Web application vulnerability assessment and policy direction towards a secure smart government Olusesan M. Awoleye a, , Blessing Ojuloge b , Mathew O. Ilori a a African Institute for Science Policy and Innovation (AISPI), Faculty of Technology, Obafemi Awolowo University, Ile-Ife, Nigeria b National Centre for Technology Management, Agency of the Federal Ministry of Science & Technology, Obafemi Awolowo University, Ile-Ife, Nigeria abstract article info Available online xxxx Keywords: E-government Smart government Web vulnerability Policy Cross site injection SQL injection Cookie manipulation This paper carried out technological analysis of e-government platforms with a view of assessing possible appli- cation aws that can inhibit smooth running of the available web services provided. Two sets of data were col- lected with an interval of two years on 64 Nigerian government websites. Five web vulnerability variables known to be notorious for web attacks were purposively investigated. In the overall assessment for the two datasets, the average result showed that about 67% are affected by broken links (BL), 43.8% by unencrypted pass- word (UP), 35% by cross site scripting (XSS) and about one out of every four are affected by each of Structured Query Language Injection (SQLi) and cookie manipulation (CM). An independent t test statistic showed that there is a signicant difference between the groups for three of the variables investigated, these are: XSS, SQLi and CM at 95% condence interval. The motivation for this study is premised on the risk that these results pose to the smooth running of the e-government services and the possibility of nancial loss. The research thus suggests some useful policy directions to enhance the provision of a secure smarter government. © 2014 Elsevier Inc. All rights reserved. 1. Introduction The growth of the internet and its services has brought innovation in the use of many web applications. This has provided sources of informa- tion for citizens and has created opportunities for businesses to thrive (Zhao & Zhao, 2010). Organizations and government bodies have lever- aged severally on new technologies provided by the web for improved efciency in service delivery, transparency, increased revenue, cost- saving and global competitiveness (Chen, 2002; Chen & Gant, 2001; Kim, Jeong, & Lee, 2009). Government services which have been charac- terized by rigid bureaucracy are gradually being taken over by e- government. When e-government services become more exible to access for user's satisfaction it culminates into smarter government which is desirable (Rokhman, 2011). Smart government has been de- scribed as the implementation of a set of business processes and under- lying information technology capabilities that enable information to ow seamlessly across government agencies. Smart government as an advanced government presents opportunities that people can avail themselves of, including: services, participation and communication anytime, anywhere and with any device through convergence and inte- gration of smart IT and government services. It provides a platform where the government proactively pushes relevant, unique data to cit- izens based on their proles. This helps government to provide real time information to her citizens. As changes occur to a citizen's circum- stance, government processes are triggered to provide the appropriate service(s). Despite the benets of communication through the internet, the proliferation of cyber crime activities has created a big concern (Zhao & Zhao, 2010). For example in a world ranking survey of the top cyber crime perpetrators by country, Nigeria is rated 3rd behind United States and United Kingdom according to the Internet Crime Control Centre. 1 Since e-government projects are provided over an insecure channel like the internet, other important issues surface. In most countries (Nigeria inclusive), there are no governmental infrastructure that supports authentication, condentiality, integrity and privacy is- sues (Moen, Klingsheim, Simonsen, & Hole, 2007). There are also other problems related to web applications that can give unexpected conse- quences when e-government solutions are deployed. It is worth noting to state that amid all these, the rate by which organizations and govern- ment are adopting the use of the web as useful resource is on the in- crease (Ebrahim & Irani, 2005; Gil-García & Martinez-Moyano, 2005; Wangpipatwong, Chutimaskul, & Papasratorn, 2005). It has been identied that some of the motivations for adopting e- government have been largely technology pushed and benet driven without given adequate attention to security issues. Quite a number of literatures have reiterated the consequence of porting unveriedweb applications (Balduzzi, Gimenez, Balzarotti, & Kirda, 2010; Chien, Government Information Quarterly xxx (2014) xxxxxx Corresponding author at: African Institute for Science Policy and Innovation (AISPI), Faculty of Technology, Obafemi Awolowo University, Ile-Ife, Nigeria. E-mail address: awoleye@yahoo.co.uk (O.M. Awoleye). 1 www.ic3.gov/media/annualreport/2009_ic3report.pdf. GOVINF-01017; No. of pages: 8; 4C: http://dx.doi.org/10.1016/j.giq.2014.01.012 0740-624X/© 2014 Elsevier Inc. All rights reserved. Contents lists available at ScienceDirect Government Information Quarterly journal homepage: www.elsevier.com/locate/govinf Please cite this article as: Awoleye, O.M., et al., Web application vulnerability assessment and policy direction towards a secure smart government, Government Information Quarterly (2014), http://dx.doi.org/10.1016/j.giq.2014.01.012