Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Framework for Securing e-Government Services: The Case of Tanzania
Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. (Security Lab)
2012 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

e-Government services are becoming one of the most important and efficient means by which governments (G) interact with businesses (B) and citizens (C). This has brought not only tremendous opportunities but also serious security challenges. Critical information assets are exposed to current and emerging security risks and threats. In the course of this study, it was learnt that e-government services are heavily guided and benchmarked by e-Government maturity models (eGMMs). However, the models lack built-in security services, technical as well as non-technical; leading to lack of strategic objectives alignment between e-government services and security services. Information security has an important role in mitigating security risks and threats posed to e-government services. Security improves quality of the services offered.

In light of the above, the goal of this research work is to propose a framework that would facilitate government organisations to effectively offer appropriate secure e-government services. To achieve this goal, an empirical investigation was conducted in Tanzania involving six government organizations. The investigations were inter-foiled by a sequence of structural compositions resulting in a proposition of a framework for securing e-government services which integrates IT security services into eGMMs. The research work was mainly guided by a design science research approach complemented in parts by systemic-holistic and socio-technical approaches.

The thesis contributes to the empirical and theoretical body of knowledge within the computer and systems sciences on securing e-government structures. It encompasses a new approach to secure e-government services incorporating security services into eGMMs. Also, it enhances the awareness, need and importance of security services to be an integral part of eGMMs to different groups such as researched organizations, academia, practitioners, policy and decision makers, stakeholders, and the community.

Place, publisher, year, edition, pages
Stockholm: Department of Computer and Systems Sciences, Stockholm University , 2012. , 107 p.
Series
Report Series / Department of Computer & Systems Sciences, ISSN 1101-8526 ; 12-010
Keyword [en]
e-Government, information security, maturity models, services, technical security, non-technical security
National Category
Computer Systems
Research subject
Computer and Systems Sciences
Identifiers
URN: urn:nbn:se:su:diva-80722ISBN: 978-91-7447-583-8 (print)OAI: oai:DiVA.org:su-80722DiVA: diva2:557279
Public defence
2012-12-11, Sal C, Forum 100, Isafjordsgatan 39, Kista, 15:00 (English)
Opponent
Supervisors
Note

At the time of the doctoral defence the following paper was unpublished and had a status as follows: Paper nr. 6: In press

Available from: 2012-11-19 Created: 2012-09-27 Last updated: 2012-10-23Bibliographically approved
List of papers
1. State of e-Government Development in the Developing World: Case of Tanzania - Security View
Open this publication in new window or tab >>State of e-Government Development in the Developing World: Case of Tanzania - Security View
2009 (English)In: Proceedings of the 5rh International Conference on e-Government(ICEG 2009), Boston USA. October 2009, 2009, 91-100 p.Conference paper, Published paper (Refereed)
National Category
Computer and Information Science Political Science
Identifiers
urn:nbn:se:su:diva-33558 (URN)978-1-906638-49-8 (ISBN)
Conference
5th International Conference on e-Government
Available from: 2009-12-23 Created: 2009-12-23 Last updated: 2012-10-08Bibliographically approved
2. Secure e-Government Adoption: A Case Study of Tanzania
Open this publication in new window or tab >>Secure e-Government Adoption: A Case Study of Tanzania
2011 (English)In: Proceedings of the European Security Conference (ESC 2011), Örebro, Sweden, 2011, 18-32 p.Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents a case study for secure e-government services adoption in Tanzania, where four organizations are studied. In the process, to compare the adoption process both private and public organizations were critically studied. The study utilizes a mixed research method that combines the use of both qualitative and quantitative methods for questionnaire preparation, data collection, and processing and analysis. The study also reviewed different adoption models, where seven hypotheses were constructed. The results show that out of the seven constructed hypothesis four were supported: Perceived usefulness has a positive influence on the behavioral intention and use of e-government services; perceived trust has a positive influence on the behavioral intention of a user on the usage of e-government service; higher levels of perceived IT security has a positive and significant effect on perceived trust; and behavioral intention has a direct and positive effect on the actual usage and adoption of technology of e-government services. Also, we found that private organization appears to be earlier adopters of technology and offers more secure e-services sooner than public organizations.

Keyword
e-Government, e-Services, technology adoption, IT security, socio-technical factors
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-67183 (URN)
Conference
European Security Conference
Available from: 2011-12-26 Created: 2011-12-26 Last updated: 2012-10-08Bibliographically approved
3. Secure e-Government Services: A Comparative Analysis of e- Government Maturity Models for the Developing Regions - The need for Security Services
Open this publication in new window or tab >>Secure e-Government Services: A Comparative Analysis of e- Government Maturity Models for the Developing Regions - The need for Security Services
2012 (English)In: The International Journal of Electronic Government Research, ISSN 1548-3886, Vol. 8, no 1, 1-25 p.Article in journal (Refereed) Published
Abstract [en]

E-Government offers many benefits to government agencies, citizens and the business community. However,e-Government services are prone to current and emerging security challenges posing potential threats tocritical information assets. Securing it appears to be a major challenge facing governments globally. Basedon the international security standards – the paper thoroughly investigates and analyzes eleven e-governmentmaturity models (eGMMs) for security services. Further, it attempts to establish a common frame of referencefor eGMM critical stages. The study utilizes the Soft Systems Methodology (SSM) of scientific inquiry/learning cycle adopted from Checkland and Scholes. The findings show that security services (technical andnon-technical) are lacking in eGMMs – implying that eGMMs were designed to measure more quantity ofoffered e-government services than the quality of security services. Therefore, as a step towards achievingsecure e-government services the paper proposes a common frame of reference for eGMM with five criticalstages. These stages will later be extended to include the required security services.

Keyword
Developing Regions, e-Government, e-Government Maturity Model, Information Security, Security Services
National Category
Information Systems
Identifiers
urn:nbn:se:su:diva-81035 (URN)10.4018/jegr.2012010101 (DOI)
Available from: 2012-10-08 Created: 2012-10-08 Last updated: 2012-11-19Bibliographically approved
4. Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View
Open this publication in new window or tab >>Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View
2011 (English)In: Proceedings of the 5th International Symposium on Human Aspects of Information Security & Assurance, HAISA , 2011, 58-73 p.Conference paper, Published paper (Refereed)
Abstract [en]

The paper proposes a comprehensive information security maturity model (ISMM) that addresses both technical and socio/non-technical security aspects. The model is intended for securing e-government services (implementation and service delivery) in an emerging and increasing security risk environment. The paper applied inductive approach that utilizes extensive literature review and survey study approaches. A total of eight existing ISMMs were selected and critically analyzed. Models were then categorized into security awareness, evaluation and management orientations. Based on the model’s strengths – three models were selected to undergo further analyses and then they were synthesized. Each of the three selected models was either from the security awareness, evaluation or management orientations category. To affirm the findings – a survey study was conducted into six government organizations located in Tanzania. The study was structured to a large extent by the security controls adopted from the Security By Consensus (SBC) model. Finally, an ISMM with five critical maturity levels was proposed. The maturity levels were: undefined, defined, managed, controlled and optimized. The papers main contribution is the proposed model that addresses both technical and non-technical security services within the critical maturity levels. Additionally, the paper enhances awareness and understanding on the needs for security services be an integral part of e-government services to stakeholders.

Place, publisher, year, edition, pages
HAISA, 2011
Keyword
e-Government, Information security, Maturity model, Security services, Technical and Non-technical security
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-67206 (URN)ISBN: 978-1-84102-284-0 (ISBN)
Conference
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), London, July 2011
Available from: 2011-12-26 Created: 2011-12-26 Last updated: 2012-10-08Bibliographically approved
5. Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models
Open this publication in new window or tab >>Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models
2011 (English)In: Proceedings of the IEEE/10th ISSA 2011 Conference on Information Security, IEEE/HAISA2011 , 2011, 1-9 p.Conference paper, Published paper (Refereed)
Abstract [en]

e-Government maturity models (eGMMs) lack security services (technical and socio/non-technical) in its critical maturity stages. The paper proposes a comprehensive framework for integrating IT security services into eGMM critical stages. The proposed framework is a result of integrating information security maturity model (ISMM) critical levels into e-government maturity model (eGMM) critical stages. The research utilizes Soft Systems Methodology (SSM) of scientific inquiry adopted from Checkland and Scholes. The paper contributes to the theoretical and empirical knowledge in the following ways: firstly, it introduces a new approach that shows how government’s can progressively secure their e-government services; secondly, it outlines the security requirements (technical and non-technical) for critical maturity stages of eGMM; and thirdly, it enhances awareness and understanding to the governments and stakeholders such as practitioners, experts and citizens on the importance of security requirements being clearly defined within eGMM critical stages.

Place, publisher, year, edition, pages
IEEE/HAISA2011, 2011
Keyword
e-Government, Information Security, Maturity Model, Security Requirements, Technical and Non-technical Security aspects
National Category
Information Systems
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-67184 (URN)978-1- 4577-1483-2/82-5 (ISBN)
Conference
The IEEE/10th ISSA 2011 Conference on Information Security,Johannesburg, South Africa, August 2011
Available from: 2011-12-26 Created: 2011-12-26 Last updated: 2012-10-08Bibliographically approved
6. Evaluating A Framework for Securing e-Government Services: A Case of Tanzania
Open this publication in new window or tab >>Evaluating A Framework for Securing e-Government Services: A Case of Tanzania
(English)Manuscript (preprint) (Other academic)
National Category
Information Systems
Identifiers
urn:nbn:se:su:diva-81046 (URN)
Available from: 2012-10-08 Created: 2012-10-08 Last updated: 2012-10-08Bibliographically approved
7. Secure e-Government services: Protection Profile for Electronic Voting - A Case of Tanzania
Open this publication in new window or tab >>Secure e-Government services: Protection Profile for Electronic Voting - A Case of Tanzania
2012 (English)In: IST-Africa 2012 Conference Proceedings / [ed] Paul Cunningham and Miriam Cunningham, IIMC International Information Management Corporation , 2012Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
IIMC International Information Management Corporation, 2012
National Category
Information Systems
Identifiers
urn:nbn:se:su:diva-81048 (URN)978-1-905824-34-2 (ISBN)
Conference
Regional Impact of Information Society Technologies Conference, IST-Africa 2012, Dar es salaam, Tanzania, May 2012
Available from: 2012-10-08 Created: 2012-10-08 Last updated: 2013-02-18Bibliographically approved

Open Access in DiVA

Comprehensive Summary(3247 kB)4661 downloads
File information
File name FULLTEXT04.pdfFile size 3247 kBChecksum SHA-512
96c2068b37140b658035628ca7f1361bf7dc2bf1fd8b3233b514f915d67adbe1f23d3060ef34f8884eb19df0f86a226b2efa3b4c732bef5b31ba9338adfda8ae
Type fulltextMimetype application/pdf

By organisation
Department of Computer and Systems Sciences
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 4669 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 699 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf