Leveraging Technology for Government Service Delivery: Suggestions for Securing the e-Citizen Service in Kenya

  • Lucy W. Maina, PhD Kenyatta University
  • Godfred Ohndyl Otieno International Peace Support Training Centre
Keywords: Information Security, e-Citizen, e-Governance, Service Delivery
Share Article:

Abstract

Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations and non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions and exposed national security leading to interferences in national autonomy and at times threatened national sovereignty. The threats arise from the activities of offensive states, malicious non-state actors and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to e-Citizen services in Kenya. The research presents findings on the effectiveness of information security measures initiated to secure the e-Citizen services in Kenya.  The case study adopted a mixed method design combining cross-sectional and descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select 10 Huduma centres and 10% of respondents from each of the selected centres.  About 1,200 questionnaires were issued with a return rate of 80% which translates to 966 responses. The study applied both quantitative and qualitative techniques in analysis. The study identified 10 categories of security measures which are discussed in this paper categorized under legislation and policy; infrastructure and capacity development; protective action; monitoring and oversight.  From the findings, Kenya has implemented the measures of information security to a satisfactory level even though more is needed in terms of engaging the populace to enhance safe data use, handling and storage. In order to bolster a safe service delivery e-Citizen system, the study recommends locally modelled technological solutions, mutually beneficial cyber security collaborations, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals

Downloads

Download data is not yet available.

References

Amoretti, F. (2007). ICTs Policies: E-Democracy andE-Government for Political Development.

AU Agenda 2063. (2015). Retrieved from https://au.int/en/agenda2063/overview (Accessed August 20, 2021, 12:46 PM).

Bergquist, K., Fink, C., & Raffo, J. 2018) Global Innovation Index 2018: Energizing the World with Innovation. Geneva: Cornell, and WIPO. 193–209.

Camastra, F., Ciaramella, A., & Staiano, A. (2013). Machine learning and soft computing for ICT security: an overview of current trends. Journal of Ambient Intelligence and Humanized Computing, 4, 235-247.

Ciampa, M. (2009). Security awareness: Applying practical security in your world. Course Technology Press.

Clement, J. (2019). Number of internet users worldwide from 2005 to 2018 (in millions). online: https://www. statista. com/statistics/273018/number-of-internet-users-worldwide, retrieved on= October.

Creswell, J. W., & Creswell, J. D. (2017). Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications.

Creswell, J. W., & Poth, C. N. (2016). Qualitative inquiry and research design: Choosing among five approaches. Sage publications.

Farina, R. (2019). Securing what you don’t own or have. Washington, DC: Oxford University Press.

Gheorghe, M. (2010). Audit Methodology for IT Governance. Informatica Economica, 14(1).

Glikson, E., & Woolley, A. W. (2020). Human trust in artificial intelligence: Review of empirical research. Academy of Management Annals, 14(2), 627-660.

Government of Kenya. (2010). The Constitution, 2010. Retrieved from http://kenyalaw.org/kl/index.php?id=398 (Accessed August 14, 2022, 11:30 PM).

Government of Kenya. (2015). Vision 2030. Retrieved from https://vision2030.go.ke/ (Accessed August 20, 2021, 12:46 PM).

Government of Kenya. (2019). The Data Protection Act. Retrieved from http://www.kenyalaw.org

Government of Kenya. (2021). The Data Protection (General) Regulations, 2021. Kenya Gazette Supplement No. 236. Retrieved from https://www.odpc.go.ke/wp-content/uploads/2021/06/L.N

Government of Kenya. (2008). Vision 2030. Government Printer.

Hira, T. K., & Mugenda, O. M. (1999). The relationships between self-worth and financial beliefs, behavior, and satisfaction. Journal of family and consumer sciences, 91(4), 76.

Irani, Z., Love, P. E., & Montazemi, A. (2007). E-government: past, present and future. European Journal of Information Systems, 16(2), 103-105.

Kremling, J., & Parker, A. M. S. (2017). Cyberspace, cybersecurity, and cybercrime. Sage Publications.

Kenya National Bureau of Statistics & Communications Authority of Kenya. (2016). Enterprise ICT Survey. Retrieved from https://ca.go.ke/wpcontent/uploads/2018/02/Enterprise-ICT-Survey-Report-2016.pdf

Kenya National Bureau of Statistics (2022). Economic Survey 2022. Retrieved from https://www.knbs.or.ke/wp- content/uploads/2022/05/2022-Economic-Survey1.pdf

Khisa, M., Odima, Z., & Wafula, R. (2020). Innovative Ways the Government of Kenya is Delivering Services to its Citizens through E-Government. School of Computing and Informatics, University of Nairobi.

Kothari, C. R., & Garg, G. (2014) Research Methodology: Methods and Techniques. New Delhi: New Age International Publishers.

Libicki, M. C. (2012). Cyberspace is not a warfighting domain. Isjlp, 8, 321.

López-Bassols, V. (2002). ICT skills and employment.

Mugenda, O. M., & Mugenda, A. G. (2003). Research methods: Quantitative & qualitative apporaches (Vol. 2, No. 2). Nairobi: Acts press.

Pawar, S. C., Mente, R. S., & Chendage, B. D. (2021). Cyber crime, cyber space and effects of cyber crime. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 7(1), 210-214.

Shafqat, N., & Masood, A. (2016). Comparative analysis of various national cyber security strategies. International Journal of Computer Science and Information Security, 14(1), 129-136.

Sutopo, B., Wulandari, T. R., Adiati, A. K., & Saputra, D. A. (2017). E-government, audit opinion, and performance of local government administration in Indonesia. Australasian Accounting, Business and Finance Journal, 11(4), 6-22.

UN Department of Economic and Social Affairs. (2020). UN e-Government Survey. Retrieved from http://publicadministration.un.org (Accessed August 20, 2021, 12:46 PM).

Published
14 February, 2024
How to Cite
Maina, L., & Otieno, G. (2024). Leveraging Technology for Government Service Delivery: Suggestions for Securing the e-Citizen Service in Kenya. East African Journal of Information Technology, 7(1), 81-91. https://doi.org/10.37284/eajit.7.1.1757