6 research outputs found

    Effectiveness of Information Systems on Automation of Business Processes for Nonprofit Organizations in Arusha City

    Get PDF
    The study examined the effectiveness of information systems on automation of business processes for nonprofit organizations in Arusha City. The study had two specific objectives namely; identify the existing information systems for automation of business processes for nonprofit organizations in Arusha City and to determine the extent to which information systems have improved automation of business processes for nonprofit organizations in Arusha City. The study used descriptive survey research design and quantitative research approach. A sample of 63 respondents was drawn from the population of 75. The study used simple random sampling technique where data were collected through structured questionnaires. Descriptive statistics and Pearson correlation was used to analyze the quantitative data. Findings indicated that there are many information systems but not all of them exist in non-profit organizations in the study area. It was further found that to high extent information systems have improved automation of business processes for nonprofit organizations due to improved supply chain, improved Human Resources management, improved planning and projections, improved sharing of organization data, improved customer service, improved customer relations and improved time management. The study recommends that to achieve their objectives, non-profit organizations should invest in information systems. This can be done through having adequate experts, adopt the sophisticated information systems and train the users of the adopted sophisticated information systems. Moreover, the study recommends that to ensure effectiveness of information systems on automation of business processes for nonprofit organizations; proper ICT infrastructure should be initiated to facilitate the implementation of information systems

    Preventing and Combating Cybercrimes: Case of Cybercrimes Investigation Unit of Tanzania Police

    Get PDF
    The study was conducted at the cybercrimes investigation unit of Tanzania Police Force. The study investigates the current situation of Tanzania Police Force on combating and preventing cybercrimes in Tanzania and examine the effect of the current legal framework governing them on preventing and combating cybercrime. The study used a sample size of 86 respondents from cybercrimes investigation unit at Tanzania Police Force. Data collection was done by using interview guide and questionnaire. The data was analysed by using multiple regression model and thematic analysis for quantitative and qualitative data respectively. The findings show that, Cybercrimes in Tanzania is on high rate as justified by the respondents regarding on number of reported cases of cybercrimes in Dar es Salaam despite of effort shown by Police Force to battle this problem. It was also found that a unit increases in technological capability of Police Force lead to significant decreases in preventing and combating cybercrimes. Furthermore, the results show that, other things remain constant, a unit increase in the current legal framework governing the Police Force lead to significant decrease of effort on preventing and combating cybercrimes. Therefore, it is recommended that there is a need for the Police Force to invest more in acquiring new technologies well as providing continuous public awareness of cybercrimes. Also cybercrime act of 2015 as well as legal and regulatory compliances governing all cybercrimes stakeholders to be reviewed so that can enable Police Force to perform their duties of preventing and combating cybercrimes efficiently

    Effects of User Awareness on Privacy Protection of the Internet User in Tanzania. A Case Study of Drug Control and Enforcement Authority (DCEA)

    Get PDF
    This study aimed to examine the effects of user awareness on privacy protection of the Internet user. In conducting this study, the researcher employed by theory of planned behaviour by Ajzen (1985) and the descriptive research design and mixed research approach whereby data was collected from 98 respondents through questionnaire and interview. Data collected was analyzed using SPSS for quantitative data and thematic analysis was employed to analyse qualitative data obtained through interview. The results obtained from regression analysis shows that User Awareness (UA) has (β = .315, p< .001). These findings conclude that there is a positive and significant relationship between user awareness and the privacy protection behaviours among internet users. From the findings it can be concluded that user of internet needs to be aware of what data is being collected, how it be used and who will have access. This study recommends that the management of DCEA should conduct privacy impacts assessment, it also recommends that DCEA should provide an improved regular training and awareness programs for employees, moreover, it also recommends the use of data encryption services this will ensure that sensitive data are encrypted and protected in transit and at rest to protect it from unauthorized access, particularly in the event of breach or data loss. Lastly it recommends on improvement on incident response measures, whereby DCEA is required to improve its comprehensive incidence response plan for data breaches or privacy incidents, outlining how to detect, report and respond to such event promptly

    Assessing Challenges Facing Implementation of Information Security Critical Success Factors: A Case of National Examination Council, Tanzania

    Get PDF
    Aim of this study was to assess challenges facing implementation of information security critical success factors. The study employed quantitative research approach and survey research design where case study design was used. A sample of 79 respondents derived from the population sample of 372 were used by using Slovin’s formula sampling technique, 86% of respondents questionnaire filled effectively were used. Descriptive data analysis was used to analyze variables based on research questions while, statistical tables and figures were used in data presentation. Results of this study indicate that, there are challenges in implementation of information security critical success factors such as security training program, security policy, risk assessment, regular system update, system auditing and committed of top management. The study found reasons for challenges of implementation from respondent views as availability of limited resources, weak financial support from top management, lack of understanding of needed technology from information technology professionals; poor security awareness program for top management who may think that information security is the issue of information technology department only and not the whole organization. It is therefore concluded that organization should identify their specific information security critical success factors to enhance useful of organization limited resource, without investing in generalization and give solutions based on risk priority, in order to make organization secure also utilization of information security critical success factors holds significant importance in ensuring security of an organization's data. It is crucial to address and eliminate any challenges that are within the scope of affordability or manageability

    Effectiveness of Information Systems on Automation of Business Processes for Nonprofit Organizations in Arusha City

    No full text
    <p>The study examined the effectiveness of information systems on automation of business processes for nonprofit organizations in Arusha City. The study had two specific objectives namely; identify the existing information systems for automation of business processes for nonprofit organizations in Arusha City and to determine the extent to which information systems have improved automation of business processes for nonprofit organizations in Arusha City. The study used descriptive survey research design and quantitative research approach. A sample of 63 respondents was drawn from the population of 75. The study used simple random sampling technique where data were collected through structured questionnaires. Descriptive statistics and Pearson correlation was used to analyze the quantitative data. Findings indicated that there are many information systems but not all of them exist in non-profit organizations in the study area. It was further found that to high extent information systems have improved automation of business processes for nonprofit organizations due to improved supply chain, improved Human Resources management, improved planning and projections, improved sharing of organization data, improved customer service, improved customer relations and improved time management. The study recommends that to achieve their objectives, non-profit organizations should invest in information systems. This can be done through having adequate experts, adopt the sophisticated information systems and train the users of the adopted sophisticated information systems. Moreover, the study recommends that to ensure effectiveness of information systems on automation of business processes for nonprofit organizations; proper ICT infrastructure should be initiated to facilitate the implementation of information systems.</p&gt

    Existence of Similar Leptospira Serovars among Dog Keepers and Their Respective Dogs in Mwanza, Tanzania, the Need for a One Health Approach to Control Measures

    No full text
    This study investigated seroepidemiology of Leptospira serovars among the dog keepers and their dogs in the city of Mwanza, Tanzania. A total of 205 dog keepers and 414 dogs were tested for Leptospira antibodies using a microscopic agglutination test (MAT). The median age of the dog keepers was 26 (inter quartile range (IQR): 17–40) years and median duration of keeping dogs was 36 (IQR: 24–120) months. The seropositivity of Leptospira antibodies was (33/205 (16.1%, 95% CI: 11.0–21.1) among dog keepers and (66/414 (15.9%, 95% CI: 12.4–19.4) among dogs, p = 0.4745. Among the serovars tested (Sokoine, Grippotyphosa, Kenya, Pomona and Hebdomadis), the most prevalent serovar was Sokoine in both dog keepers and their dogs (93.9% (31/33) vs. and 65.1% (43/66), p = 0.009). Thirty-one out of thirty-three seropositive dog keepers (93.9%) had dogs positive for Leptospira antibodies with 28 (84.9%) having similar serovars with their respective seropositive dogs. Having tertiary education (AOR: 0.24, 95% CI: 0.07–0.84, p = 0.026) independently protected individuals from being Leptospira seropositive. More than three quarters of dog keepers had similar serovars as their dogs, necessitating one health approach to control measures in endemic areas
    corecore