dc.description.abstract |
The pervasive utilization of information technology across various domains of a community's
political, economic, and societal spheres presents a plethora of opportunities for streamlining
administrative processes and enhancing the efficiency and efficacy of the services rendered.
Simultaneously, the deployment of information technology solutions within the public sector
necessitates ensuring the security of the resultant services. Consequently, the Information Security
Management System (ISMS) is presently being executed within the public administration institutions
in Tanzania. The significance of information systems in the provision of public services has
witnessed a notable surge, especially in the handling of official documents such as visas, work
permits, and passports within the Tunduma locality. Nevertheless, the utilization of aforementioned
systems entails noteworthy security hazards that may jeopardize the confidentiality, integrity, and
accessibility of delicate information. It is imperative to evaluate the efficacy of information security
protocols in guaranteeing the provision of dependable and secure public services. The objective of
this research is to ascertain plausible information security hazards linked to the utilization of
information systems in migration services within the Tunduma region. Additionally, this study
assessed the efficacy of existing information security measures and pinpoint areas that require
enhancement to bolster the security of information systems and guarantee the dependable
provision of public services. The objective of this study is to evaluate the efficacy of information
security measures in facilitating public service provision in the Tunduma locality. The study
concentrated on migration services, which heavily rely on information technology to process diverse
documents. This research focuses on the Tunduma migration services adopting the mixed method
approach. The study colleced data using questionnaires and interviews and the data analysed both
quantitatively and qualitatively. According to the conclusions of this study, people play a critical role
in defining an organization's information security practices. As a result, it is critical for the
organization to ensure that the benefits of employees on information security measures are
maximized. It is also established that technology policy and company policy define information
security practices at an organization. |
en_US |