1he current study aimed to examine the role of community policing in crime reduction in
Rombo district Kilimanjaro region, Tanzania. Specifically the study intended to identify the
types of crimes persisting, to evaluate ...
This research Dissertation has evaluated post-cyber disaster recovery preparedness in higher
learning institutions in Arusha. It recognizes the potential risks and consequences posed by
cyber-attacks, including data ...
The study assessed the influence of human behaviour towards information security controls. In
that regard, the user's awareness, and behaviour towards information security were assessed. The study adopted a case study ...
ABSTRACT
In an era of escalating digitalization, electronic banking (e-banking) has gained paramount
importance in the financial sector, offering unmatched convenience and accessibility to financial
services. However, ...
The use of Electronic Record Information Systems (ERIS) in public hospitals has become
increasingly popular as a means of improving healthcare service delivery. The aim of this study
is to evaluate on the effectiveness ...
In the realm of data security within tour operating firms in Arusha City, Tanzania, this study employed an
Information Security Management Theory (ISMS) framework to assess the effectiveness of interventions
in the ...
The mobile money transfer service is susceptible to fraudulent activities facilitated by a virus that
enables unauthorized financial operations, specifically targeting clients engaged in online banking.
In instances ...
In many public organizations there have been reported some data attack incidents. These attacks
cause reputational damage, theft as well as financial losses. This problem has made public
organizations including adopting ...
This study has assessed information system security in safeguarding public assets. The study
was conducted in Mpanda Municipal Council, and specifically identified information security
strategies implemented in protecting ...
In the rapidly evolving landscape of software development, traditional monolithic architectures struggle
to meet the dynamic demands of complex applications and escalating user requirements. Traditional
monolithic ...
The pervasive utilization of information technology across various domains of a community's
political, economic, and societal spheres presents a plethora of opportunities for streamlining
administrative processes and ...
The study assessed threat assessment in using mobile devices in accessing banking services in
Tanzania. It was guided by three predicting variables tested on banking services access as the
dependent variable namely ...
This study assesses the cybersecurity efficacy of Internet banking applications in Tanzania.
This novel purpose was attained through assessing existing security controls, identifying the
existing security risks i, and ...
This study examined the factors obstructing cybersecurity readiness within the Police Force –
Kilimanjaro Headquarters. Specifically, it examined technological, organizational, and
economic factors contributing to ...
Worldwide, the use of mobile technologies for health-related activities (Mobile Health) is a new but
rapidly progressing as a result of the global access to mobile telephones. The study Assessed
effectiveness of health ...
The study assessed the influence of human behaviour towards information security controls. In
that regard, the user’s awareness, and behaviour towards information security were assessed.
The study adopted a case study ...
Despite the long-standing existence and use of digital technologies to improve revenue collection in
Tanzania, it has failed to meet the expectations of some Local Government Authorities (LGAs) in Tanzania,
as they ...
The Tanzanian government has embarked on a journey to modernize and streamline immigration
services through digital platforms. This study aims to ASSESSING THE IMPACT OF E-SERVICES
ON THE DELIVERY OF QUALITY IMMIGRATION ...
This research study aimed at assessing the impact of data-driven predictive models in
minimizing student dropout rates in public higher learning institutions by using local datasets
from the Institute of Accountancy ...
This study investigated human factors compromising information system security in Tanzania's
Public Sector, focusing on Tanzania National Parks HQ. The specific objectives included
analysing human errors, personality ...