Information Security Threats to E-government Services in Kenya

dc.contributor.authorOtieno Godfred O
dc.date.accessioned2025-09-13T11:19:04Z
dc.date.available2025-09-13T11:19:04Z
dc.date.issued2023
dc.description.abstractThis study examined the information security threats to e-government services commonly known as the e-citizen services in Kenya. Globally, governments are increasingly losing control and sovereignty over the cyberspace to other states, non-state and individual actors competing for various forms of power with varying intentions. This is due to increased interconnected and interdependency on integrated internet service enabled digital communication infrastructures. The specific objectives were types of public services, types of information security threats and identification of security measures required to protect safety, access, integrity, confidence and privacy of efficient and effective e-government services. The study used descriptive research design adopting mixed method cross sectional survey. The target population was 12000 respondents from 51 Huduma Centres countrywide. Purposive sampling at 10% was chosen where 1200 questionnaires were issued which returned 966 responses at 80%. The study applied both quantitative and qualitative analysis using Statistical Package of Social Science (SPSS) data processing software. Hypothesis testing at 5% significance level. The research findings are presented in tables, figures, graphs and descriptive statistics. The study found that Kenyan citizens were the majority users at 50%, Kenyan registered Companies at 35%, Foreign Agencies 10% and Foreign Citizen individuals at 5%. The services sought; Government to (G2C) 43%, Government to Business (G2B) 35%, Government to employees (G2E) 20% and Government to Government (G2G) 2%. The hypothesis test for the quality of services, Chi2 –Test = x2 , df 3 (n-1) = ∑ (Oi - Ei)2 / Ei = 10.83 > 9.35 at 5% significantly greater. The study identified 13 categories of cyber security threats i.e unauthorized access, illegal devices, unauthorized codes, false publications, computer frauds, cyber espionage, terrorism and squatting, phishing, identity thefts, electronic interceptions, fraudulent electronic data, employee aiding, child pornography and others. The hypothesis test for information security threats, Chi2 –Test = x2 , df 11 (n-1) = ∑ (Oi - Ei)2 / Ei = 20.47 > 19.68 at 5% significantly greater. The study further identified 10 categories of security measures i.e Legislations, institutional policies, capacity development training, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The hypothesis test for the preventive measures, Chi2 –Test = x2 , df 9 (n-1) = ∑ (Oi - Ei)2 / Ei = 18.39 > 16.92 at 5% significantly greater. The study recommends strongly development of home country made technologies and critical infrastructure, international cyber security collaboration, frequent infrastructure security audits, monitoring and upgrades, employee and user capacity training and institutional critical equipment and infrastructure reviews and restructuring of national security organs to create cyber space capabilities to guarantee preventive, defensive and offensive capabilities in tandem to the evolving global information security threats and increasing geopolitical competition and rivalries.
dc.identifier.urihttps://repository.ndu.ac.ke/handle/123456789/79
dc.language.isoen
dc.publisherNDU-K
dc.titleInformation Security Threats to E-government Services in Kenya
dc.typeThesis

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Full text
Size:
1.62 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: