Information Technology (IT) Security Management in Kenyan Small and Medium Enterprises (SMEs)

Abstract

The aim of this paper is to study the management of Information Technology (IT) security in Kenyan Small and Medium Enterprises (SMEs). Particularly, this study looks at whether SMEs have a designated employee in charge of IT security, whether SMEs seek external expertise about IT security where it is not internally available and if employees are aware that IT security incidents should be reported to management immediately. Further, the study finds out whether SMEs have a formal disciplinary process for employees who violate the company’s IT security policies and processes and if their IT security measures have been reviewed within the last year. There is evidence from the survey to suggest that Kenyan SMEs do not have in place proper IT security management practices. The survey reveals that SMEs need to put in place good management and disciplinary measures if they are to realize the benefits of IT security. This is one of the first studies to explore IT security issues in Kenyan SMEs. This survey is likely to assist SME stakeholders gauge the effectiveness of their IT security management structures.

Authors and Affiliations

MICHAEL KIMWELE , WAWERU MWANGI , STEPHEN KIMANI

Keywords

Related Articles

Selection of Best Web Site by Applying COPRAS-G method

The presence of multiple websites offering similar services has changed the user outlook. The user now prefers to visit those sites, which are easy to use. Many different methods have been proposed to measure usage of a...

DEVELOPMENT AND VALIDATION OF MEANINGFUL HYBRID E-TRAINING MODEL FOR COMPUTER EDUCATION

Meaningful hybrid e-training experience provides a coherent purpose for strategic educational change through lifelong education and the creation of a knowledge society. A close examination of new hybrid e-training progr...

Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation

-A protocol is secure if th e parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute th e inputs using the function f and give the re sult t o the respec tive parties...

 Fuzzy K-mean Clustering Via J48 For Intrusiion Detection System

Due to fast growth of the internet technology there is need to establish security mechanism. So for achieving this objective NIDS is used. Datamining is one of the most effective techniques used for intrusion detection....

Application of Free and Open source software and its Impact on society

Free and open source software is one of the effective tool that can make the world self-dependent. It facilitates the design and use of your own software. This can also lead to economic liberty as the FOSS...

Download PDF file
  • EP ID EP144910
  • DOI -
  • Views 67
  • Downloads 0

How To Cite

MICHAEL KIMWELE, WAWERU MWANGI, STEPHEN KIMANI (2011). Information Technology (IT) Security Management in Kenyan Small and Medium Enterprises (SMEs). International Journal of Computer Science and Information Technologies, 2(1), 517-5252. https://europub.co.uk/articles/-A-144910