IAA Digital Repository

THE IMPACTS OF CYBER THREATS ON OPERATIONS OF PUBLIC OFFICES IN TANZANIA:

Show simple item record

dc.contributor.author Kajobi, Munubi
dc.date.accessioned 2022-06-03T14:22:01Z
dc.date.available 2022-06-03T14:22:01Z
dc.date.issued 2021-11
dc.identifier.uri http://dspace.iaa.ac.tz:8080/xmlui/handle/123456789/791
dc.description Thesis en_US
dc.description.abstract This study assessed the impacts of cyber threats on operations of public offices in Tanzania. Specifically, the study focused on the following objectives; to determine the perceived impacts of cyber threats on confidentiality of data, to examine the perceived impacts of cyber threats on data integrity and to assess the perceived impacts of cyber threats on system availability in relation to public office operations. This study was conducted in a quantitative approach throughout data collection, analysis, and interpretation. For the purpose of this study, the Office of the Parliament, with a total of 251 employees were used as a sample size. Data were collected using questionnaires and were analysed through descriptive statistics with the aid of SPSS. Findings revealed that there are perceived impacts that may be caused by cyber threats and affect negatively public office operations, especially those which have automated its ways of operations. The regression equation showed that a unit change in wastage of time resulted in 0.072 units decrease in the confidentiality of data. Similarly, one unit change in value for money resulted in 0.242 units decrease in the confidentiality of data. Furthermore, one unit change in insufficient information disclosed to unauthorised users resulted in 0.009 units decrease in the confidentiality of data; and a unit change in operation failure resulted in 0.122 units decrease in the confidentiality of data. In data integrity the regression showed that one unit change in wastage of time resulted in 0.014 units decrease in data integrity, one unit change in value for money resulted in 0.103 units decrease in data integrity, furthermore one unit change in an information disclosure to unauthorised users resulted in 0.248 units decrease in data integrity and a unit change in operation failure resulted in 0.152 units decrease in data integrity. It was shown that one unit change in wastage of time resulted in 0.071 units decrease in system availability, a unit change value for money resulted in 0.119 units decrease in system availability, furthermore, the equation showed that one unit change in the information disclosed to viii unauthorised users resulted in a 0.058 unit decrease in system availability while a unit change in operation failure resulted in 0.377 units decrease in system availability. Based on the rule for a significance level, the study concludes that there is a significant relation between wastage of time, value for money, information disclosed to unauthorised users and operation with respect to data confidentiality, data integrity and system availability. Particularly it was found that time wastage in recovering data and system, loss on value for money by using unbudgeted money to rescue or recover the data and systems, office privacy may be affected or compromised in case of loss of confidential data or system programme / codes to unauthorised users, and a possibility of failure to operate in cases where data confidentiality, data integrity and system unavailability may be breached maliciously or by criminals. The study recommended that research should be conducted in multiple public offices in Tanzania so that more of the information can be obtained that may give a broad picture in the perception of the public servants or real-life know-how of the impacts of the cyber threats on their operations. It was recommended that there is an urgent need for continuous training on awareness and adherence to the policy and its content to all public servants as a means of reducing risks and negative impacts associated with cyber threats. The study recommended that there should be enough ICT personnel to help in making sure that data are safe. The ICT personnel will be responsible for predicting problems and addressing them on time to reduce the risk of cyber impacts. en_US
dc.language.iso en en_US
dc.subject Impacts, Cyber, Threats, Operations, Public offices, Tanzania en_US
dc.title THE IMPACTS OF CYBER THREATS ON OPERATIONS OF PUBLIC OFFICES IN TANZANIA: en_US
dc.title.alternative A CASE OF OFFICE OF PARLIAMENT en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account