The ICT initiatives and ICT use are on the rise across the global including the education sector in Tanzania. Departments, agencies, authorities, and ministries responsible for education in Tanzania have deployed information systems for delivering e-services. The focus is on ICT use in which security concern has not been fully put into consideration. Information systems (IS) are being deployed without incorporating fully security requirements during systems development lifecycle (SDLC). This result in deployed IS to be insecure. The study adopted mixed research methods, quantitative and qualitative. The study assessed and identified appropriate security requirements (security measures and security controls) for ensuring security go...
Abstract This paper presents a case study for secure e-government services adoption in Tanzani
Partial fulfillment for award of the degree of Master of Information Technologyn Kenya, rarely are c...
Educational institutions are known to be at the heart of complex computing systems in any region in ...
The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at improving effic...
In this 21st century, the world is moving more and more into the information economy; and informatio...
The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at improving effi...
This study delves into the intricate dynamics of information security culture within the Ministry of...
e-Government services are becoming one of the most important and efficient means by which government...
This study aimed to assess the effectiveness of library electronic security systems in higher learni...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informat...
Information Technology (IT) expansion exposes organisations in developing countries to IT security r...
Tanzania is among countries embarked upon the use of ICT for national development. One of the major ...
Partial fulfillment for award of the degree of Master of Information TechnologyInsecurity of informa...
Paper presented at ICT conference of 2009.Paper presented at Strathmore University Research Week on ...
This paper presents an innovative Soft Design Science Methodology for im- proving information syste...
Abstract This paper presents a case study for secure e-government services adoption in Tanzani
Partial fulfillment for award of the degree of Master of Information Technologyn Kenya, rarely are c...
Educational institutions are known to be at the heart of complex computing systems in any region in ...
The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at improving effic...
In this 21st century, the world is moving more and more into the information economy; and informatio...
The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at improving effi...
This study delves into the intricate dynamics of information security culture within the Ministry of...
e-Government services are becoming one of the most important and efficient means by which government...
This study aimed to assess the effectiveness of library electronic security systems in higher learni...
Submitted in partial fulfillment of the requirements for the Degree of Master of Science in Informat...
Information Technology (IT) expansion exposes organisations in developing countries to IT security r...
Tanzania is among countries embarked upon the use of ICT for national development. One of the major ...
Partial fulfillment for award of the degree of Master of Information TechnologyInsecurity of informa...
Paper presented at ICT conference of 2009.Paper presented at Strathmore University Research Week on ...
This paper presents an innovative Soft Design Science Methodology for im- proving information syste...
Abstract This paper presents a case study for secure e-government services adoption in Tanzani
Partial fulfillment for award of the degree of Master of Information Technologyn Kenya, rarely are c...
Educational institutions are known to be at the heart of complex computing systems in any region in ...