Implementing an e-government system in albania requires addressing challenges to safeguard sensitive citizen data. It’s crucialto establish a secure and reliable system.

Authors

  • Valbona Cinaj

DOI:

https://doi.org/10.55312/op.vi2.6186

Abstract

Recent advancements in technology have revolutionized traditional administrative processes, allow-ing for faster and more eficient service delivery. In light of the rapid pace of development and the ease with which information can be transmitted, information security has become a crucial concern for nearly every organization. As a result, organizations are compelled to adapt to these trends and explore ways to manage information security effectively. Key mechanisms that are essential in this regard include policies, procedures, and standards, which enable organizations to create a secure en-vironment for their operations and protect their assets, particularly their valuable information. This paper seeks to examine the various aspects of information security in public sector institutions in Albania, including the challenges and opportunities they face in preventing and addressing security breaches. Additionally, this paper explores how these organizations can comply with existing stan-dards, implement best practices, and draft policies to enhance their information security posture. Of particular interest is the perspective of IT employees on security issues and the extent to which these mechanisms are implemented within their respective organizations.

Keywords:

Security, Information Systems, Management, Technology

Downloads

Download data is not yet available.

Author Biography

Valbona Cinaj

Albanian University, Tirana, Albania

References

  1. Whitman, M. E., & Mattord, H. J. (2011). Principles of information security (4th ed.). Boston, MA: CENGAGE Learning Custom Publishing.

  2. Nayak, U., & Rao, U. (2014). The Infosec handbook: An introduction to information security. Germany: APress.

  3. Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing. United States: Prentice Hall.

  4. Rhodes-Ousley, M. (2013). Information security: The complete reference, Second edition (2nd ed.). New York: McGraw Hill Education.

  5. Alexander, D., Finch, A., & Sutton, D. (2013). Information security management principles (2nd ed.). Swindon: BCS, The Chartered Institute for IT.

  6. Peltier, T. R. (2004). Information security policies and procedures: A practitioner’s reference. Boca Raton: Auerbach Publishers.

  7. Landoll, D. J. (2016). Information security policies, procedures, and standards: A practitioner’s reference. United States: Auerbach Publishers.

  8. Axelrod, C. W., Bayuk, J. L., & Schutzer, D. (Eds.). (2009). Enterprise information security and privacy. Boston: Artech House Publishers.

  9. Bosworth, S., Kabay, M. E., & Whyne, E. (2014). Computer security handbook (6th ed.). United States: John Wiley. I

  10. Schlienger, T. & Teufel, S. (2002). Information security culture: the socio-cultural dimensions in information security management”. In Ghonaimy, M. A., El-Hadidi, M. T. and Asian, H. K. (eds). Security in the Information Society: Vision & Perspectives, Kluwer Academic.

  11. Ward, J. (2002). Developing a culture of information security. Proceeding of the 19^ World Conference on Computer Security Audit and Control, London.

  12. Zakaria, O. & Gani, A. (2003). A Conceptual Checklist of Information Security Culture, Pro-ceeding of the 2^ European Conference on Information Warfare and Security, MCIL,

  13. Dowland, P. S. (2005). Security management, integrity, and internal control in information sys-tems: Ifip Tc-11 WG 11.1 & WG 11.5 joint working conference. New York: Springer-Verlag New York.

  14. Forcht, K.A. (1994). Computer Security Management. Massachusetts: Boyd & Fraser. [15] Halliday, S. & Von Solms, R. (1995). An Alternative Approach to IT Risk Analysis and [16] Management. MTech thesis. Port Elizabeth: Port Elizabeth Technikon.

  15. Von Solms, R. (1998). Information Security Management (3): The Code of Practice for

  16. Information Security Management (BS 7799), Information Management & Computer Security.

  17. Ghonaimy, A. M., El-Hadidi, M. T., & Aslan, H. K. (Eds.). (2002). Security in the information society: Visions and perspectives. Boston, MA: Springer US.

  18. Strous, L. (1998). Integrity and internal control in information systems: Volume 1: Increasing the confidence in information systems. Boston, MA: Springer US.

  19. O’Hanley, R., & Tiller, J. S. (Eds.). (2013). Information security management handbook, sixth edition, volume 7 (6th ed.). Boca Raton, FL, United States: Auerbach Publishers.

  20. Hone, K. and Eloff, P. (2002). Information security policy – what do international information security standards say? Computers & Security.

  21. Harkins, M. W. (2016). Managing risk and information security: Protect to enable: 2017. Ger-many: APress.

  22. Layton, T. P. (2006). Information security governance: Design, implementation, measurement & compliance. Boca Raton, FL: Auerbach Publications.

  23. Valbona Cinaj and Bashkim Ruseti 2021 Information Systems Models in the Hotel Industry and Effects on the Economy (The Case of Albania), Ovidius University Annals, Economic Sciences Series, 2021, vol. XXI, issue 1, 67-75

  24. Valbona Cinaj (cinajvalbona@gmail.com) and Rebeka Ribaj ‘Macroeconomic Impact of Nat-ural Disasters in Albania’, Ovidius University Annals, Economic Sciences Series, 2021, vol. XXI, issue 1, 59-66

  25. Valbona Cinaj, 2017 Sistemet e Informacionit Te Kreditit Ne Shqiperi by Valbona Cinaj, Trade Paperback)

  26. Valbona Cinaj 2017 Sistemet e informacionit te kreditit ne Shqiperi, Credit Information Sys-tems in Albaniav Valbona Cinaj Häftad Albanska, 2017-04-04

Downloads

Published

2024-12-20

How to Cite

Cinaj, V. (2024). Implementing an e-government system in albania requires addressing challenges to safeguard sensitive citizen data. It’s crucialto establish a secure and reliable system. Optime, (2), 483–495. https://doi.org/10.55312/op.vi2.6186

Issue

Section

Articles

Categories