<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="445" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://ir.zou.ac.zw/items/show/445?output=omeka-xml" accessDate="2026-05-02T19:52:13+02:00">
  <fileContainer>
    <file fileId="452">
      <src>https://ir.zou.ac.zw/files/original/63849bfcfe59b7ff45fedfb453c5acdb.pdf</src>
      <authentication>3a804ad98893b2ea5810ab587c1ea2c6</authentication>
    </file>
  </fileContainer>
  <collection collectionId="72">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="82">
                <text>Staff  Publications</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="2652">
              <text>CYBER-SECURITY GOVERNANCE FRAMEWORK AND ITS EFFECTS ON ZIMBABWE&#13;
LOCAL AUTHORITIES: A REVIEW PAPER&#13;
1&#13;
</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="2653">
              <text>BRIAN CHUNDU</text>
            </elementText>
            <elementText elementTextId="2654">
              <text>PROF OBERT SIFILE</text>
            </elementText>
            <elementText elementTextId="2655">
              <text> DR TAVENGWA MASAMHA</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="2656">
              <text>The purpose of this review paper was to analyse literature related to cyber-security governance&#13;
frameworks effects in Zimbabwe local authorities. Cyber-security governance is a developing&#13;
subject with an expanding literature. It is founded in information technology governance but is&#13;
also increasing its recognition in business management. However, there is dearth of literature&#13;
on the effectiveness of cyber-security governance framework in Zimbabwe local authorities.&#13;
The authors reviewed journal papers, conference papers, theses and books from various&#13;
databases namely Google Scholar and ProQuest. The study showed that cyber-security&#13;
governance enables the formulation of a cyber-security governance framework which has a&#13;
great impact on the performance of local authorities in Zimbabwe. In addition, a cyber-security&#13;
governance framework improves organisation’s decision making, risk governance and&#13;
compliance. Conversely, a cyber-security governance framework is inflexible and overly&#13;
systematic. The paper also contributed to the body of knowledge in the fields of cyber-security&#13;
governance as well as other related studies thereby supporting literature brought forward by&#13;
other researchers</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="2657">
              <text>ZJBEM</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="2658">
              <text>2025</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
  <tagContainer>
    <tag tagId="1205">
      <name>Cyber-security</name>
    </tag>
    <tag tagId="1206">
      <name>Cyber-security governance</name>
    </tag>
    <tag tagId="1207">
      <name>Cyber-security governance framework</name>
    </tag>
    <tag tagId="584">
      <name>Local authorities</name>
    </tag>
  </tagContainer>
</item>
