A Secure Application for Information Sharing in Organizations: A Case Study of Kabale District Local Government
Keywords:A secure Application, Information Sharing, organizations, Crypto-graphical Methods.
Information shared is exposed to threats of confidentiality, integrity and availability needed for decision making in organizations. A case study was carried out at Kabale District local Government where interviews and questionnaires were administered to purposively selected elements of the study. The findings revealed that the information shared within the organization is exposed to potential threats that can put the organization’s information at a risk of being accessed by unauthorized users. The following factors for securing information were identified and used in the development of a secure application for information sharing in organizations. These factors include; denying unauthorized staff and other individuals from gaining access to personal data, passwords to be treated as private to the individual, secure disposal of information, paper files to store in secure locations and only accessed by those who need to use them. In this application, the information is encoded using crypto-graphical methods that cannot be easily intercepted, such that only the intended recipient is able to receive it in its original format for decoding. This makes information shared secure. The application was tested and validated by a range of stakeholders and it was found secure. For the future work, a survey will be carried out in a range of organizations in order to develop an improved application for information sharing.
Ravi, S., Kumar R. and Xinwen, Z. (2006.). "Secure information sharing enabled by Trusted Computing and PEI models", Proceedings of the ACM Symposium on Information, computer and communications security, 2 – 12.
M. Fillia, S. Calliope, B. Beth, B., P. Grammati and M. Conalis-Kontos (2003). "A Safe Information Sharing Framework for E-Government Communication", IT white paper from Boston University.
C. R. Moberg, B. D. Cutler, A.Gross, & T. W. Speh (2002). Identifying antecedents of information exchange within supply chains. International Journal of Physical Dis- tribution and Logistics Management, 32(9), 755–770
E. Charles, T. Phillips, T.C. Ting and A.D. Steven. “Mobile and Cooperative Systems: Information sharing and security in dynamic coalitions,” Proceedings of the seventh ACM symposium on Access control models and technologies, Anaheim, CA, USA, June 2002, pp. 3-11.
A. Barua, S. Ravindran, A.B. Whinston, (2007). Enabling information sharing within organizations. Information Technology and Management, 8(1), 31–45.
S.` Li & B. Lin. (2006). Accessing information sharing and information quality in supply chain management. Decision Support Systems, 42(3), 1641−1656.
L. Xin. (2007). "Distributed Secure Information Sharing Model for E- Government in China," Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 3, 958-962.
R.A. Nabil, A. Vijay, S.A. Chun, E. John, S. Basit, V. Jaideep and X. Hui (2008). “Secure Information Sharing and Analysis for Effective Emergency Management”, Proceedings of the 9th International Conference on Digital Government Research Montreal, Canada, pp. 407-408.
J. K. Ssewanyana, (2009). ICT Usage in Microfinance Institutions in Uganda. The African Journal of Information Systems (AJIS), 1(3), 5-28.
How to Cite
Authors who submit papers with this journal agree to the following terms.