Information Security Threats to e-government Services in Kenya

1
Otieno Godfred Ohndyl
Otieno Godfred Ohndyl
2
James J Kimuyu
James J Kimuyu

Send Message

To: Author

GJHSS Volume 23 Issue H7

Article Fingerprint

ReserarchID

RJYBR

Information Security Threats to e-government Services in Kenya Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

This study examined information security threats to e-government services commonly known as e-citizen. Grounded on General Systems Theory examined the nature of complex inter-relationships and interdependence of global society, states, non-state actors and individuals and how they relate in a complex internet -enabled communication network. Mixed method cross sectional survey was used. Targeted population of 12000 respondents from 51 Huduma Centres. Purposive sampling at 10% was chosen where 1200 structured questionnaires issued returned 966 responses at 80%. The data was processed and analysed using SPSS. The hypothesis was tested at 5% significance level. The study found that Kenyan citizens were the majority at 50%, Companies at 35%, Foreign Agencies 10% and Foreign Nationals at 5%. The services sought; Government to (G2C) 43%, Government to Business (G2B) 35%, Government to employees (G2E) 20% and Government to Government (G2G) 2%. The study identified 12 categories of information security threats i.e unauthorized access, illegal devices, unauthorized codes, distributed denial of services (ddos) false publications, computer frauds, cyber espionage, terrorism and squatting, phishing,

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Otieno Godfred Ohndyl. 2026. \u201cInformation Security Threats to e-government Services in Kenya\u201d. Global Journal of Human-Social Science - H: Interdisciplinary GJHSS-H Volume 23 (GJHSS Volume 23 Issue H7): .

Download Citation

High-quality image showing an academic journal cover on information security research in Kenya.
Journal Specifications

Crossref Journal DOI 10.17406/GJHSS

Print ISSN 0975-587X

e-ISSN 2249-460X

Keywords
Classification
GJHSS-H Classification: LCC Code: T58.5-58.64
Version of record

v1.2

Issue date

November 27, 2023

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 1077
Total Downloads: 14
2026 Trends
Research Identity (RIN)
Related Research

Published Article

This study examined information security threats to e-government services commonly known as e-citizen. Grounded on General Systems Theory examined the nature of complex inter-relationships and interdependence of global society, states, non-state actors and individuals and how they relate in a complex internet -enabled communication network. Mixed method cross sectional survey was used. Targeted population of 12000 respondents from 51 Huduma Centres. Purposive sampling at 10% was chosen where 1200 structured questionnaires issued returned 966 responses at 80%. The data was processed and analysed using SPSS. The hypothesis was tested at 5% significance level. The study found that Kenyan citizens were the majority at 50%, Companies at 35%, Foreign Agencies 10% and Foreign Nationals at 5%. The services sought; Government to (G2C) 43%, Government to Business (G2B) 35%, Government to employees (G2E) 20% and Government to Government (G2G) 2%. The study identified 12 categories of information security threats i.e unauthorized access, illegal devices, unauthorized codes, distributed denial of services (ddos) false publications, computer frauds, cyber espionage, terrorism and squatting, phishing,

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Information Security Threats to e-government Services in Kenya

Otieno Godfred Ohndyl
Otieno Godfred Ohndyl
James J Kimuyu
James J Kimuyu

Research Journals