International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 7, Issue - 68, July 2020
  1. 1
    Google Scholar
Cybercrimes awareness, cyber laws and its practice in public sector Tanzania

Cesilia Mambile and Peter Mbogoro

Abstract

The objectives of this paper was to determine the awareness of cybercrimes and cyber laws in the public sector. Since the services offered by the public sector to the citizens are the implementation of government wishes/goals. And anything that has to be completed in order to improve our country and to provide services to the people, is determined by the work of public servants. Public servants have a massive task and perform a significant role to make service provision work for the people. Nowadays, most of the public servants perform various works using the internet, but despite the fact that the internet has become a powerful platform in accomplishing our day to day activities in Tanzania, there has been a challenge public servant do not understand, that internet is not “high seas”. Most public servants know very little about cybercrimes, cyber laws and their impacts causing lack of confidentiality and integrity in Information Systems, publication of false news, theft of intellectual property and government data. The study was qualitative method whereby literature reviews, questionnaire and interviews were used to collect information. The research findings show that public servants who access internet are many compared to those who do not use because it offers tremendous benefits and it is one of the fastest developing areas of technical infrastructure development. Also, there is an increased rate of activities done using computer systems and smart phones since internet services cost is often lower compared to services outside the network. Furthermore, results show that most of the public servants are not aware of cybercrimes so they cannot take any precaution as well as they cannot protect the country and themselves from the substantial danger caused by cybercrimes. Results revealed that public servants know very little about the laws and others do not know even its existence. The government together with Higher education institutions need to provide awareness training, workshops and certification to public servants to ensure that they are aware of cybercrimes and cyber laws so that they can avoid committing cybercrimes as well as preventing their organization and the society in general against Cybercrimes.

Keyword

Cybercrimes, Cyber law, Computer misuse, Public sector, Public servants.

Cite this article

Mambile C, Mbogoro P

Refference

[1][1]https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-cyber-crime-full-report.pdf. Accessed 18 May 2020.

[2][2]Idrus SZ, Hitam NA. Social media use or abuse: a review. Journal of Human Development and Communication. 2014; 3:48-58.

[3][3]Dordal PL. An introduction to computer networks. 2020.

[4][4]Ciccarelli P, Faulkner C, FitzGerald J, Dennis A, Groth D, Skandier T. Introduction to Networking Basics. John Wiley & Sons; 2012.

[5][5]Nfuka EN, Sanga C, Mshangi M. The rapid growth of cybercrimes affecting information systems in the global: is this a myth or reality in Tanzania?. International Journal of Information Security Science, 2014; 3(2): 182-99.

[6][6]Quarshie HO, Martin-Odoom A. Fighting cybercrime in Africa. Computer Science and Engineering. 2012; 2(6):98-100.

[7][7]Saini H, Rao YS, Panda TC. Cyber-crimes and their impacts: a review. International Journal of Engineering Research and Applications. 2012; 2(2):202-9.

[8][8]https://online.norwich.edu/academic-programs/resources/cyber-law-definition. Accessed 23 June 2020.

[9][9]Rensleigh CW. Controlling Internet abuse through effective content filtering: a higher education implementation. South African Journal of Information Management. 2002; 4(4):1-11.

[10][10]https://www.business2community.com/content-marketing/what-is-user-generated-content-and-how-it-is-relevant-02175516. Accessed 23 December 2019.

[11][11]https://www.softwareadvice.com/survey/surveymonkey-profile/. Accessed 18 May 2020.

[12][12]Law M, Stewart D, Letts L, Pollock N, Bosch J, Westmorland M. Guidelines for critical review of qualitative studies. McMaster University Occupational Therapy Evidence-based Practice Research Group. 1998:1-9.

[13][13]Sadiq M. Modeling the non-functional requirements in the context of usability, performance, safety and security.2010.

[14][14]https://developers.google.com/chart/interactive/docs/gallery/barchart. Accessed 18 May 2020.

[15][15]https://msktc.org/lib/docs/KT_Toolkit/Charts_and_Graphs/Charts_and_Graphics_Radar_508c.pdf. Accessed 18 May 2020.

[16][16]https://www.unodc.org/e4j/data/_university_uni_/understanding_cybercrime_phenomena_challenges_and_legal_response.html?lng=en&match=Understanding%20cybercrime:%20Phenomena,%20challenges%20and%20legal%20response. Accessed 18 May 2020.

[17][17]Saxena KB. Towards excellence in e‐governance. International Journal of Public Sector Management. 2005.

[18][18]Müller M. Cyber Security Report 2019. Die Aktiengesellschaft. 2019; 64(19): r283-4.

[19][19]Igba ID, Igba EC, Nwambam AS. Cybercrime among university undergraduates: implications on their academic achievement. International Journal of Applied Engineering Research. 2018; 13(2): 1144-54.

[20][20]Venter IM, Blignaut RJ, Renaud K, Venter MA. Cyber security education is as essential as “the three Rs”. Heliyon. 2019; 5(12): e02855.