2022
DOI: 10.30574/wjarr.2022.14.2.0425
|View full text |Cite
|
Sign up to set email alerts
|

Managing organization information security systems, conflicts, and integrity for sustainable Africa transformation

Abstract: The ubiquitous reliance on technological innovations by enterprise organizations for electronic file-sharing networks across all business transactions has further exposed organization system enterprises to security threats and risks. Globally, a positive relationship exists between employees’ adherence to security policy enforcement, enterprise definitions, and effective management of organization security systems. Security measures required to handle threats to the organizations’ data: confidentiality, integr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 21 publications
0
0
0
Order By: Relevance
“…The Enterprise Information Systems (EIS) security conceptual framework provides a systematic approach to ensuring the security of information systems within an organization. In the context of cybersecurity in a cashless era, EIS encompasses various components and principles to guide the design, implementation, and management of information security encompasses various components and principles to guide the design, implementation, and management of information security [5], [26], and [33]. As identified by researchers, these components included: governance and policy, which establishes rules, regulations, and decision-making processes to ensure effective management, control, and alignment of information systems within an organisation [18].…”
Section: Conceptual Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…The Enterprise Information Systems (EIS) security conceptual framework provides a systematic approach to ensuring the security of information systems within an organization. In the context of cybersecurity in a cashless era, EIS encompasses various components and principles to guide the design, implementation, and management of information security encompasses various components and principles to guide the design, implementation, and management of information security [5], [26], and [33]. As identified by researchers, these components included: governance and policy, which establishes rules, regulations, and decision-making processes to ensure effective management, control, and alignment of information systems within an organisation [18].…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…Resilient cybersecurity measures aid in defending against cyber threats and fraud, thereby guaranteeing the security and integrity of digital payment transactions, as claimed by [39] and [15]. Furthermore, effective cybersecurity protocols employ safeguards to guarantee the confidentiality and integrity of digital payment transactions [5], and [46]. They also foster cooperation, awareness-raising, and preventative actions to mitigate cybersecurity risks and safeguard users and organisations within the digital payment ecosystem [2], and [28].…”
Section: Literature Reviewmentioning
confidence: 99%