THE RAPID GROWTH OF CYBERCRIMES AFFECTING INFORMATION SYSTEMS IN THE GLOBAL: IS THIS A MYTH OR REALITY IN TANZANIA?

Abstract-. The main objective of this study was to determine whether the rapid growth of cybercrimes affecting information systems in the global: is a myth or reality in Tanzania. The study was undertaken using a mixed research (quantitative and qualitative) methods. The research findings reveals that 12.8 % of users are victims of cybercrimes due to visiting unhealthy websites  in cyberspace, more than 90.89% of users have been denied access to torrents/p2p applications (with malicious codes); more than 63.29% of e-mails received by users are spam. It has been noted  that Internet users has risen to 5.63 million users in 2012 out of 46.9 million of population in Tanzania; and is increasing at the rate of 416.98% per year; with this increase rate, there will be 7.34 million users of internet by December 2015 in Tanzania. The increase in the number of Internet users has direct implication to the increase in cybercrimes affecting information systems. The Government of Tanzania has declared that “about 320 people were apprehended between July and December 2011; there are over 1bn/- , Euro 8,897 and USD 551,777 reported to have been stolen through cyber. The study concluded that there is a need for holistic approach in addressing cybercrimes in developing world countries.

[1]  Yougal Joshi,et al.  A Study on Cyber Crime and Security Scenario in INDIA , 2013 .

[2]  Hakan Senturk,et al.  Cyber Security Analysis of Turkey , 2012 .

[3]  T. Jick Mixing Qualitative and Quantitative Methods: Triangulation in Action. , 1979 .

[4]  Michael Ccna Watkins,et al.  CCNA Security Official Exam Certification Guide , 2008 .

[5]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[6]  Programmes In Tanzania MINISTRY OF EDUCATION AND VOCATIONAL TRAINING , 2007 .

[7]  A. Bola Cybercrime in Nigeria , 2010 .

[8]  Nir Kshetri,et al.  Cybercrime and Cybersecurity in the Global South , 2013 .

[9]  Roy Want,et al.  Global Perspectives , 2006, IEEE Pervasive Comput..

[10]  Philip E. T. Lewis,et al.  Research Methods for Business Students , 2006 .

[11]  Lynette Kvasny,et al.  Criminal Uses of Information & Communication Technologies in Sub-Saharan Africa: Trends, Concerns and Perspectives , 2009 .

[12]  Eric Mayer Scene Of The Cybercrime Computer Forensics Handbook , 2016 .

[13]  D. Clemente Cyber Security and Global Interdependence: What is Critical? , 2013 .

[14]  P Speck,et al.  Global perspectives , 1999, Palliative medicine.

[15]  Steven J. Ross Creating a Culture of Security , 2011 .

[16]  Jabiri Kuwe Bakari,et al.  A Holistic Approach for Managing ICT Security in Non-Commercial Organisations : A Case Study in a Developing Country , 2007 .

[17]  H. Smith,et al.  Strategies of social research : the methodological imagination , 1976 .

[18]  Glenn A. Bowen Document Analysis as a Qualitative Research Method , 2009 .

[19]  A. T. Kingsmith Virtual Roadblocks: The Securitisation of the Information Superhighway , 2013 .