rezgui et al, 2008), while a case study in Tanzania found that that the country was lacking the necessary legal framework to assist in ICT security issues and controls (Bakari et.al 2005). Other studies found that some developing countries do not have laws or regulations which could be used to take action against the misuse of ICT resources (Aljifri et al., 2003; Shalhoub, 2006). Similarly, another work found that in many developing countries, e-business and e-Government laws were not yet available (Ndou, 2004).

Although some of these findings are not directly in relation to ISS, they are somewhat reliant on one another. Information’s systems security is made up of both information and the systems required to protect it. As most information is held electronically and on IT systems,

(23)

22

the security of the information has to encompass the legislation regarding the attainment of the data as well as the storage and onward distribution of the data. Throughout this process of ISS, people need to be aware of what is allowed and what not (Bakari et. al 2005) is. As highlighted by Zareen et.al, the main problems brought about by cyberspace are the lack of universal understanding of the rules, regulations and laws in relation to it (Zareen et.al, 2013).

For example, even in the US some police departments lack the necessary skills to tackle cyber crimes (Computer Crime Research Center, 2014). The situation is no better in developing countries. In a crime investigation in India, a police officer seized the hacker's computer monitor as the evidence. While in another instance the police seized the CD-ROM drive of the hacker (Aggarwal, 2009). All these instances point to the low awareness of law enforcing officials.

Furthermore, even though many developing countries have the necessary laws and regulations in place, there are not enough lawyers, judges and other officials who understand cyber crimes. An article noted that out of a total of 4,400 police officers in Mumbai, there are only five who work in the field of cyber crime (Duggal, 2004). This article also points out some of the loop holes in “India's IT Act 2000”, like cyber theft, cyber stalking, cyber harassment and cyber defamation are presently not covered under the act. In addition, while cyber attacks originate in overseas locations (normally in developing countries), the local police stations where the victims are located, do not have the power to make an arrest (Computer Crime Research Center, 2014).

It is clear that legal reforms particularly within developing countries, must also allow room for national culture. As will be discussed in section 3.4, national culture is an important backdrop for the implementation of ISS in developing countries. The national culture is unique to each country and so creating a legal framework that is adaptable to the nation is fundamental. In fact, even though the country has a judiciary system, culture may take precedent over the law sometimes (Rezgui et al, 2008).

3.2 Policy

While ensuring a legal framework to help prevent people from abusing the information system in place, policy is perhaps just as important. Policy provides a solid foundation for

(24)

23

any ISS. According to the British Standards Institute, the IS policy of any organisation is made up of the processes and procedures that the employees of the organisation should follow in order to protect the confidentiality, integrity and availability of the information assets (British Standards Institute, 1999).

In simpler terms, a security policy incorporates a set of clear guidelines to which people should adhere. In the field of ISS, and perhaps for any other field, simply having policies is not adequate. Proper steps need to be taken by the organisations to ensure that the policies are being implemented. It is only when people in organisations are aware of the IS policies and fully comply with them that an affluent IS culture can be created (Alnatheer, 2003).

While it may seem like a straightforward task, researchers argue that many organisations find making employees comply with the security policies to be a major challenge (Beautement et al., 2008). Furthermore, Adams and Sasse found that organisations have to constantly monitor and impose the employee behaviour for policy compliance (Adams & Sasse, 1999).

One of the examples which brings out the importance of security policies is the Security Breach at TJX, in 2005. In this security breach, around 45.6 million credit and debit card numbers were stolen from the companies system over a period of 18 months. Around 40 million records were compromised at Card Systems Solutions. The company also announced that the payment systems were assessed illegally and the attackers made off with card data belonging to a number of customers. When analysed, the security breach brought to light many security lapses. Amongst them was the lack of a coordinated security policy, and that the policies in place were not being followed (Ayyagari & Tyks, 2012). This was a case that happened in the United States of America, a developed country where information systems are well developed; with strong legal foundation, infrastructure and resources. Developing countries with their limitations are at a higher risk.

Although the importance of IS policies are evident, developing countries are lacking in both the creation and the implementation of adequate policies. For example, research found that the business sector in Thailand overlooked IS, and not surprisingly only a very few businesses in Thailand had any supporting security policies in place (Vorakulpipat et.al, 2010). Similarly, research into the educational sector in Tanzania and the United Arab Emirates confirmed that there were no IS policies in place, in the respective educational

(25)

24

institutions where the studies were conducted (Bakari et.al, 2005; Rezgui et. al 2008). Also, in two separate studies - one from Nigeria and another from Kuwait - relating to information systems outsourcing (where the task of ensuring the systems security was contracted to a third party), it was found that even though management were well aware of the risks involved, there was no structured outsourcing strategies or security policies in place (Adeleye, 2004; Khalfan, 2004).

One possible reason why IS policies are lacking is perhaps the allocation of responsibility. For instance, a study in Tanzania showed that IS policies were seen as the responsibility of the IT department or merely as a technical issue (Bakari, 2005), while another research highlighted that IS responsibilities stopped at technical controls and so no security policies were in force. (Tarimo, 2006).

Without the proper backing of IS policies, security breaches which result in monetary losses can easily happen (Solms, 2013). Developing countries, whose frail economies are very much dependent on the well being of its various organisations; cannot withstand such losses (Raynard et. al 2002). Encouragingly, it appears that some developing countries are slowly moving in the right direction. In Malaysia, the National Cyber Security Policy (NCSP) provides the perspective of how cyber security should be implemented in an integrated manner (Shamir b Hashim, 2011). Nowadays, the economic competitiveness of countries depends on two important assets: information and knowledge.

Most organisations are catching up with the developments such as internet banking, e- government, e- commerce, etc. In this process, organisations as well as governments are putting forth a lot of sensitive data online. These progressions form part of the critical information infrastructure of the country and protecting them is critical. Von Solms argues that given the importance of these advances combined with the lack of security awareness (discussed in section 3.3), Parliaments, which are the highest bodies elected by citizens, should oversee the county’s cyber health and assist in creating policies relating to ISS. In other words, while organisations should each have their own policies, the threat posed by cyberspace is something that should be overseen by an overarching national cyber policy which would help ensure the protection of the country’s overall assets (von Solms, 2013).

(26)

25

3.3 Education

Even if developing countries had a sound legal framework and robust policies, little can be achieved if the people are not educated about the risks associated with ISS and taught the skills required to attain optimum IS. Developing countries unlike the developed countries face a unique problem in that they have not had a gradual exposure to cyberspace. In developing countries, a whole new generation is growing up venturing directly into cyber space via mobile devices without being made aware of the potential risks of using the internet (von Solms, 2013).

For example, in 2004, a British based technology research firm Infosecurity, did a survey with nearly 200 average workers who were using the subway to commute to work. It showed that over 70 percent were ready to divulge their business password to a complete stranger in exchange for a candy bar. Another Infosecurity survey in 2003, found that 90 percent of workers will give out their password for a free pen (Wade, 2004).

Several researchers have acknowledged that the human factor plays a significant role in information system security (Parker, 1998, 1999; Siponen, 2000, 2001; Alnatheer, 2012). It is without doubt that the awareness of the people is critical to the success of ISS (Shamir b Hashim, 2011). In fact, research has found that one of the top threats for IS is the errors committed by employees ( von Solms et.al 2004; Whitman & Mattord, 2005).

Although awareness among employees is low, little effort is being made to improve the situation (von Solms et. al, 2004). This tendency to ignore instead of tackling, was evident in several other studies (Katz, 2005; Tarimo, 2006; Rezgui et. al, 2008). Similarly, research on information systems outsourcing in private and public organisations in Kuwait claimed that, one of the important driver for outsourcing, even though the management was well aware of all the risks involved; was the lack of security awareness (Khalfan, 2004).

It is obvious that Information and Communication Technology (ICT) plays an increasingly important role in all walks of life, be it in education, business or government matters (e-governance). Developing countries are also embracing ICT at a fast pace, so it is

(27)

26

only natural that developing countries must engage in educating the people and raise their awareness about the threats related to information systems. Developing countries generally lag behind in the modern education system. Insufficient training can lead to misuse of the electronic processes hindering the potential benefits that might be attained if used safely.

Research highlights the need for people to be educated not only in terms of technical abilities, but also the non-technical issues such as safeguarding an organisation’s or a country’s sensitive information (Alfawaz, 2008).

Researchers agree that the development of human skills and capabilities through education and training is very important (Ndou V, 2004; Alfawaz S, 2008; Rezgui, et. al 2008). British Standards Institute recommends the promoting of security awareness through education and training which can help users of IS systems, be aware of potential threats (BS7799, 1999). These awareness programs must make users aware not only the security risks and remedies, but also the organisation’s IS security policy (Rezgui et. al 2008). Of course education and training programs will definitely increase the security awareness of users, but organisations should aim for a security culture where users are aware of all the security issues and are capable and skilled enough to make appropriate decisions (Niekerk &

Solms, 2005; Tarimo, 2006).

3.4 Culture

Combined with the struggles brought about by limited legislation, insufficient policies and lack of skills in the field of ISS, developing countries are also faced with the citizen’s resistance to change. While one could argue that organisational culture is autonomous to national culture, Hofstede argued that organisational cultures are nested within a national culture (Hofstede, 1984). That is to say that national culture influences peoples practices and thereby their organisational behaviour.

Alnatheer conducted an exploratory study in IS culture in Saudi Arabia, and found that national culture played a vital role in encouraging people to adopt new ways of working as well as accepting and adjusting to new technologies (Alnatheer, 2013). Transferring technology created abroad and putting it into practice at home creates numerous cultural and social issues (Ndou, 2004).

(28)

27

According to Alfawaz et. al, one reason why organisations regularly encountered this internal resistance, particularly when implementing new technological systems, is the view by employees, that this change is a potential threat to their jobs (Alfawaz et. al, 2008). This was also noted in the work of Ndou, who found that resistance was driven by the fear of possible job losses due to traditional jobs being taken over by technology, the fear that technological advancements would lead to loss of income from bribes, and also the apprehension posed by the possible new work practices that they would need to adhere to (Ndou, 2004).

For example, Rezgui et al, in their study on IS awareness in higher education, sought to investigate the different IS threats, faced by a typical higher education institution within the context of a developing country (Rezgui et al, 2008). The focus of the study conducted was Zayed University. Zayed University is based in the United Arab Emirates, and although founded on an educational model from the west, it is embedded within a conservative environment which is rooted in the deep cultural and religious beliefs of its surrounding environment. The findings of the study indicated that in general, IS threats were similar to those conveyed in similar investigations in developed countries (Updegrove and Wishon, 2003). The difference however was the perceived causes and sources of these threats together with the ways in which these threats were dealt with. In particular, it was found that the majority of threats were assumed to be external and not in any way connected to university employees or its resources.

While IS awareness is crucial to the overall security of an organisation, it must be addressed in hindsight of the national culture. Similarly, while policies and legal frameworks are the foundation for effective IS system, little can be achieved without the full fledged support and eagerness of the people. The difficulty in addressing the cultural obstacles hindering the implementation of a valuable information system is that each country has a unique culture. Every county has its own culture that subsequently influences the behaviour of the people. Research finding cannot be generalised to other developing countries since national culture affects IS culture in a distinctive way (Alnatheer, 2013).

(29)

28

3.5 Dependencies

Apart from the above mentioned factors there are other factors which influence the security of information systems. Zareen et. al pointed out that mostly software and hardware systems are manufactured in developed countries and developing countries do not have any control over the security of these components (Zareen, et. al, 2013). Another argument presented by Kshetri, is that ICT components developed in developed countries are adapted to meet the local conditions of developing countries. Most ICT products are the low cost versions and lack the advanced features as it makes them expensive (Kshetri, 2010). These all are critical drawbacks, when we consider the information systems security in developing countries.

(30)

29

CHAPTER 4

DISCUSSION

Although there appears to be a sense of desire and will to achieve a satisfactory level of IS, it is evident that ISS in developing countries is lagging behind. For the implementation of efficient and properly functioning IS systems, particularly in developing countries, there is a basic need for a clear and sound foundation that is built upon lucid policy and transparent legislation. However, there is also a need to educate the people, not only in using new advanced technologies, but also on the risks that these new technologies create. Furthermore, there appears to be a barrier that must be overcome and that is the cultural and social hindrance created as a result of implementing more technical solutions to rather traditional nations.

In carrying out the review, four reoccurring themes or factors were identified – legislation, policy, education and culture. While each of these factors was looked at individually, one finds that there is a lack of overall common goals, uncertainty and perhaps some chaos amongst everything else.

For instance, research suggested that although awareness of the people is a problem, little was being done to address this issue. At the same time, some countries are choosing to outsource the management of their IS to more capable companies instead of addressing the lack of awareness within their own organisation. Understandably, the path to achieving adequate ISS is not easy flowing, and in a way, on completing this review, there is a sense that there are no ground rules to follow and decisions are being made on the go. There does not seem to be a clear direction or a defined goal in terms of what the country (s) would like to achieve.

Of course, some countries have attempted to make progress, the UAE with its introduction of new laws and Malaysia with its defined cyber policy. While these might seem like small steps to the developed world, they are applaudable advancements for the developing countries. Nevertheless, this is still a fraction of what needs to be done.

While organisations and businesses seem to take the brunt of the disarray caused by the

(31)

30

lack laws, policies and awareness, it is evident that bottlenecks still exist. The Governments of developing countries must do more to make the changes happen. As mentioned in Chapter 3, without the proper backing of ISS, breaches which could result in financial losses can easily happen and this could be a huge burden for the frail economies of developing countries.

(32)

31

CHAPTER 5

CONCLUSION &

FURTHER RESEARCH

The driving force behind this literature review was the uncertainty in regards to the current state of ISS within developing countries. The overall aim of the review was to evaluate the current available literature with the view of identifying different areas of research while providing a holistic viewpoint of the current situation and providing some concrete recommendations in terms of further research. In the initial phases of the review, 41 articles were identified as being relevant to the review. However, after further analysis 17 articles were included in the final stages of the review. Once these articles were studied, four common themes were established. These were legislation, policy, education and culture.

While analysing the findings of the review, it is worth reiterating that information systems security is made up of both information and the systems required to protect it.

Basically ISS is same technologically in both developed and developing nations, but it is the environmental factors which affect the implementation.

The overarching research questions that were used as a backdrop during the course of the review were:

1. What are the setbacks or vulnerabilities affecting developing countries in terms of ISS?

This review found a number of different factors that are hindering the progression of developing countries in terms of IS. To begin with, developing countries are lacking a concrete legal framework in relation to ISS. The laws are not fully established and in some instances, were the laws do exist, users were unaware of them. Secondly, developing countries do not have enough (if any) adequate IS policies in place. Even when policies have been drafted and put into place, they tend to be overlooked (perhaps because they are not seen as important). Thirdly, IS awareness amongst the people and in general, employees is low. Even so, little is being done to improve the situation or address the issue. The tendency

(33)

32

to ignore the problem (of lack of awareness amongst the people) instead of tackling it was evident in many studies. Finally, one of the toughest setbacks faced by the developing countries was viewed to be the resistance of the people, sustained by strong and unique national cultures. While several reasons were identified as the possible basis of the resistance (for instance the threat to jobs), addressing and moulding ISS to each particular nation’s culture is complex. Nevertheless, while each of these factors could be identified separately, they are indeed interrelated to one another and whilst it would be easier to address each of them individually, they must each be considered together but separately for each developing country.

2. What considerations need to be made in terms of the future aspirations of developing countries?

In terms of legislation, it is clear that developing countries are in need of some legal reforms in relation to ISS; however, these must be implemented while also educating the citizens on their importance and in hindsight of the national culture. In addition, employees and also the general public, should be educated not only in terms of technical skills and abilities, but also on the non-technical issues such as safeguarding an organisation’s or a country’s sensitive information. Furthermore, more consideration and effort needs to be given to the creation and implementation of acceptable policies – both as nation and also as an organisation. Policy makers should show sensitivity towards local realities and should consider different alternatives, before implementing any new technologies. IS is a global responsibility and is not merely a technical issue. It encompasses all four factors that were identified in this review namely legislation, policy, education and culture. Finally, it is paramount that the threat posed by cyberspace is overseen by an overarching national cyber policy under the national parliament, which would help ensure the protection of the country’s overall assets.

This paper in general contributes to the open literature. It also assists ICT policy developers in developing information security systems which are more sensitive to the unique cultural background, which are so typical of the developing nations.

Further research

In terms of further research, it is suggested that the developing countries are examined

(34)

33

more closely in terms of their social culture and its impact on ISS. It is also advised that, given the lack of research in this field, more is to be done to examine each individual factor outlined in this review.

(35)

34

REFERNCES

Adams, A., & Sasse, A. (1999). “Users Are Not The Enemy: Why users compromise security mechanisms and how to take remedial measures.” Communications of the ACM, 42(12), pp 40-46.

Adeleye, B. C., Annansingh, F., & Nunes, M. B. (2004). ”Risk management practices in IS outsourcing: an investigation into commercial banks in Nigeria.” International Journal of Information Management, 24(2), pp 167-180.

Aggarwal, V. (2009) “Cyber crime’s rampant. “ Express Computer. Retrieved from http://computer.financialexpress.com/20090803/market01.shtml, on 30 May 2014.

Ahmad, A. A. (2007). "Evaluating the security controls of CAIS in developing countries: an empirical investigation." Information management & computer security, 15.2, pp 128-148.

Ahmad, A. A. (2004). “Investigating the Security Controls of CAIS in an Emerging Economy: An Empirical Study on Egyptian Banking Industry.” The Journal of Managerial Auditing, UK, Vol. 19 (Iss. 2), pp 272–302.

Alfawaz, S., May, L. J., & Mohanak, K. (March, 2008). “E-government security in developing countries : a managerial conceptual framework.” International Research Society for Public Management Conference, Brisbane.

Alnatheer M. A. (2013). “Understanding and Measuring Information Security Culture in Developing Countries: Case of Saudi Arabia.” Research thesis submitted at Queensland University of Technology, Brisbane, Australia.

Avgerou, C. (2008). "Information systems in developing countries: a critical research review." Journal of information Technology, 23.3, pp 133-146.

Avgerou, C. (2000). “Recognising Alternative Rationalities in the Deployment of Information Systems”. The Electronic Journal on Information Systems in Developing Countries, 3, 7, 1-15.

Ayyagari, R., & Tyks, J. (2012). “Disaster at a University: A Case Study in Information Security.” Journal of Information Technology Education: Innovations in Practice, Volume 11, pp 85-96.

Bada, A. O. (2002). “Local Adaptations to Global Trends: A Study of an IT-Based Organizational Change Program in a Nigerian Bank.” The Information Society, 18, pp 77–86.

Bakari, J. K., Tarimo, C. N., Yngstrom, L., & Magnusson, C. (2005). ”State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study. Fifth IEEE International Conference on Advanced Learning Technologies (ICALT), pp 1007-1011.

Baskerville, R. (1993). “Information systems security design methods: implications for information systems development.” ACM Computing Surveys (CSUR), 25(4), pp 375-414.

Beautement, A., Sasse, M. A., & Wonham, W. (2008). “The Compliance Budget:

Managing Security Behavior in Organizations.” Proceedings of the 2008 workshop on New security paradigms (NSPW), pp 47-58.

British Standards Institute. (1999). Information Security Management- BS 7799- 1:1999. London: BSI.

(36)

35

Computer Crime Research Center. (2014). “Police Grapple With Cybercrime.”

Retrieved from http://www.crime-research.org/news/29.04.2014/3966/, on 10 June, 2014.

Corbin, J., & Strauss, A. (2008). Basics of qualitative research: Techniques and procedures for developing grounded theory. Thousand Oaks, CA: Sage.

Duggal, P. (2004). “What's wrong with our cyber laws?” Express Computer. Retrieved from http://computer.financialexpress.com/20040705/newsanalysis01.shtml, on 30 May 2014.

Edoh, T. O., & Teege, G. (2011). “Using Information Technology for an Improved Pharmaceutical Care Delivery in Developing Countries. Study Case: Benin.” Journal of medical systems, 35(5), pp 1123-1134.

Glaser, B., & Strauss, A. (1967). “The discovery of grounded theory: Strategies for qualitative research.” New Brunswick, NJ: Aldine Transaction.

Greenwood, L. (2009). “Africa's mobile banking revolution.” BBC News. Retrieved from http://news.bbc.co.uk/2/hi/business/8194241.stm, on 20 March, 2014

Heeks, R. (2002). “Information systems and developing countries: Failure, success, and local improvisations.” The information society, 18(2), pp 101-112.

Hofstede, G. (1984). “Culture’s Consequences: International Differences in Work Related Values.” Beverly Hills: Sage Publications.

International Organization for Standardization. (2005). ISO/IEC 17799, information technology – code of practice for IS security management. 2nd ed. ISO.

ISACA. (2008). Glossary of terms, 2008. Retrieved from http://www.isaca.org/Knowledge-Center/Documents/Glossary/glossary.pdf, on 10 July, 2014.

Jacques, C., & von Solms, R. (2013). “A Model for Information Security Governance in Developing Countries.” Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Volume 119, pp 279-288.

Kankanhalli, A., Teo, H. H., Tan, B. C., & Wei, K. K. (2003). ”An integrative study of information systems security effectiveness.” International Journal of Information Management, 23(2), pp 139-154.

Katz, F. H. (2005). “The effect of a university information security survey on instructing methods in information security.” Second annual conference on information security curriculum development, 2005. p. 43–48.

Khalfan, A. M. (2004). “Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors.” International Journal of Information Management, 24, pp 29–42.

Kshetri, N. (2010). “Diffusion and Effects of Cyber-Crime in Developing Economies.”

Third World Quarterly, 31:7, pp 1057-1079.

Kim, D., & Solomon, M. G. (2010). “Fundementals of Information System Security.”

1st edition, Jones and Barlett Publishers Inc. USA.

Mansell, R. (1999). “Information and Communication Technologies for Development:

Assessing the potential and the risks.” Telecommunications Policy, 23(1), pp 35-50.

Ndou, V. (2004). "E-government for developing countries: opportunities and challenges." The Electronic Journal of Information Systems in Developing Countries, 18,1,

(37)

36 pp 1-24.

Okoli, C., & Schabram, K. (2010). "A Guide to Conducting a Systematic Literature Review of Information Systems Research." Sprouts: Working Papers on Information Systems, 10 (26), http://sprouts.aisnet.org/10-26

Okuttah, M. (2009). “ICT experts gear up for war against e-crime”. Retrieved from http://www.businessdailyafrica.com/Company%20Industry/-/539550/655032/-/u75jcqz/-/, on 5 June, 2014.

Parker, D.B. (1998). “Fighting computer crime: a new framework for protecting information.” USA: John Wiley & Sons.

Pipkin, D L. (2000). “ Information Security: Protecting the Global Enterprise.” Prentice Hall.

Raynard, P., & Forstater, M. (2002) “Corporate social responsibility: Implications for small and medium enterprises in developing countries.” Technical report submitted at United Nations Industrial Development Organization.

Reilly, M. (2007). “Beware, botnets have your PC in their sights”. New Scientist, 196, 2634, pp 22-23.

Rezgui, Y., & Marks, A. (2008). “Information security awareness in higher education:

An exploratory study.” Computers & Security, 27(7), pp 241-253.

Sahay, S., & Avgerou, C. (2002). “Introducing the Special Issue on Information and Communication Technologies in Developing Countries.” The Information Society, 18, pp 73–

76.

Shamir b.Hashim, M. (June, 2011). "Malaysia's National Cyber Security Policy: The country's cyber defence initiatives." Cybersecurity Summit (WCS), 2011 Second Worldwide, pp 1-7.

Siponen, M., & Vance, A. (2010). “Neutralization: new insights into the problem of employee information systems security policy violations.” MIS Quarterly, 34(3), pp 487-502.

Siponen, M. T. (2001) “Five dimensions of information security awareness.”

Computers and Society, 31(2), pp 24–29.

Straub, D. W.,& Welke, R. J. (1998). “Coping with systems risk: security planning models for management decision making.” MIS Quarterly, 22(4), pp 441–469.

Tarimo, C. M. (2006). “ICT Security Readiness Checklist for Developing Countries: A Social- Technical Approach.” Research thesis submitted at Philosophy, Department of Computer and system sciences, Stockholm University.

The World Bank. Retrieved from http://www.worldbank.org, on 20 March, 2014.

Thomson, M. E., & Von Solms, R. (1998) “IS security awareness: educating your users effectively.” Information Management & Computer Security, 6(4), pp 167–173.

UN. 2005. Information Economy Report (2005) Retrieved from http://www.unctad.org/ecommerce/, on 20 March, 2014.

Updegrove, D., & Wishon, G. (2003). “Computers and network security in higher education.” EDUCAUSE.

Van Niekerk, J., & von Solms, R. (2005). “Corporate Information Security Education:

Is Outcomes Based Education the Solution? “ International Information Security Workshops,

(38)

37 pp 3-18

Vijayan, J. (2007). “TJX data breach: At 45.6M card numbers, it's the biggest ever.”

Computerworld.com. Retrieved from

http://www.computerworld.com/s/article/9014782/TJX_data_breach_At_45.6M_card_numbe rs_it_s_the_biggest_ever?taxonomyId=17&pageNumber=1, on 10 June, 2014.

Von Solms, B. (October, 2013). “Parliamentary Oversight of Cyber Security and Critical Information Infrastructures in Developing Countries.” Science and Information Conference, London, pp 335-339.

Von Solms, S., & Von Solms, R. (2004). “The 10 deadly sins of Information Security Management.” Computer & Security, 23, pp 371- 376.

Vorakulpipat, C., Siwamogsatham, S., & Pibulyarojana, K. (2010). "Exploring information security practices in Thailand using ISM-Benchmark." Technology Management for Global Economic Growth (PICMET), pp 1-4.

Wade, J. (2004). “The weak link in IT security: what good is cutting-edge network security if your own employees sabotage the system by misake?” Risk Management, vol. 51, no. 6, pp. 32-36.

Weirich, D., & Sasse, M. (2001). “Pretty Good Persuasion: A first step towards effective password security for the Real World.” Proceedings of the 2001 workshop on New security paradigms (NSPW), pp 137-143.

Whitman, M. E., & Mattord, H. J. (2005) “Principles of information security.” 2nd ed.

Thomson.

Whitman, M. E. (2003). “Enemy at the Gate: Threats to Information Security.”

Communications of the ACM, 46 (8), pp. 91-95.

Zareen, M.S., Akhlaq, M., Tariq, M., & Khalid, U. (2013) "Cyber security challenges and way forward for developing countries." 2nd National Conference on Information Assurance (NCIA), pp 7-14.

(39)

38

Appendix 1

Screening of the literature

Article Number

Title Date of

Publication

Type of Publication

Related to developing countries?

Related to information Security?

Include in review

? 1. Introducing the Special

Issue on Information and Communication Technologies in Developing Countries

2002 Conference

proceedings Yes No No

2. Implementing

eGovernment Projects:

Challenges Facing Developing Countries

2009 Conference

proceedings Yes No No

3. E – GOVERNMENT

FOR DEVELOPING COUNTRIES:

OPPORTUNITIES AND CHALLENGES

2004 Journal paper

Yes No No

4. E-Government and Developing Countries:

An Overview -

SUBHAJIT BASU

2004 Journal

Paper Yes No No

5. CULTURE ON THE

ADOPTION OF HEALTH INFORMATION SYSTEM IN DEVELOPING COUNTRIESA REVIEW ON THE IMPACT OF INFORMATION

2013 Journal Paper

Yes No No

6. Basic-needs to globalization: Are ICTs the missing link?

2003 Journal Paper

Yes No No

7. E-government security in developing

countries:

A managerial

conceptual framework

2008 Conference

proceedings Yes Yes Yes

8. ENEMY AT THE

GATE: THREATS TO INFORMATION SECURITY

2003 Article No Yes No

References

Related documents

A related study was performed in [6] for linear state estimators, assuming the attacker has perfect model knowledge.. Here we instead assume the attacker only pos- sesses a

b) Monitoring Source Standard: The Monitoring Source Standard provides for each defined measurable metric the source from which standard/best practice guideline the metric is

The target groups who could get benefits from my research are teachers, professionals, students and researchers in the field of E-learning, information science and informatics.

• I juni attackerades Nintendo i ett försök att dra ut information från dess nätverk, men där verkar attacken vara riktad mot känslig information rörande

Often the first sign of disgruntlement is the onset of behavioral precursors, ob- servable aspects of the insider’s social (non-technical) behavior inside or outside the workplace

(B) A provider of electronic communication service or remote computing service shall disclose a record or other information pertaining to a subscriber to or customer of such

The process couples together (i) the use of the security knowledge accumulated in DSSMs and PERs, (ii) the identification of security issues in a system design, (iii) the analysis

According to Julisch (2013) the organizational aspect represents decisions about security priorities and roles and in this study it refers to national, international and EU cyber