7 research outputs found

    An Analysis of Behavioral Intention toward Actual Usage of Open Source Software among Students in Private High Learning Institution in Tanzania

    Full text link
    This study focused on analyzing behavioral intention toward the actual USAge of open source software in private universities in Tanzania. Questionnaires were used to collect quantitative data in two private universities namely Iringa University and Ruaha Catholic University. Stratified sampling technique was utilized to ensure sample representativeness among two universities where simple random sampling was used to draw a sample from each stratum during the survey. Finding Using Structural Equation Modeling indicated that performance expectancy (source code production and software localization) and social factor (Vendor, internet services provider and lecturer) have a significant influence toward behavioral intention while effort expectancy was found to be insignificant. In addition the behavioral intention was found to be significant toward student\u27s actual USAge of open source software in Universities. This study recommended that for students to develop behavioral intention toward OSS actual USAge, internet service provider have to increase the level of internet services that can assist the university communities to access and download open source software. In addition, to increase actual use, open source software vendors and lecturer or experts have to make sure that their software source code is free for distribution and localization, this will increase self-motivation and interest of the students toward actual USAge of open source software

    The rapid growth of cybercrimes affecting information systems in the global: is this a myth or reality in Tanzania?

    No full text
    International Journal of Information Security Science, 2014, 3(2): 182-199The main objective of this study was to determine whether the rapid growth of cybercrimes affecting information systems in the global: is a myth or reality in Tanzania. The study was undertaken using a mixed research methods. The research findings reveal that 12.8 % of users are victims of cybercrimes due to visiting unhealthy websites in cyberspace, more than 90.89% of users have been denied access to torrents/p2p applications (with malicious codes); and more than 63.29% of e-mails received by users are spam. It has been noted that Internet users has risen to 5.63 million users in 2012 out of 46.9 million of population in Tanzania; and is increasing at the rate of 416.98% per year thus expectation of 7.34 million users of Internet by December 2015. The increase in the number of Internet users has direct implication to the increase in cybercrimes affecting information systems. The Government of Tanzania has declared that “about 320 people were apprehended between July and December 2011of which over 1bn/- , Euro 8,897 and USD 551,777 reported to have been stolen through cyber”. The study concluded that there is a need for a holistic approach in addressing cybercrimes in a developing country like Tanzania

    Human sensor web crowd sourcing security incidents management in Tanzania context

    No full text
    Journal of Information Security, 2018; 9: 191-208Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. Various solutions proposed do not effectively address the problematic situation of security incidents. The study proposes a human sensor web Crowd sourcing platform for reporting, searching, querying, analyzing, visualizing and responding to security incidents as they arise in real time. Human sensor web Crowd sourcing security incidents is an innovative approach for addressing security incidents affecting information systems in cyberspace. It employs outsourcing collaborative efforts initiatives outside the boundaries of the given organization in solving a problematic situation such as how to improve the security of information systems. It was managed by soft systems methodology. Moreover, security maturity level assessment was carried out to determine security requirements for managing security incidents using ISO/IEC 21827: Systems security engineering capability maturity model with a rating scale of 0 - 5. It employed descriptive statistics and non-parametric statistical method to determine the significance of each variable based on a research problem. It used Chi-Square Goodness of Fit Test ( X 2) to determine the statistical significance of result findings. The findings revealed that security controls and security measures are implemented in ad-hoc. For managing security incidents, organizations should use human sensor web Crowd sourcing platform. The study contributes to knowledge base management learning integration: practical implementation of Crowd sourcing in information systems security

    Human sensor web crowd sourcing security incidents management in Tanzania context

    No full text
    Journal of Information Security, 2018; 9: 191-208Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. Various solutions proposed do not effectively address the problematic situation of security incidents. The study proposes a human sensor web Crowd sourcing platform for reporting, searching, querying, analyzing, visualizing and responding to security incidents as they arise in real time. Human sensor web Crowd sourcing security incidents is an innovative approach for addressing security incidents affecting information systems in cyberspace. It employs outsourcing collaborative efforts initiatives outside the boundaries of the given organization in solving a problematic situation such as how to improve the security of information systems. It was managed by soft systems methodology. Moreover, security maturity level assessment was carried out to determine security requirements for managing security incidents using ISO/IEC 21827: Systems security engineering capability maturity model with a rating scale of 0 - 5. It employed descriptive statistics and non-parametric statistical method to determine the significance of each variable based on a research problem. It used Chi-Square Goodness of Fit Test ( X 2) to determine the statistical significance of result findings. The findings revealed that security controls and security measures are implemented in ad-hoc. For managing security incidents, organizations should use human sensor web Crowd sourcing platform. The study contributes to knowledge base management learning integration: practical implementation of Crowd sourcing in information systems security

    The rapid growth of cybercrimes affecting information systems in the global: is this a myth or reality in Tanzania?

    No full text
    International Journal of Information Security Science, 2014, 3(2): 182-199The main objective of this study was to determine whether the rapid growth of cybercrimes affecting information systems in the global: is a myth or reality in Tanzania. The study was undertaken using a mixed research methods. The research findings reveal that 12.8 % of users are victims of cybercrimes due to visiting unhealthy websites in cyberspace, more than 90.89% of users have been denied access to torrents/p2p applications (with malicious codes); and more than 63.29% of e-mails received by users are spam. It has been noted that Internet users has risen to 5.63 million users in 2012 out of 46.9 million of population in Tanzania; and is increasing at the rate of 416.98% per year thus expectation of 7.34 million users of Internet by December 2015. The increase in the number of Internet users has direct implication to the increase in cybercrimes affecting information systems. The Government of Tanzania has declared that “about 320 people were apprehended between July and December 2011of which over 1bn/- , Euro 8,897 and USD 551,777 reported to have been stolen through cyber”. The study concluded that there is a need for a holistic approach in addressing cybercrimes in a developing country like Tanzania
    corecore