dc.description.abstract |
This study assessed the impacts of cyber threats on operations of public offices in Tanzania.
Specifically, the study focused on the following objectives; to determine the perceived impacts
of cyber threats on confidentiality of data, to examine the perceived impacts of cyber threats on
data integrity and to assess the perceived impacts of cyber threats on system availability in
relation to public office operations. This study was conducted in a quantitative approach
throughout data collection, analysis, and interpretation. For the purpose of this study, the Office
of the Parliament, with a total of 251 employees were used as a sample size. Data were
collected using questionnaires and were analysed through descriptive statistics with the aid of
SPSS. Findings revealed that there are perceived impacts that may be caused by cyber threats
and affect negatively public office operations, especially those which have automated its ways
of operations. The regression equation showed that a unit change in wastage of time resulted
in 0.072 units decrease in the confidentiality of data. Similarly, one unit change in value for
money resulted in 0.242 units decrease in the confidentiality of data. Furthermore, one unit
change in insufficient information disclosed to unauthorised users resulted in 0.009 units
decrease in the confidentiality of data; and a unit change in operation failure resulted in 0.122
units decrease in the confidentiality of data. In data integrity the regression showed that one unit
change in wastage of time resulted in 0.014 units decrease in data integrity, one unit change in
value for money resulted in 0.103 units decrease in data integrity, furthermore one unit change
in an information disclosure to unauthorised users resulted in 0.248 units decrease in data
integrity and a unit change in operation failure resulted in 0.152 units decrease in data integrity.
It was shown that one unit change in wastage of time resulted in 0.071 units decrease in system
availability, a unit change value for money resulted in 0.119 units decrease in system availability,
furthermore, the equation showed that one unit change in the information disclosed to
viii
unauthorised users resulted in a 0.058 unit decrease in system availability while a unit change
in operation failure resulted in 0.377 units decrease in system availability.
Based on the rule for a significance level, the study concludes that there is a significant relation
between wastage of time, value for money, information disclosed to unauthorised users and
operation with respect to data confidentiality, data integrity and system availability.
Particularly it was found that time wastage in recovering data and system, loss on value for
money by using unbudgeted money to rescue or recover the data and systems, office privacy
may be affected or compromised in case of loss of confidential data or system programme /
codes to unauthorised users, and a possibility of failure to operate in cases where data
confidentiality, data integrity and system unavailability may be breached maliciously or by
criminals. The study recommended that research should be conducted in multiple public offices
in Tanzania so that more of the information can be obtained that may give a broad picture in the
perception of the public servants or real-life know-how of the impacts of the cyber threats on
their operations. It was recommended that there is an urgent need for continuous training on
awareness and adherence to the policy and its content to all public servants as a means of
reducing risks and negative impacts associated with cyber threats. The study recommended
that there should be enough ICT personnel to help in making sure that data are safe. The ICT
personnel will be responsible for predicting problems and addressing them on time to reduce
the risk of cyber impacts. |
en_US |