Given the fact that more governments are heavily investing in implementing and use of e-government applications - the major concern has always been on how to ensure secure prevention, detection and recovery of critical information being stored, processed, and transmitted between domains (government, business, and citizens). Traditionally, interactions between government, business communities and citizens require a physical visit to the government offices - hence little threats to paper based information assets; while with the advent of e-government application - it is possible to virtually locate the service closer to citizens - hence create needs for security. As part of an ongoing research on e-government security maturing for developing world - the current state of e-government development along with specific security issues and challenges is presented; where Tanzania is taken as a case study. The study involved six institutions located in the area, namely: President's Office, Public Service Management (PO-PSM) - responsible for administration of Tanzanian public sector; Prime Minister's Office, Regional Administration and Local Government (PMO-RALG) - responsible for instilling good governance to all level of local governments; Ministry of Lands, Housing and Human Settlements Development (MLHHSD) - responsible for land management; and Ministry of Finance and Economic Affairs (MoFEA) - responsible for manages the overall revenue, expenditure and financing of the Government. Others are Tanzania Revenue Authority (TRA) - agency responsible for government revenue collection; and the Tanzania Ports Authority (TPA) - responsible for all ports and cargo management. In the process, we used Systemic-Holistic-Approach (SHA) to explicitly investigate, evaluate, and analyze the specific security (technical and non-technical) related issues and challenges. The findings were: the level of security awareness among IT and non-IT staff; level of e-government application protection; and level of Security technical threats and nontechnical threats - 63%, 30%, 54%, 45%, 55%; 65%, 20%, 51%, 50%, 60%; and 60%, 23%, 53%, 48%, 54%; for PO-PSM; PMO-RALG; and MLHHSD respectively. Similarly the findings for MoFEA; TRA; and TPA were - 67%, 33%, 55%, 58%, 60%; 73%, 40%, 74%, 68%, 76%; and 70%, 20%, 70%, 65%, 73% respectively. Also the findings shows that to enhance security for e-government application - e-government development models need to have built in stage-wise security layers. Therefore, as most of developing countries are at their infant stages of e-government development - developers of e-government maturity models should explicitly consider integrating security as part of the model's critical requirements at all stages. This will not only ensure security for e-government critical information but also strengthen the level of trust between government and citizen.
NR READING: ACADEMIC CONFERENCES LTD , 2009. 92-100 p.
e-Government, security, technical, non-technical, developed-world, developing-world