• Login
  • Help Guide
View Item 
  •   JOOUST IR Home
  • Theses & Dissertations
  • Masters Theses and Dissertations
  • School of Informatics & Innovative Systems
  • View Item
  •   JOOUST IR Home
  • Theses & Dissertations
  • Masters Theses and Dissertations
  • School of Informatics & Innovative Systems
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Determination of Effective Information systems Security in Secondary Schools in Kenya: A Case of Kisumu County

Thumbnail
Publication Date
2018
Author
Otieno, Martin O. D.
Type
Thesis
Metadata
Show full item record
Abstract/Overview

Adoption of information systems has become a core issue in many sectors of the economy including secondary schools in education sector. These information systems have enabled the secondary schools to achieve efficiency in their daily operations; instructional, administrative and general management. However, these systems have risks associated with information security such as loss of data and reputation. Deployment of appropriate information security policies and controls is key to achieving effective information security. These are core information security determinants that may become a challenge rather than a solution for information security if not properly implemented. They enable achievement of the three core objectives of information security, confidentiality, integrity and availability (CIA). Many studies have focused on information security in organizations but do not seek to find out whether these organization have security controls and policies that achieve effective information security. This study looked at whether the secondary schools implemented information security policies and controls and their• effect in determining effective information security in secondary schools in Kisumu County. It adopted survey research design. Questionnaires were used to collect data from system information administrators and users of these systems. The collected data was analyzed using frequency tables, means, correlation and multiple linear regression analysis tools used to validate the proposed framework. The study found out that the schools had implemented mainly physical security controls on their systems and only 8 few had security policies in place. As a result, effective information security was not being achieved in these schools. The study recommended that the schools use the suggested model to help improve their information security based on standards such as ISO 27001 and ISO 27002 to develop their security policies together with the defense- in-depth security model to ensure information security in these schooIs.

Publisher
JOOUST
Permalink
http://ir.jooust.ac.ke:8080/xmlui/handle/123456789/11775
Collections
  • School of Informatics & Innovative Systems [48]

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement