THE RAPID GROWTH OF CYBERCRIMES AFFECTING INFORMATION SYSTEMS IN THE GLOBAL: IS THIS A MYTH OR REALITY IN TANZANIA?
Abstract
Abstract-.The main objective of this study was to determine whether the rapid growth of cybercrimes affecting information systems in the global: is a myth or reality in Tanzania. The study was undertaken using a mixed research (quantitative and qualitative) methods. The research findings reveals that 12.8 % of users are victims of cybercrimes due to visiting unhealthy websites in cyberspace, more than 90.89% of users have been denied access to torrents/p2p applications (with malicious codes); more than 63.29% of e-mails received by users are spam. It has been noted that Internet users has risen to 5.63 million users in 2012 out of 46.9 million of population in Tanzania; and is increasing at the rate of 416.98% per year; with this increase rate, there will be 7.34 million users of internet by December 2015 in Tanzania. The increase in the number of Internet users has direct implication to the increase in cybercrimes affecting information systems. The Government of Tanzania has declared that “about 320 people were apprehended between July and December 2011; there are over 1bn/- , Euro 8,897 and USD 551,777 reported to have been stolen through cyber. The study concluded that there is a need for holistic approach in addressing cybercrimes in developing world countries.
Keywords
References
- Africa-Review. http://www.africareview.com/News/WikiLeaks- spotlights-Tanzania-on-corruption/- /979180/1075764/-/iyjkcfz/-/index.html website on
- “WikiLeaks spotlights Tanzania on corruption” , Latest Access Time for the website is 05 March Africa Review: M. Awais, T.Samin, and M.Bilal. "Effective Business Value of Bal Information System”. IJCSI International Journal of Computer Science, Vol.8, pp.366-370, 2011.
- J. K. Bakari . A Holistic Approach for Managing ICT Security in Non-Commercial organisations A Case Study in a Developing Country. PhD Thesis. Stockholm, Sweeden: Stockholm University/ Royal Institute of Technology Department of Computer and Systems Science, 2007.
- C. M. Blanc. “The evolving challenge of identity- related crime:addressing fraud and the criminal misuse and falsification of identity”, ISPAC 2007,
- Itally, pp.284-290, 30 November − 2 December G. Bougaardt and M. Kyobe. “Investigating the Factors Inhibiting SMEs From Recognizing and Measuring Losses From Cyber Crime in South Africa”. Electronic Journal Information Systems Evaluation, Vol.14.No.2, pp.167-178, 2011.
- G. A. Bowen. “Document Analysis as a Qualitative Research Method”. Qualitative Research Journal, Vol.9.No.2, pp.27 – 40, 2009. CDC.GOV.
- Evaluation: Document Review. Technical Report. Department of Health and Human Services Centers for http://www.cdc.gov/healthyyouth/evaluation/pdf/bri ef18.pdf, 2009. Methods for Disease Control and Prevention
- M.S. I. Center. “Monthly Security Tips NEWSLETTER: Cyber Security Emerging Trends and Threats”, Multi-State Information Sharing and Analysis Center, Vol.7.No.1, pp.1-2, January 2012.
Details
Primary Language
English
Subjects
-
Journal Section
-
Publication Date
June 28, 2014
Submission Date
January 30, 2016
Acceptance Date
-
Published in Issue
Year 2014 Volume: 3 Number: 2