| Peer-Reviewed

Improved Information Security for Enhanced Government Data Privacy at Zanzibar Social Security Fund (ZSSF)

Received: 1 April 2023     Accepted: 24 April 2023     Published: 10 May 2023
Views:       Downloads:
Abstract

The main concern of this study was to explore the strategies for improving information security for enhancement Government data privacy in public sector, Zanzibar Social Security Fund (ZSSF) as case study. Specifically, the explore the effect of restriction of access to information on enhancement Government data privacy in ZSSF, analyses the effect of encryption of all devices on enhancement Government data privacy in ZSSF. Also, the study explores the effect of backup of the office data on enhancement Government data privacy in ZSSF and finally the study analyses the effect of strong password on enhancement Government data privacy in ZSSF. A quantitative research approach was mainly employed with appropriate method of analysis for this study. The sample size for this study consists of 79 after dropping 19 respondents who don’t return the questionnaire survey. A questionnaire survey was used as data collection instrument. A descriptive statistical techniques of analysis were used to analyses the collected data from relevant respondents. The study has revealed that four predictors (Restriction of access to information, Encryption of all devices, Backup of the office data and Strong password) had a significant influence on enhancement Government data privacy in Zanzibar Social Security Fund (ZSSF). The study concluded that the information system leads to fulfill the substantial security of properties and confidentiality. Finally, the study recommended that The Information security policies should be adopted and must be developed based on standard Information Security Management System (ISMS) and data privacy.

Published in American Journal of Information Science and Technology (Volume 7, Issue 2)
DOI 10.11648/j.ajist.20230702.15
Page(s) 76-83
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2023. Published by Science Publishing Group

Keywords

Restriction of Access, Encryption of All Devices, Government Data Privacy, Strong Password

References
[1] Kamariza, Y. (2017). Implementation of information security policies in public organizations: Top management as a success factor.
[2] Zhao, H., Wang, Y., & Liu, X. (2022). The assessment of smart city information security risk in China based on zGT2FSs and IAA method. Scientific reports, 12 (1), 1-14.
[3] Ezingeard, J. N., & Bowen-Schrire, M. (2007). Triggers of change in information security management practices. Journal of General Management, 32 (4), 53-72.
[4] Laurini, R. (2018). Information systems for urban planning: a hypermedia cooperative approach. CRC Press.
[5] Al-Emran, M., Mezhuyev, V., Kamaludin, A., & Shaalan, K. (2018). The impact of knowledge management processes on information systems: A systematic review. International Journal of Information Management, 43, 173-187.
[6] Abualoush, S. H., Obeidat, A. M., Tarhini, A., & Al-Badi, A. (2018). The role of employees’ empowerment as an intermediary variable between knowledge management and information systems on employees’ performance. VINE Journal of Information and Knowledge Management Systems.
[7] Ismagilova, E., Hughes, L., Dwivedi, Y. K., & Raman, K. R. (2019). Smart cities: Advances in research—An information systems perspective. International Journal of Information Management, 47, 88-100.
[8] Koivisto, J., & Hamari, J. (2019). The rise of motivational information systems: A review of gamification research. International Journal of Information Management, 45, 191-210.
[9] Stair, R., & Reynolds, G. (2020). Principles of information systems. Cengage Learning.
[10] Hoxha, K., Hung, Y. W., Irwin, B. R., & Grépin, K. A. (2020). Understanding the challenges associated with the use of data from routine health information systems in low-and middle-income countries: A systematic review. Health Information Management Journal, 1833358320928729.
[11] Scholl, M. (2018). Play the Game! Analogue Gamification for Raising Information Security Awareness. Systemics, Cybernetics and Informatics, 16 (3), 32-35.
[12] DeLone, W. H., & McLean, E. R. (2002, January). Information systems success revisited. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences (pp. 2966-2976). IEEE.
[13] Dombora, S. (2018). Integrated incident management model for data privacy and information security. In BOOK OF PROCEEDINGS (p. 319).
[14] Amato, F., & Moscato, F. (2015). A model driven approach to data privacy verification in E-Health systems. Trans. Data Priv., 8 (3), 273-296.
[15] Di Iorio, C. T., Carinci, F., Oderkirk, J., Smith, D., Siano, M., de Marco, D. A., ... & Benedetti, M. M. (2021). Assessing data protection and governance in health information systems: a novel methodology of Privacy and Ethics Impact and Performance Assessment (PEIPA). Journal of Medical Ethics, 47 (12), e23-e23.
[16] Jain, P., Gyanchandani, M., & Khare, N. (2019). Enhanced secured map reduce layer for big data privacy and security. Journal of Big Data, 6 (1), 1-17.
[17] Habibzadeh, H., Nussbaum, B. H., Anjomshoa, F., Kantarci, B., & Soyata, T. (2019). A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society, 50, 101660.
[18] Romanou, A. (2018). The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise. Computer law & security review, 34 (1), 99-110.
[19] Mtakati, B., & Sengati, F. (2021). Cybersecurity Posture of Higher Learning Institutions in Tanzania. The Journal of Informatics: 2714-1993, 1 (1).
[20] Abubaker, N., Dervishi, L., & Ayday, E. (2017, October). Privacy-preserving fog computing paradigm. In 2017 IEEE Conference on Communications and Network Security (CNS) (pp. 502-509). IEEE.
[21] Siponen, M. T., & Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38 (1), 60-80.
[22] Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E. (2015). Managing the introduction of information security awareness programmes in organisations. European Journal of Information Systems, 24 (1), 38-58.
[23] Flowerday, S. V., & Tuyikeze, T. (2016). Information security policy development and implementation: The what, how and who. computers & security, 61, 169-183.
[24] Oualha, N., & Olivereau, A. (2011, May). Sensor and data privacy in industrial wireless sensor networks. In 2011 Conference on Network and Information Systems Security (pp. 1-8). IEEE.
[25] Malin, B. A. (2005). An evaluation of the current state of genomic data privacy protection technology and a roadmap for the future. Journal of the American Medical Informatics Association, 12 (1), 28-34.
[26] Reidenberg, J. R., & Schaub, F. (2018). Achieving big data privacy in education. Theory and Research in Education, 16 (3), 263-279.
[27] Guarda, P., Ranise, S., & Siswantoro, H. (2017, June). Security analysis and legal compliance checking for the design of privacy-friendly information systems. In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies (pp. 247-254).
Cite This Article
  • APA Style

    Massoud Ali Juma, Omar Fakih. (2023). Improved Information Security for Enhanced Government Data Privacy at Zanzibar Social Security Fund (ZSSF). American Journal of Information Science and Technology, 7(2), 76-83. https://doi.org/10.11648/j.ajist.20230702.15

    Copy | Download

    ACS Style

    Massoud Ali Juma; Omar Fakih. Improved Information Security for Enhanced Government Data Privacy at Zanzibar Social Security Fund (ZSSF). Am. J. Inf. Sci. Technol. 2023, 7(2), 76-83. doi: 10.11648/j.ajist.20230702.15

    Copy | Download

    AMA Style

    Massoud Ali Juma, Omar Fakih. Improved Information Security for Enhanced Government Data Privacy at Zanzibar Social Security Fund (ZSSF). Am J Inf Sci Technol. 2023;7(2):76-83. doi: 10.11648/j.ajist.20230702.15

    Copy | Download

  • @article{10.11648/j.ajist.20230702.15,
      author = {Massoud Ali Juma and Omar Fakih},
      title = {Improved Information Security for Enhanced Government Data Privacy at Zanzibar Social Security Fund (ZSSF)},
      journal = {American Journal of Information Science and Technology},
      volume = {7},
      number = {2},
      pages = {76-83},
      doi = {10.11648/j.ajist.20230702.15},
      url = {https://doi.org/10.11648/j.ajist.20230702.15},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajist.20230702.15},
      abstract = {The main concern of this study was to explore the strategies for improving information security for enhancement Government data privacy in public sector, Zanzibar Social Security Fund (ZSSF) as case study. Specifically, the explore the effect of restriction of access to information on enhancement Government data privacy in ZSSF, analyses the effect of encryption of all devices on enhancement Government data privacy in ZSSF. Also, the study explores the effect of backup of the office data on enhancement Government data privacy in ZSSF and finally the study analyses the effect of strong password on enhancement Government data privacy in ZSSF. A quantitative research approach was mainly employed with appropriate method of analysis for this study. The sample size for this study consists of 79 after dropping 19 respondents who don’t return the questionnaire survey. A questionnaire survey was used as data collection instrument. A descriptive statistical techniques of analysis were used to analyses the collected data from relevant respondents. The study has revealed that four predictors (Restriction of access to information, Encryption of all devices, Backup of the office data and Strong password) had a significant influence on enhancement Government data privacy in Zanzibar Social Security Fund (ZSSF). The study concluded that the information system leads to fulfill the substantial security of properties and confidentiality. Finally, the study recommended that The Information security policies should be adopted and must be developed based on standard Information Security Management System (ISMS) and data privacy.},
     year = {2023}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Improved Information Security for Enhanced Government Data Privacy at Zanzibar Social Security Fund (ZSSF)
    AU  - Massoud Ali Juma
    AU  - Omar Fakih
    Y1  - 2023/05/10
    PY  - 2023
    N1  - https://doi.org/10.11648/j.ajist.20230702.15
    DO  - 10.11648/j.ajist.20230702.15
    T2  - American Journal of Information Science and Technology
    JF  - American Journal of Information Science and Technology
    JO  - American Journal of Information Science and Technology
    SP  - 76
    EP  - 83
    PB  - Science Publishing Group
    SN  - 2640-0588
    UR  - https://doi.org/10.11648/j.ajist.20230702.15
    AB  - The main concern of this study was to explore the strategies for improving information security for enhancement Government data privacy in public sector, Zanzibar Social Security Fund (ZSSF) as case study. Specifically, the explore the effect of restriction of access to information on enhancement Government data privacy in ZSSF, analyses the effect of encryption of all devices on enhancement Government data privacy in ZSSF. Also, the study explores the effect of backup of the office data on enhancement Government data privacy in ZSSF and finally the study analyses the effect of strong password on enhancement Government data privacy in ZSSF. A quantitative research approach was mainly employed with appropriate method of analysis for this study. The sample size for this study consists of 79 after dropping 19 respondents who don’t return the questionnaire survey. A questionnaire survey was used as data collection instrument. A descriptive statistical techniques of analysis were used to analyses the collected data from relevant respondents. The study has revealed that four predictors (Restriction of access to information, Encryption of all devices, Backup of the office data and Strong password) had a significant influence on enhancement Government data privacy in Zanzibar Social Security Fund (ZSSF). The study concluded that the information system leads to fulfill the substantial security of properties and confidentiality. Finally, the study recommended that The Information security policies should be adopted and must be developed based on standard Information Security Management System (ISMS) and data privacy.
    VL  - 7
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Department of Information Technology, Faculty of Business Administration, Zanzibar University, Zanzibar, Tanzania

  • Department of Telecommunication, Faculty of Engineering, Zanzibar University, Zanzibar, Tanzania

  • Sections