Please use this identifier to cite or link to this item:
Title: Data security measures in the IT industry: a balance between knowledge & action
Authors: Militwa, Nhlanhla
Kachala, Y.
Keywords: Data;Information;Security;Access control;Internet;Networks
Issue Date: 2008
Publisher: Association of Digital Forensics, Security and Law
Source: Militwa, N. & Kachala, Y. (2008). Data security measures in the IT industry: a balance between knowledge & action. Journal of Digital Forensics, Security and Law, 3(4): 5-22
Abstract: That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even theft of confidential information, leading to financial losses in information dependant “competitive” institutions is therefore high. Improving efficiencies through ICT therefore, comes with security responsibilities. The problem however is that most organizations tend to focus on task-enhancing efficiencies and neglect security. Possibly due to limited awareness about security, underestimating the problem, concerns about security costs, or through plain negligence. The activity theory of Engeström and the activity analysis development framework of Mursu etal are used as analytical lenses to the cybercrime challenge in this paper. A practical case study of Company X, an IT service provider in Malawi is then used o understand the extent to which organisations that offer electronic data solutions prioritise security in their operations. It is found that even better informed organisations fall short in taking adequate data security measures. A recommendation for all organisations is that they should not only have a clear policy, but also ensure that it is routinely and consistently implemented throughout the operations if information capital is to be secured. A framework towards a holistic approach to thinking about, and in addressing cybercrime is suggested, and recommended in the paper.
ISSN: 1558-7215
Appears in Collections:FID - Journal Articles (DHET subsidised)

Files in This Item:
File Description SizeFormat 
Militwa_Nhlanhla_Kachala_Y_FID_2008.pdfMain Article123.37 kBAdobe PDFView/Open
Show full item record

Page view(s)

Last Week
Last month
checked on Feb 9, 2021


checked on Feb 9, 2021

Google ScholarTM


This item is licensed under a Creative Commons License Creative Commons