Understanding Information Security Behaviours of Tanzanian Government Employees: A Health Belief Model Perspective

Understanding Information Security Behaviours of Tanzanian Government Employees: A Health Belief Model Perspective

Daniel Ntabagi Koloseni, Chong Yee Lee, Ming-Lee Gan
Copyright: © 2019 |Pages: 18
DOI: 10.4018/IJTHI.2019010102
(Individual Articles)
No Current Special Offers


This article investigates security behaviours of employees using the Health Belief Model (HBM) as a theoretical lens. Given the fact that previous studies on security behaviours paid much attention to conscious information security behaviours; this article extends the HBM to study both habitual or automatic security behaviours (security habit) and conscious security behaviours of Tanzanian government employees. A structural equation modelling (SEM) technique was used for data analysis. The study found that, the intentions of government employees to practice information security behaviour is influenced by perceived severity, perceived susceptibility, perceived barriers, and cues to action and security habits. Their intentions, however, is not affected by perceived benefits and self-efficacy. Further, an employee's intentions and security habits has a significant effect on actual security practice. Generally, the extended research model enriches the understanding of the role played by both conscious and habitual security behaviours on information security behaviours of employees.
Article Preview


The application of e- government systems has become a norm in the delivery of e-services to citizens worldwide. The provision of e-services has transformed the manner in which services are delivered to citizens, providing the government with an innovative avenue for offering new services that can easily and conveniently be accessed by the citizens. In fact, the provision of e-services offers a number of benefits to both the government and the citizens, such as accelerating work processes, transparency, accountability and reducing the costs of operations (URT, 2013). Further, e-services improve citizen’s participation and interaction in government activities (Al Hujran, Aloudat, & Altarawneh, 2013) In order to reap the benefits of e-services, the government of Tanzania has established a number of e-government services in recent years (Sawe, 2007; URT, 2013).

However, successful provision of e-government services heavily depends on citizen’s trust on the security of information transacted over the network and e-government information systems during e-service delivery (Al Hujran et al., 2013; Jiménez et al., 2012; Wimmer & Bredow, 2002). Privacy and security of personal information are the most prominent barriers in e-government services delivery and critical for developing citizen trust and confidence to use the e-government services (Carter & Bélanger, 2005; Lee & Turban, 2001) Citizen’s trust on security of information communicated over e-government systems should, therefore, be developed in order to encourage them to adopt the e-services (Warkentin, Gefen, Pavlou, & Rose, 2002).

With increasing prevalence of information security attacks, virtually all information systems are prone to attacks. Similarly, Tanzania e- government information systems are exposed to security threats. Primary factors that may lead to the breach of information security in Tanzania e-government information systems are: (1) poor perceptions with regard to potential susceptibility (vulnerability) and severity of security threats, benefits, and barriers of practising information security (Dewa & Zlotnikova, 2014; Pahnila, Siponen, & Mahmood, 2007; TCRA, 2012; Waziri & Yonah, 2014); (2) lack of security awareness and inadequate ICT security skills such as inability to apply proper security measures in case of security incidents (Dewa & Zlotnikova, 2014; Bakari, Tarimo, Yngstrom, & Magnusson, 2005; Shaaban, Conrad, & French, 2012); and (3) inappropriate information security habit such as sharing login credentials with colleagues, family members, friends and acquaintances to access ICT system (Shaaban, 2014); and connection of personal modems to workplace’s mobile gadgets for internet accessibility that could pave the path for attackers to hack or misuse the organisation’s information systems (Bakari, 2013; Dewa & Zlotnikova, 2014).

Without effective measures, the above problems are likely to continue and, therefore, may retard Tanzania government efforts to provide e- services to its citizens. Thus, a need arises to investigate information security behaviours of Tanzania government employees to practice information security behaviour during e- service provision.

Complete Article List

Search this Journal:
Volume 20: 1 Issue (2024)
Volume 19: 1 Issue (2023)
Volume 18: 7 Issues (2022): 4 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing