Towards a Secure Maturity Model for Protecting e-Government Services in Tanzania: A Stakeholders View

E-Government Maturity Models (eGMMs) are widely used as a tool for guiding the development and implementation of e-Government services. The government of Tanzania recognizes that e-Government services can accelerate the achievement of a sustainable social and economic development in the country. However, despite the good benefits provided by e-Government services, information security and privacy are the most significant obstacles for e-Government services adoption. Unfortunately, very few designs of e-GMMs have considered security as a specific issue. However, even these few security responsive models consider security mostly at the transaction stage. Responding to this security weakness of eGMMs, in our earlier work a holistic secure e-Government maturity model that includes security layers consisting of technical and non-technical security related aspects in each of its four maturity stages was developed, but the model was not yet tested and evaluated. This paper reports on the tests and the validation of the proposed secure model. The applied evaluation criteria were: simplicity, reliability, accessibility and usability, dynamics and flexibility, applicability, coverage and completeness, and compliance with legal aspects. Primary data were collected from five Tanzanian public organization using questionnaires. The collected data were processed and analyzed using the SPSS. The overall results show that the model designs meet all required specifications to successfully secure e-Government services, and the model was accepted by majority of the respondents at different organizational levels (strategic, tactical, and operational).

[1]  M. Tan,et al.  An Investigation of e‐Government Services in China , 2013, Electron. J. Inf. Syst. Dev. Ctries..

[2]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .

[3]  Stewart Kowalski,et al.  Evaluating a Framework for Securing E-Government Services -- A Case of Tanzania , 2013, 2013 46th Hawaii International Conference on System Sciences.

[4]  Jungwoo Lee,et al.  Developing fully functional E-government: A four stage model , 2001, Gov. Inf. Q..

[5]  Louise Yngström,et al.  Discussing E-Government Maturity Models for the Developing World - Security View , 2009, ISSA.

[6]  Maria Wimmer,et al.  A holistic approach for providing security solutions in e-government , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[7]  Øystein Sæbø E-government in Tanzania: Current Status and Future Challenges , 2012, EGOV.

[8]  B. Hafiz,et al.  Confirmatory factor analysis (CFA) of first order factor measurement model-ICT empowerment in Nigeria , 2013 .

[9]  Nugi Nkwe,et al.  E-Government: Challenges and Opportunities in Botswana , 2012 .

[10]  Irina Zlotnikova,et al.  Current Status of e-Government Services in Tanzania: A Security Perspective , 2014 .

[11]  E. Guba Criteria for assessing the trustworthiness of naturalistic inquiries , 1981 .

[12]  Mohamed D. Waziri,et al.  A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania , 2014 .

[13]  Authors' Biographies , 2005 .

[14]  Yuan Long,et al.  Synthesizing e-government stage models - a meta-synthesis based on meta-ethnography approach , 2005, Ind. Manag. Data Syst..

[15]  H. Sol,et al.  Exploring issues underlying citizen adoption of eGovernment initiatives in developing countries: The case of Tanzania , 2010 .

[16]  D. West E‐Government and the Transformation of Service Delivery and Citizen Attitudes , 2004 .

[17]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[18]  Abdoullah Fath-Allah and Laila Cheikhi and Rafa E. Al-Qutais Idri,et al.  e-Government maturity models: a comparative study , 2014 .

[19]  L. Krefting Rigor in qualitative research: the assessment of trustworthiness. , 1991, The American journal of occupational therapy : official publication of the American Occupational Therapy Association.

[20]  Maria Wimmer,et al.  E-government: aspects of security on different layers , 2001, 12th International Workshop on Database and Expert Systems Applications.