Information Security Threats to e-government Services in Kenya

α
Otieno Godfred Ohndyl
Otieno Godfred Ohndyl
σ
James J Kimuyu
James J Kimuyu

Send Message

To: Author

Information Security Threats to e-government Services in Kenya

Article Fingerprint

ReserarchID

RJYBR

Information Security Threats to e-government Services in Kenya Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

This study examined information security threats to e-government services commonly known as e-citizen. Grounded on General Systems Theory examined the nature of complex inter-relationships and interdependence of global society, states, non-state actors and individuals and how they relate in a complex internet -enabled communication network. Mixed method cross sectional survey was used. Targeted population of 12000 respondents from 51 Huduma Centres. Purposive sampling at 10% was chosen where 1200 structured questionnaires issued returned 966 responses at 80%. The data was processed and analysed using SPSS. The hypothesis was tested at 5% significance level. The study found that Kenyan citizens were the majority at 50%, Companies at 35%, Foreign Agencies 10% and Foreign Nationals at 5%. The services sought; Government to (G2C) 43%, Government to Business (G2B) 35%, Government to employees (G2E) 20% and Government to Government (G2G) 2%. The study identified 12 categories of information security threats i.e unauthorized access, illegal devices, unauthorized codes, distributed denial of services (ddos) false publications, computer frauds, cyber espionage, terrorism and squatting, phishing,

Generating HTML Viewer...

References

51 Cites in Article
  1. Martin Albrow,King (1990). Elizabeth Globalisation.
  2. Francesco Amoretti (2007). International organizations ICTs policies: e-democracy and e-government for political development.
  3. Monica Anderson (2019). Balancing Traditional Research with Computational Social Science: Pew Research Center.
  4. Benjamin Kinyili (1246). Role of Forestry in the Realization of the Vision 2030, Au Agenda 2063, SDGs and Bottom up Economic Transformation Agenda (Beta) on High Priority Agenda in Kenya.
  5. K Bergquist,C Fink,J Raffo (2018). Global Innovation Index 2018: Energizing the World with Innovation.
  6. Erica Borghard,Shawn Lonergan (2017). The Logic of Coercion in Cyberspace.
  7. Francesco Camastra,Angelo Ciaramella,Antonino Staiano (2013). Machine learning and soft computing for ICT security: an overview of current trends.
  8. Joshi Chanchala,Umesh Singh,Kumar (2017). Information security risks.
  9. M Ciampa (2018). Security Awareness: Applying practical Security in your world.
  10. J Clement (2019). More data breaches compromise millions of records.
  11. Craig Scott,Laurie Lewis (2018). Encyclopedia of Molecular Biology.
  12. John Creswell,J Creswell (2017). Research design: Qualitative, quantitative, and mixed methods approaches.
  13. W Creswell (2007). Qualitative Inquiry and Research Design: Choosing Among Five Approaches.
  14. J W Creswell,J Creswell (2017). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches.
  15. Carl Dahlman,Sam Mealy,Martin Wermelinger (2016). Harnessing the digital economy for developing countries.
  16. N Elmi (2021). Digitilising tax, The Kenyan way, The travels and translations of iTax in Kenya.
  17. Rose Farina (2019). Securing what you don't own or have.
  18. B Fung (2018). Equifax's massive 2017 data breach keeps getting worse.
  19. Alina-Madalina Gheorghe,Ileana Gheorghe,Ioana Iatan (2010). Agile Software Development.
  20. Ella Glikson,Anita Woolley (2010). Human trust in artificial intelligence: Review of empirical research.
  21. (1246). Government of Kenya, Vision.
  22. Tahira Hira,Olive Mugenda (1999). The relationships between self-worth and financial beliefs, behavior, and satisfaction.
  23. Zahir Irani,Peter Love,Ali Montazemi (2007). e-Government: past, present and future.
  24. Paul James,Manfred Steger (2014). A Genealogy of ‘Globalization’: The Career of a Concept.
  25. Kremling Janine,Amanda,M Sharp,Parker (2018). Cyberspace, Cybersecurity and Cybercrime.
  26. Chanchala Joshi,Umesh Singh (2017). Information security risks management framework – A step towards mitigating security risks in university network.
  27. M Khisa,Z Odima,R Wafula (2020). Innovative Ways the Government of Kenya is Delivering Services to its Citizens through E-Government.
  28. Kenneth Kimani,Vitalice Oduol,Kibet Langat (2019). Cyber security challenges for IoT-based smart grid networks.
  29. C Kothari,G Garg (2014). Research Methodology: Methods and Techniques.
  30. C Kothari (2005). Research Methodology: Methods and Techniques.
  31. Marsh Stolker,G (2010). Theory and Methods in Political Science.
  32. S Krasner (1978). Defending the national interest: Raw materials investments and US foreign policy.
  33. Janine Kremling,M Amanda,Parker Sharp (2018). Cyberspace, Cybersecurity and Cybercrime.
  34. Vladimir López-Bassols (2002). ICT skills and employment.
  35. Martin Hilbert,Priscila López (2011). The World's Technological Capacity to Store, Communicate, and Compute Information.
  36. A Montuori (2011). Systems Approach.
  37. (2016). Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems.
  38. Olive Mugenda,Abel Mugenda (2003). Research Mentods: Quantitative and Qualitative Approaches.
  39. J Owigar,Omwenga (2018). E.I. User-centric evaluation.
  40. J Owigar,E Omwenga (2019). User-centric evaluation of Government of Kenya online services: The case of iTax.
  41. M Poole (2014). Systems theory.
  42. Michael Robinson,Kevin Jones,Helge Janicke (2015). Cyber warfare: Issues and challenges.
  43. Farina Rose (2019). Securing what you don't own or have.
  44. Narmeen Shafqat,Ashraf Masood (2016). Comparative analysis of various national cyber security strategies.
  45. C Sunil,Dr Pawar,Mente,D Bapu,Chendage (2021). Cyber Crime, Cyber Space and Effects of Cyber Crime.
  46. Bambang Sutopo,Trisninik Ratih Wulandari,Arum Kusumaningdyah Adiati,Adi Dany,Saputra (2017). E-government, audit opinion, and performance of local government administration in Indonesia.
  47. Un E-Government Survey (1246). UN Global E-Government Survey 2003.
  48. ( Valentina,) Dardha,Ndou (2004). E -government for developing countries: opportunities and challenges.
  49. Njihia Wausi,Kamau (2016). E-government websites user experience from public value perspective: Case study of iTax website in Kenya.
  50. G Wells (2019). South Africa : Tax Compliance Burden for Small Businesses: A Survey of Tax Practitioners.
  51. O Dynnikova,Annette Kyobe,Slavi Slavov (2014). Regional disparities and fiscal federalism in Russia.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Otieno Godfred Ohndyl. 2026. \u201cInformation Security Threats to e-government Services in Kenya\u201d. Global Journal of Human-Social Science - H: Interdisciplinary GJHSS-H Volume 23 (GJHSS Volume 23 Issue H7): .

Download Citation

High-quality image showing an academic journal cover on information security research in Kenya.
Journal Specifications

Crossref Journal DOI 10.17406/GJHSS

Print ISSN 0975-587X

e-ISSN 2249-460X

Keywords
Classification
GJHSS-H Classification: LCC Code: T58.5-58.64
Version of record

v1.2

Issue date

November 27, 2023

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 1093
Total Downloads: 37
2026 Trends
Related Research

Published Article

This study examined information security threats to e-government services commonly known as e-citizen. Grounded on General Systems Theory examined the nature of complex inter-relationships and interdependence of global society, states, non-state actors and individuals and how they relate in a complex internet -enabled communication network. Mixed method cross sectional survey was used. Targeted population of 12000 respondents from 51 Huduma Centres. Purposive sampling at 10% was chosen where 1200 structured questionnaires issued returned 966 responses at 80%. The data was processed and analysed using SPSS. The hypothesis was tested at 5% significance level. The study found that Kenyan citizens were the majority at 50%, Companies at 35%, Foreign Agencies 10% and Foreign Nationals at 5%. The services sought; Government to (G2C) 43%, Government to Business (G2B) 35%, Government to employees (G2E) 20% and Government to Government (G2G) 2%. The study identified 12 categories of information security threats i.e unauthorized access, illegal devices, unauthorized codes, distributed denial of services (ddos) false publications, computer frauds, cyber espionage, terrorism and squatting, phishing,

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Information Security Threats to e-government Services in Kenya

Otieno Godfred Ohndyl
Otieno Godfred Ohndyl
James J Kimuyu
James J Kimuyu

Research Journals