7 research outputs found
An Analysis of Behavioral Intention toward Actual Usage of Open Source Software among Students in Private High Learning Institution in Tanzania
This study focused on analyzing behavioral intention toward the actual USAge of open source software in private universities in Tanzania. Questionnaires were used to collect quantitative data in two private universities namely Iringa University and Ruaha Catholic University. Stratified sampling technique was utilized to ensure sample representativeness among two universities where simple random sampling was used to draw a sample from each stratum during the survey.
Finding Using Structural Equation Modeling indicated that performance expectancy (source code production and software localization) and social factor (Vendor, internet services provider and lecturer) have a significant influence toward behavioral intention while effort expectancy was found to be insignificant. In addition the behavioral intention was found to be significant toward student\u27s actual USAge of open source software in Universities. This study recommended that for students to develop behavioral intention toward OSS actual USAge, internet service provider have to increase the level of internet services that can assist the university communities to access and download open source software. In addition, to increase actual use, open source software vendors and lecturer or experts have to make sure that their software source code is free for distribution and localization, this will increase self-motivation and interest of the students toward actual USAge of open source software
The rapid growth of cybercrimes affecting information systems in the global: is this a myth or reality in Tanzania?
International Journal of Information Security Science, 2014, 3(2): 182-199The main objective of this study was to determine whether the rapid growth of cybercrimes affecting information
systems in the global: is a myth or reality in Tanzania. The study was undertaken using a mixed research methods. The research
findings reveal that 12.8 % of users are victims of cybercrimes due to visiting unhealthy websites in cyberspace, more than
90.89% of users have been denied access to torrents/p2p applications (with malicious codes); and more than 63.29% of e-mails
received by users are spam. It has been noted that Internet users has risen to 5.63 million users in 2012 out of 46.9 million of
population in Tanzania; and is increasing at the rate of 416.98% per year thus expectation of 7.34 million users of Internet by
December 2015. The increase in the number of Internet users has direct implication to the increase in cybercrimes affecting
information systems. The Government of Tanzania has declared that “about 320 people were apprehended between July and
December 2011of which over 1bn/- , Euro 8,897 and USD 551,777 reported to have been stolen through cyber”. The study
concluded that there is a need for a holistic approach in addressing cybercrimes in a developing country like Tanzania
Human sensor web crowd sourcing security incidents management in Tanzania context
Journal of Information Security, 2018; 9: 191-208Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. Various solutions proposed do not effectively address the problematic situation of security incidents. The study proposes a human sensor web Crowd sourcing platform for reporting, searching, querying, analyzing, visualizing and responding to security incidents as they arise in real time. Human sensor web Crowd sourcing security incidents is an innovative approach for addressing security incidents affecting information systems in cyberspace. It employs outsourcing collaborative efforts initiatives outside the boundaries of the given organization in solving a problematic situation such as how to improve the security of information systems. It was managed by soft systems methodology. Moreover, security maturity level assessment was carried out to determine security requirements for managing security incidents using ISO/IEC 21827: Systems security engineering capability maturity model with a rating scale of 0 - 5. It employed descriptive statistics and non-parametric statistical method to determine the significance of each variable based on a research problem. It used Chi-Square Goodness of Fit Test ( X 2) to determine the statistical significance of result findings. The findings revealed that security controls and security measures are implemented in ad-hoc. For managing security incidents, organizations should use human sensor web Crowd sourcing platform. The study contributes to knowledge base management learning integration: practical implementation of Crowd sourcing in information systems security
Human sensor web crowd sourcing security incidents management in Tanzania context
Journal of Information Security, 2018; 9: 191-208Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. Various solutions proposed do not effectively address the problematic situation of security incidents. The study proposes a human sensor web Crowd sourcing platform for reporting, searching, querying, analyzing, visualizing and responding to security incidents as they arise in real time. Human sensor web Crowd sourcing security incidents is an innovative approach for addressing security incidents affecting information systems in cyberspace. It employs outsourcing collaborative efforts initiatives outside the boundaries of the given organization in solving a problematic situation such as how to improve the security of information systems. It was managed by soft systems methodology. Moreover, security maturity level assessment was carried out to determine security requirements for managing security incidents using ISO/IEC 21827: Systems security engineering capability maturity model with a rating scale of 0 - 5. It employed descriptive statistics and non-parametric statistical method to determine the significance of each variable based on a research problem. It used Chi-Square Goodness of Fit Test ( X 2) to determine the statistical significance of result findings. The findings revealed that security controls and security measures are implemented in ad-hoc. For managing security incidents, organizations should use human sensor web Crowd sourcing platform. The study contributes to knowledge base management learning integration: practical implementation of Crowd sourcing in information systems security
The rapid growth of cybercrimes affecting information systems in the global: is this a myth or reality in Tanzania?
International Journal of Information Security Science, 2014, 3(2): 182-199The main objective of this study was to determine whether the rapid growth of cybercrimes affecting information
systems in the global: is a myth or reality in Tanzania. The study was undertaken using a mixed research methods. The research
findings reveal that 12.8 % of users are victims of cybercrimes due to visiting unhealthy websites in cyberspace, more than
90.89% of users have been denied access to torrents/p2p applications (with malicious codes); and more than 63.29% of e-mails
received by users are spam. It has been noted that Internet users has risen to 5.63 million users in 2012 out of 46.9 million of
population in Tanzania; and is increasing at the rate of 416.98% per year thus expectation of 7.34 million users of Internet by
December 2015. The increase in the number of Internet users has direct implication to the increase in cybercrimes affecting
information systems. The Government of Tanzania has declared that “about 320 people were apprehended between July and
December 2011of which over 1bn/- , Euro 8,897 and USD 551,777 reported to have been stolen through cyber”. The study
concluded that there is a need for a holistic approach in addressing cybercrimes in a developing country like Tanzania