Modeling information security governance in the ECOWAS zone: The maturity model revisited

  • Author(s) / Creator(s)
  • Governance directly impacts information security, focusing in protecting business-critical assets, providing confidentiality, integrity, and availability. Good security practices give
    assurance of information security to other governments and businesses. In particular, the request for better security governance stems from the necessity to deal with past and
    emerging risks, threats, and vulnerabilities.
    This paper examines information security governance in the Economic Community of West African States (Ecowas). It uses the digital opportunity index 2006 (DOI) computed by the International Telecommunication Union (ITU) and the e-government ratings as in West (2006) to compute a country security governance index. The author then uses that index to rank countries by their current maturity level of information security governance. It proceeds to offer a causal analysis and pinpoint factors that could improve that maturity.
    In the paper, we extend the initial maturity model. Our innovation is to do what nobody have done before us, that is to evaluate information security governance in underprivileged West African countries, using an extension to the information security governance maturity model. Although not perfect, this work should be seen as a trailblazer. Our pioneering research helps to open up a new line of research in the promising field of information security governance. It was a difficult and challenging task.

  • Date created
    2008-01-02
  • Subjects / Keywords
  • Type of Item
    Research Material
  • DOI
    https://doi.org/10.7939/r3-j9k8-3553
  • License
    Attribution-NonCommercial 4.0 International