Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya

Lucy W. Maina, Godfred Ohndyl Otieno
{"title":"Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya","authors":"Lucy W. Maina, Godfred Ohndyl Otieno","doi":"10.37284/eajit.7.1.1757","DOIUrl":null,"url":null,"abstract":"Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independence and loss of national sovereignty. These threats arise from the activities of offensive states, non-states and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to eCitizen Services in Kenya. The research presents findings on information security measures to secure eCitizen services in Kenya.  The case study adopted a descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select Huduma Centres and 10% of respondents from each centre.  About 1,200 questionnaires were issued with a return rate of 966 responses at 80%. The study applied both quantitative and qualitative techniques in analysis. The hypothesis was tested at a 5% significance level. The study identified 10 categories of security measures, six of which are discussed in this paper i.e., National capabilities, institutional policies, capacity development, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The study recommends locally modelled technological solutions, mutually beneficial cyber security collaboration, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals","PeriodicalId":509108,"journal":{"name":"East African Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"East African Journal of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37284/eajit.7.1.1757","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independence and loss of national sovereignty. These threats arise from the activities of offensive states, non-states and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to eCitizen Services in Kenya. The research presents findings on information security measures to secure eCitizen services in Kenya.  The case study adopted a descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select Huduma Centres and 10% of respondents from each centre.  About 1,200 questionnaires were issued with a return rate of 966 responses at 80%. The study applied both quantitative and qualitative techniques in analysis. The hypothesis was tested at a 5% significance level. The study identified 10 categories of security measures, six of which are discussed in this paper i.e., National capabilities, institutional policies, capacity development, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The study recommends locally modelled technological solutions, mutually beneficial cyber security collaboration, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用技术提供政府服务:确保肯尼亚电子公民服务的建议
世界各国政府在提供公共服务时越来越多地采用电子政务。这一发展大大减少了官僚主义,提高了效率,减少了腐败,并从根本上改变了公共服务的提供。然而,采用这些由国际公司、非国家行为者(主要是跨国公司)拥有的版权技术解决方案,同样使肯尼亚等用户政府面临重大的网络空间安全威胁、服务中断、国家安全受到威胁、国家独立受到干扰以及国家主权丧失。这些威胁来自攻击性国家、非国家和个人利用集成和依赖性互联网连接网络的活动。本文摘自一项关于肯尼亚电子公民服务面临的信息安全威胁的研究。该研究介绍了肯尼亚为确保电子公民服务安全而采取的信息安全措施。 案例研究采用了描述性研究设计,以全国 51 个 Huduma 中心的 12,000 名受访者(用户)为对象。研究采用了有目的的抽样方法来选择 Huduma 中心和每个中心 10%的受访者。 共发放了约 1200 份调查问卷,回收率为 966 份,回收率为 80%。研究采用定量和定性技术进行分析。假设检验的显著性水平为 5%。研究确定了 10 类安全措施,本文将讨论其中的 6 类,即国家能力、机构政策、能力 发展、备份、物理访问、专业认证、频繁的信息和通信技术审计、防火墙和管理安全 审查。研究建议采用本地模式的技术解决方案、互惠互利的网络安全合作、频繁的基础设施安全审计、用户能力培训和重组国家安全机构,以建立网络空间人员配备能力。这些部门变革将加强预防、防御和进攻能力,以应对地缘政治、技术、经济和安全竞争以及全球各国、非国家行为者和恶意个人之间的竞争所带来的网络空间威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Mediating Role of Teacher Training and Learner Orientation in ICT Integration for Competence-Based Curriculum Implementation in Kyaka II Refugee Settlement Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya A Framework for Guiding the Design of Interactive Systems for Communication through Activities in Higher Learning Institutions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1