(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-7 Issue-68 July-2020
Full-Text PDF
Paper Title : Cybercrimes awareness, cyber laws and its practice in public sector Tanzania
Author Name : Cesilia Mambile and Peter Mbogoro
Abstract :

The objectives of this paper was to determine the awareness of cybercrimes and cyber laws in the public sector. Since the services offered by the public sector to the citizens are the implementation of government wishes/goals. And anything that has to be completed in order to improve our country and to provide services to the people, is determined by the work of public servants. Public servants have a massive task and perform a significant role to make service provision work for the people. Nowadays, most of the public servants perform various works using the internet, but despite the fact that the internet has become a powerful platform in accomplishing our day to day activities in Tanzania, there has been a challenge public servant do not understand, that internet is not “high seas”. Most public servants know very little about cybercrimes, cyber laws and their impacts causing lack of confidentiality and integrity in Information Systems, publication of false news, theft of intellectual property and government data. The study was qualitative method whereby literature reviews, questionnaire and interviews were used to collect information. The research findings show that public servants who access internet are many compared to those who do not use because it offers tremendous benefits and it is one of the fastest developing areas of technical infrastructure development. Also, there is an increased rate of activities done using computer systems and smart phones since internet services cost is often lower compared to services outside the network. Furthermore, results show that most of the public servants are not aware of cybercrimes so they cannot take any precaution as well as they cannot protect the country and themselves from the substantial danger caused by cybercrimes. Results revealed that public servants know very little about the laws and others do not know even its existence. The government together with Higher education institutions need to provide awareness training, workshops and certification to public servants to ensure that they are aware of cybercrimes and cyber laws so that they can avoid committing cybercrimes as well as preventing their organization and the society in general against Cybercrimes.

Keywords : Cybercrimes, Cyber law, Computer misuse, Public sector, Public servants.
Cite this article : Mambile C, Mbogoro P. Cybercrimes awareness, cyber laws and its practice in public sector Tanzania. International Journal of Advanced Technology and Engineering Exploration. 2020; 7(68):119-126. DOI:10.19101/IJATEE.2020.762051.
References :
[1]https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf. Accessed 18 May 2020.
[2]Idrus SZ, Hitam NA. Social media use or abuse: a review. Journal of Human Development and Communication. 2014; 3:48-58.
[Google Scholar]
[3]Dordal PL. An introduction to computer networks. 2020.
[Google Scholar]
[4]Ciccarelli P, Faulkner C, FitzGerald J, Dennis A, Groth D, Skandier T. Introduction to Networking Basics. John Wiley & Sons; 2012.
[Google Scholar]
[5]Nfuka EN, Sanga C, Mshangi M. The rapid growth of cybercrimes affecting information systems in the global: is this a myth or reality in Tanzania?. International Journal of Information Security Science, 2014; 3(2): 182-99.
[Google Scholar]
[6]Quarshie HO, Martin-Odoom A. Fighting cybercrime in Africa. Computer Science and Engineering. 2012; 2(6):98-100.
[Crossref] [Google Scholar]
[7]Saini H, Rao YS, Panda TC. Cyber-crimes and their impacts: a review. International Journal of Engineering Research and Applications. 2012; 2(2):202-9.
[Google Scholar]
[8]https://online.norwich.edu/academic-programs/resources/cyber-law-definition. Accessed 23 June 2020.
[9]Rensleigh CW. Controlling Internet abuse through effective content filtering: a higher education implementation. South African Journal of Information Management. 2002; 4(4):1-11.
[Google Scholar]
[10]https://www.business2community.com/content-marketing/what-is-user-generated-content-and-how-it-is-relevant-02175516. Accessed 23 December 2019.
[11]https://www.softwareadvice.com/survey/surveymonkey-profile/. Accessed 18 May 2020.
[12]Law M, Stewart D, Letts L, Pollock N, Bosch J, Westmorland M. Guidelines for critical review of qualitative studies. McMaster University Occupational Therapy Evidence-based Practice Research Group. 1998:1-9.
[Google Scholar]
[13]Sadiq M. Modeling the non-functional requirements in the context of usability, performance, safety and security.2010.
[Google Scholar]
[14]https://developers.google.com/chart/interactive/docs/gallery/barchart. Accessed 18 May 2020.
[15]https://msktc.org/lib/docs/KT_Toolkit/Charts_and_Graphs/Charts_and_Graphics_Radar_508c.pdf. Accessed 18 May 2020.
[16]https://www.unodc.org/e4j/data/_university_uni_/understanding_cybercrime_phenomena_challenges_and_legal_response.html?lng=en&match=Understanding%20cybercrime:%20Phenomena,%20challenges%20and%20legal%20response. Accessed 18 May 2020.
[17]Saxena KB. Towards excellence in e‐governance. International Journal of Public Sector Management. 2005.
[Google Scholar]
[18]Müller M. Cyber Security Report 2019. Die Aktiengesellschaft. 2019; 64(19): r283-4.
[Google Scholar]
[19]Igba ID, Igba EC, Nwambam AS. Cybercrime among university undergraduates: implications on their academic achievement. International Journal of Applied Engineering Research. 2018; 13(2): 1144-54.
[Google Scholar]
[20]Venter IM, Blignaut RJ, Renaud K, Venter MA. Cyber security education is as essential as “the three Rs”. Heliyon. 2019; 5(12): e02855.
[Crossref] [Google Scholar]