Managing organization information security systems, conflicts, and integrity for sustainable Africa transformation

Felix Chukwuma Aguboshim 1, *, Joy Ebere Ezeife 1 and Ifeyinwa Nkemdilim Obiokafor 2

1 Department of Computer Science, Federal Polytechnic, Oko, Nigeria.
2 Department of Computer Science Technology, Anambra State Polytechnic, Mgbakwu, Nigeria.
 
Review Article
World Journal of Advanced Research and Reviews, 2022, 14(02), 080–085
Article DOI: 10.30574/wjarr.2022.14.2.0425
 
Publication history: 
Received on 04 April 2022; revised on 04 May 2022; accepted on 06 May 2022
 
Abstract: 
The ubiquitous reliance on technological innovations by enterprise organizations for electronic file-sharing networks across all business transactions has further exposed organization system enterprises to security threats and risks. Globally, a positive relationship exists between employees’ adherence to security policy enforcement, enterprise definitions, and effective management of organization security systems. Security measures required to handle threats to the organizations’ data: confidentiality, integrity, and availability are becoming complex, dynamic, psychological, but largely undeveloped, outdated, and non-sustainable in Africa despite the huge cyber-security innovations. This study highlights the gaps created by poor employees’ adherence to security policies and enforcement in managing organization information security systems, conflicts, and integrity, and strategies to close them. The authors explored a narrative review of prior research that revealed significant information on strategies for managing organization information security systems. Peer-reviewed articles within the last five years were extracted from electronic databases, using relevant search keywords Results show that organizational security issues can be prevented or mitigated through effective adherence to security policies, control over policy enforcement, and enterprise definitions. Findings from this study may extend proper security management practices and prevention strategies for Africa’s transformation.
 
Keywords: 
Security enterprise definition; Security threats; Confidentiality; Integrity and availability; Identity theft solution; Enterprise security policies
 
Full text article in PDF: 
Share this