2017 IST-Africa Week Conference (IST-Africa) 2017
DOI: 10.23919/istafrica.2017.8102380
|View full text |Cite
|
Sign up to set email alerts
|

A security model for Namibian Government Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Provision of power and water are political and human rights issues, further complicating their implementation (Gambe, 2015). Research into network security for smart cities has been carried out in Namibia (Erastus et al, 2020).…”
Section: Smart City [As] Infrastructurementioning
confidence: 99%
See 2 more Smart Citations
“…Provision of power and water are political and human rights issues, further complicating their implementation (Gambe, 2015). Research into network security for smart cities has been carried out in Namibia (Erastus et al, 2020).…”
Section: Smart City [As] Infrastructurementioning
confidence: 99%
“…The impacts of 'big data' on individual privacy are highlighted as well as the need for management frameworks (Loideain, 2017). To ensure that data is protected, there is a need for the adoption of security frameworks to collect, clean, store, share, use and delete data in line with agreed data policies (Erastus et al, 2020;Loideain, 2017). Thus, the importance of security frameworks is being recognised as we increasingly adopt smart city tech and a number of countries have begun to develop these frameworks (Erastus et al, 2020).…”
Section: Smart City [As] Infrastructurementioning
confidence: 99%
See 1 more Smart Citation
“…In other studies, the development of security controls refers to standard security programs or enterprise architecture (EA) with complete security functions (ISO/IEC, 2013; Suter, 2007; NIST, 2018; Center for Internet Security, 2021). CII protection for several service providers results from developing EA (Baina et al , 2020; Erastus et al , 2020; Große et al , 2021; Ramtohul and Soyjaudah, 2016). Despite the variety of approaches for developing security control, the EA approach is more necessary for CII protection at the national level because EA accounts for threats, vulnerabilities, security principles and functions (Putro and Sensuse, 2021).…”
Section: Introductionmentioning
confidence: 99%