Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
RJYBR
This study examined information security threats to e-government services commonly known as e-citizen. Grounded on General Systems Theory examined the nature of complex inter-relationships and interdependence of global society, states, non-state actors and individuals and how they relate in a complex internet -enabled communication network. Mixed method cross sectional survey was used. Targeted population of 12000 respondents from 51 Huduma Centres. Purposive sampling at 10% was chosen where 1200 structured questionnaires issued returned 966 responses at 80%. The data was processed and analysed using SPSS. The hypothesis was tested at 5% significance level. The study found that Kenyan citizens were the majority at 50%, Companies at 35%, Foreign Agencies 10% and Foreign Nationals at 5%. The services sought; Government to (G2C) 43%, Government to Business (G2B) 35%, Government to employees (G2E) 20% and Government to Government (G2G) 2%. The study identified 12 categories of information security threats i.e unauthorized access, illegal devices, unauthorized codes, distributed denial of services (ddos) false publications, computer frauds, cyber espionage, terrorism and squatting, phishing,
Otieno Godfred Ohndyl. 2026. \u201cInformation Security Threats to e-government Services in Kenya\u201d. Global Journal of Human-Social Science - H: Interdisciplinary GJHSS-H Volume 23 (GJHSS Volume 23 Issue H7): .
Crossref Journal DOI 10.17406/GJHSS
Print ISSN 0975-587X
e-ISSN 2249-460X
The methods for personal identification and authentication are no exception.
Total Score: 102
Country: Kenya
Subject: Global Journal of Human-Social Science - H: Interdisciplinary
Authors: Otieno Godfred Ohndyl, James J Kimuyu, (PhD/Dr. count: 0)
View Count (all-time): 175
Total Views (Real + Logic): 1077
Total Downloads (simulated): 14
Publish Date: 2026 01, Fri
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
This study examined information security threats to e-government services commonly known as e-citizen. Grounded on General Systems Theory examined the nature of complex inter-relationships and interdependence of global society, states, non-state actors and individuals and how they relate in a complex internet -enabled communication network. Mixed method cross sectional survey was used. Targeted population of 12000 respondents from 51 Huduma Centres. Purposive sampling at 10% was chosen where 1200 structured questionnaires issued returned 966 responses at 80%. The data was processed and analysed using SPSS. The hypothesis was tested at 5% significance level. The study found that Kenyan citizens were the majority at 50%, Companies at 35%, Foreign Agencies 10% and Foreign Nationals at 5%. The services sought; Government to (G2C) 43%, Government to Business (G2B) 35%, Government to employees (G2E) 20% and Government to Government (G2G) 2%. The study identified 12 categories of information security threats i.e unauthorized access, illegal devices, unauthorized codes, distributed denial of services (ddos) false publications, computer frauds, cyber espionage, terrorism and squatting, phishing,
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.