<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>MIS (MASTER OF INFORMATION SECURITY)</title>
<link href="http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/40" rel="alternate"/>
<subtitle>factors Influencing the adoption of students' information system at the Institute of Accountancy Arusha</subtitle>
<id>http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/40</id>
<updated>2026-04-26T05:03:11Z</updated>
<dc:date>2026-04-26T05:03:11Z</dc:date>
<entry>
<title>The Role of Community Policing in Crrime Reduction in Tanzania</title>
<link href="http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/2560" rel="alternate"/>
<author>
<name>MWIRU, Julius</name>
</author>
<id>http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/2560</id>
<updated>2024-08-06T10:11:17Z</updated>
<published>2023-01-01T00:00:00Z</published>
<summary type="text">The Role of Community Policing in Crrime Reduction in Tanzania
MWIRU, Julius
1he current study aimed to examine the role of community policing in crime reduction in&#13;
Rombo district Kilimanjaro region, Tanzania. Specifically the study intended to identify the&#13;
types of crimes persisting, to evaluate the effectiveness of community policing strategies in&#13;
reducing crime, and to identify challenges encountered by the Police Force in administering&#13;
the Community Policing. A case study research design was employed in which Rombo district&#13;
council was taken as a case study. A total of 82 respondents were selected as a sample size. The study used interview and questionnaires as data collecting tools. The study adopted&#13;
purposive and simple randomly sampling technique to select respondents. Based on the&#13;
findings it was revealed that robbery, domestic violence, youth criminals, drug-related related&#13;
crimes, property theft, and violent crimes among others were the main crimes that exists in&#13;
Rombo district. Further, data analysis findings indicated several the effectiveness of&#13;
community policing strategies. These strategies included police force involvement, community&#13;
policing initiatives, good partnership between the police and the community, trust between the&#13;
police and the residents, awareness of CP programs &amp; initiatives, and the visibility of police in&#13;
the community. Furthermore, the study results found out that lack of enough resources, poor&#13;
community involvement in CP, Lack of training for police officers on CP, poor communications, cultural barriers, inadequacy staffing of police force, corruption, and poor public awareness&#13;
were the challenges encountered by the Police Force in administering the CP. The study&#13;
hereby concluded that Community policing strategies in Rombo District have contributed&#13;
significantly to enhancing crime reduction. It is therefore recommended that civic education by&#13;
the police to discuss with the community their role in security management and crime&#13;
prevention and encourage ownership of the practice by the local communities.
Supervisor..Dr. ABAYO, Actonijah
</summary>
<dc:date>2023-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Assessment of Post Cyber Disaster Recovery Preparedness in Higher Learning Institution</title>
<link href="http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/2558" rel="alternate"/>
<author>
<name>AMON, Fredy.W</name>
</author>
<id>http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/2558</id>
<updated>2024-08-06T10:00:30Z</updated>
<published>2023-01-01T00:00:00Z</published>
<summary type="text">Assessment of Post Cyber Disaster Recovery Preparedness in Higher Learning Institution
AMON, Fredy.W
This research Dissertation has evaluated post-cyber disaster recovery preparedness in higher&#13;
learning institutions in Arusha. It recognizes the potential risks and consequences posed by&#13;
cyber-attacks, including data breaches and system disruptions. The study has assessed the&#13;
effectiveness of existing cyber disaster recovery plans and identified opportunities for&#13;
improvement to enhance the resilience of educational institutions against cyber threats. The&#13;
researchhasemployedamixed-methodsapproach,includingbothqualitativeandquantitative&#13;
data collectiontechniques. Interviews andquestionnaires were conducted with key&#13;
stakeholders,includingITpersonnelandadministratorstotalingasampleoftwenty-six(26)&#13;
participants,togatherinsightsonthecurrentstateofcyberdisasterrecoverypreparedness. thisstudyhashighlightedthevaryinglevelsofpreparednessamonghigherlearninginstitutions&#13;
whenfacingcyberattacks.Whiletheseinstitutionsundertakepreparationssuchasdatabackups&#13;
andtraining,it'sessentialtoacknowledgetheirgeneralabsenceofaformalcybersecurity&#13;
framework.Higherlearninginstitutionsmustdevelopformalrecoveryplansforcyberdisasters&#13;
anditisbesttoadoptaninternationalstandardthatwillhelpthehigherlearninginstitutionsto&#13;
transitionsmoothlyfromdisruptionbacktofulloperationexampleofsuchastandardisISO&#13;
22301:2019businesscontinuityframework.
Supervisor..CHOGO, Pamela
</summary>
<dc:date>2023-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>The Influence of Human Behaviors on Information Systems Security Controls</title>
<link href="http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/2556" rel="alternate"/>
<author>
<name>MOHAMED, Abdi</name>
</author>
<id>http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/2556</id>
<updated>2024-08-06T09:37:03Z</updated>
<published>2023-01-01T00:00:00Z</published>
<summary type="text">The Influence of Human Behaviors on Information Systems Security Controls
MOHAMED, Abdi
The study assessed the influence of human behaviour towards information security controls. In&#13;
that regard, the user's awareness, and behaviour towards information security were assessed. The study adopted a case study design and collected data through survey questionnaires from&#13;
225 respondents with a response rate of 97,33% (219) from NSSF in Arusha, In this study, the&#13;
descriptive statistics was used to present the findings from five-point Likert Scale questions&#13;
while, logistic regression analysis was used to estimate the relationship between human&#13;
behaviours and information security controls. Generally, the findings revealed positive user awareness of information security controls within&#13;
NSSF, reflecting a high level of belief in the importance of adhering to security practices. Besides, it was revealed that there is a negative perception on the need for improved verification&#13;
practices before clicking links and occasional unauthorized software installations. For the&#13;
significance of respondents' perceptions regarding the impact of human behaviour on&#13;
information system security highlights an overall positive inclination towards information security&#13;
behaviours. Lastly, it was revealed that perceived usefulness, attitude and response efficacy&#13;
revealed significant with positive effect on information security controls while, the effect of self- efficacy revealed significant but negative. Additionally, perceived behaviour control, subjective&#13;
norms and perceived threats were not significant. The study draws recommendations to the NSSF and public sector organisation to invest in&#13;
information security awareness to all staff and external customers because threats are&#13;
originated from users of the systems. Also, the users are recommended on actively seeking&#13;
information about the benefits of information security technologies. Lastly, NSSF is&#13;
recommended not to disregard the insignificant factors but to take caution on their perceived&#13;
effects.
Supervisor..SENGATI, Frank
</summary>
<dc:date>2023-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>The Effectinenessof E-Banking Security Practices in Providing Secure Service to Clients in Tanzania</title>
<link href="http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/2555" rel="alternate"/>
<author>
<name>NNKO, Geofrey.A</name>
</author>
<id>http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/2555</id>
<updated>2024-08-06T09:30:00Z</updated>
<published>2023-01-01T00:00:00Z</published>
<summary type="text">The Effectinenessof E-Banking Security Practices in Providing Secure Service to Clients in Tanzania
NNKO, Geofrey.A
ABSTRACT&#13;
In an era of escalating digitalization, electronic banking (e-banking) has gained paramount&#13;
importance in the financial sector, offering unmatched convenience and accessibility to financial&#13;
services. However, the rapid expansion of e-banking services has raised significant security&#13;
concerns. This study aims to assess the effectiveness of e-banking security practices in safeguarding&#13;
clients in Tanzania by examining current security measures employed by banks, evaluating client&#13;
awareness of e-banking security, assessing the efficacy of security measures in protecting financial&#13;
information, analyzing the impact of security breaches on client trust, and proposing&#13;
recommendations for system enhancement. Utilizing a mixed-methods approach with 347&#13;
participants drawn from Bank X's employee pool, the thematic and descriptive analysis will be used to&#13;
finalise results from the gathered data. This research will yield critical insights into the state of e- banking security, contributing to its improvement and ensuring clients' financial well-being. The&#13;
research will contribute valuable insights into the current state of e-banking security in Tanzania,&#13;
identifying strengths and weaknesses in existing practices. Additionally, the findings will inform&#13;
recommendations for enhancing the effectiveness of security measures, addressing potential&#13;
vulnerabilities, and ensuring a more secure e-banking environment for clients in the Tanzanian&#13;
financial sector. The outcomes of this study are expected to benefit banks, regulatory bodies, and&#13;
policymakers in formulating strategies to fortify e-banking security and foster greater trust in digital&#13;
financial services.&#13;
vii
Prof. LUBUA, Edson
</summary>
<dc:date>2023-01-01T00:00:00Z</dc:date>
</entry>
</feed>
