assessment of factors affecting cybercrimes …

90
ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES MANAGEMENT IN TANZANIA: THE CASE OF THE TANZANIA POLICE FORCE By: Jacob E. Mbembela A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Business Administration in Corporate Management of Mzumbe University 2019

Upload: others

Post on 27-May-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES

MANAGEMENT IN TANZANIA:

THE CASE OF THE TANZANIA POLICE FORCE

By:

Jacob E. Mbembela

A Dissertation Submitted in Partial Fulfillment of the Requirements for the

Degree of Business Administration in Corporate Management of

Mzumbe University

2019

Page 2: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

CERTIFICATION

We, the undersigned, certify that we have read and hereby recommend for acceptance

by Mzumbe University, a thesis entitled; Assessment of cybercrimes management in

Tanzania: the case of the Tanzania Police Force, in partial fulfillment of the

requirements for award of the degree of Masters of Business Administration on

Corporate Management.

_______________

Major Supervisor

________________

Internal Examiner

________________

External Examiner

Accepted for Mzumbe University, Dar Es Salaam Campus College

___________________________________________________________

CHAIRPERSON, DAR ES SALAAM CAMPUS COLLEGE BOARD

Page 3: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

DECLARATION

AND

COPYRIGHT

I, Jacob E. Mbembela, declare that this dissertation is my own original work and it

has not been presented and will not be presented to any other University for a similar

any other degree award.

Signature: _____________________________

Date: _________________________________

© 2019

This dissertation is a copyright material protected under the Berne Convention, the

Copyright Act 1999 and other international and national enactments, in that behalf, on

intellectual property. It may not be reproduced by any means in full or in part, except

for short extracts in fair dealings, for research or private study, critical scholarly review

or discourse with an acknowledgement, without the written permission of Mzumbe

University, on behalf of the author.

ACKNOWLEDGEMENTS

Page 4: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Research activity is an enduring experience, which needs patience, perseverance, self-

discipline, and accountability throughout right from the conception of the concept note,

proposal writing, planning and field work, to the presentation of findings. Accordingly,

research is a process that involves many people, from various disciplines and profession

who can provide moral, technical, and material support to make it successful. In this

respect, I wish to express my sincere gratitude to various individuals and institutions

for selfless contribution to the conduct of the current study.

First, I would like to thank the Almighty God for blessing me life, energy, and good

health, which enabled me to undertake this assignment without any hitches. I would

continue to pray to Almighty to continue guiding, protecting, and keeping me healthy

so that I could expend the best of my abilities to rise to the highest levels in academia

and in professional ranks. Secondly, I express my sincere thanks to my Supervisor Dr

Patrick Kihoza for his guidance, encouragement, and professional support, which he

readily and unconditionally provided to me throughout the entire process from the

conception of the concept note to the production of the dissertation.

I would also like to express my deep appreciation to Mr. Willy Mwantembe, one of my

best friends in academia who provided endless support in this endeavor.

It would be difficult to thank everybody individually, who were involved in whatever

way in providing me with invaluable assistance. However, I would like Madam A.A.

Ngoso, the Co-Compensations, and benefits Police Headquarters whose

encouragement inspired me a great deal into expending my energies and intellect into

carrying out this work.

I should lastly but least, thank my work colleagues, family members, and all dear

friends for their sacrifice and kindheartedness which were geared at making the current

research a reality. May Almighty God bless them all with enormous strength, physical

and mental abilities, and good healthy to continuously help other people, who are in

need of similar help.

DEDICATION

Page 5: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

This piece of work is dedicated to my beloved Mother D.P. Lukali, my beloved Father

Mr. E. A. Mbembela and my son’s Emmanuel, Emerson and Ethan Mbembela.

Page 6: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

LIST OF ABRREVIATIONS

DPP - Director of Public Prosecutions

OUT - The Open University of Tanzania

SPSS - The statistical Package for social Science

TCRA - Tanzania Communications Regulatory

Authority

TDV - Tanzania National Development Vision, 2025

TPF - Tanzania Police Force

TPHQ - Tanzania Police Headquarters

TRA - Tanzania Revenue Authority

WB - World Bank

Page 7: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

ABSTRACT

The main objective of the study was to assess the factors affecting the management of

cybercrimes in Tanzania and a focus on the Tanzania Police Force. The study problem

being addressed in this study is premised on the rise in the occurrence of cyber crimes

in Tanzania which has posed a threat to electronic transactions as well as financial

institutions. The Government has made initiatives to manage cyber crimes through

enactment of laws, like the Cyber Crimes Act, 2015, but the public entities empowered

to manage cyber crimes have not sustained the purpose of the initiatives to fight cyber

crimes and this is why this study examined how the Tanzania Police force is engaged

in the management of cyber crimes in Tanzania. Accordingly, the study involved

examining research questions. what Managerial mechanisms used by the Police force

in the Management of Cybercrimes, what is Level of awareness among the Police

Personnel on the Management of Cybercrimes, whether the Tanzania Police Force

Participates in Policy Forums for Managing Cybercrimes and what are the Limitations

being faced by the Tanzania Police Force in Managing Cybercrimes in Tanzania. The

study involved a sample size of the 115 respondents and the case study research design

was used in the conduct of the study. The study relied more on qualitative data and it

was collected from both primary and secondary sources through interviews and

questionnaires. The study has revealed that there is a rise in the commission of

cybercrimes in Tanzania and the Tanzania Police Force is engaged in the management

of cybercrimes though it has not been effective and this is equivalent to 23%. This

being the case, the study has also revealed the level at which the Tanzania Police

Force is aware of the cybercrime dynamics is still very minimal while at the same

time it is facing challenges in the management of cybercrimes in Tanzania. I order that

the Police Force effectively manage the cybercrimes; it ought to establish an

independent cybercrimes authority, invest in technology and forensic matters, training

of its personnel, and influence a public policy on the management of cybercrimes in

Tanzania.

Page 8: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

TABLE OF CONTENTS

CERTIFICATION ......................................................................................................... i

DECLARATION AND COPYRIGHT ......................................................................... ii

ACKNOWLEDGEMENTS .......................................................................................... ii

DEDICATION ............................................................................................................. iii

LIST OF ABRREVIATIONS ....................................................................................... v

ABSTRACT ................................................................................................................. vi

LIST OF TABLE .......................................................................................................... x

LIST OF FIGURES ..................................................................................................... xi

CHAPTER ONE ......................................................................................................... 1

INTRODUCTION AND BACKGROUND ............................................................... 1

1.0 Introduction ............................................................................................................. 1

1.1 Problem statement ................................................................................................... 3

1.2 Objectives of the Study .......................................................................................... 5

1.2.1 Main Objective of the Study ................................................................................ 5

1.2.2 Specific Objectives of the Study .......................................................................... 5

1.3 Research Questions ................................................................................................. 5

1.4 Significance of the study ......................................................................................... 5

1.5 Scope of the Study .................................................................................................. 6

1.6 Limitations of the Study .......................................................................................... 7

CHAPTER TWO ........................................................................................................ 9

LITERATURE REVIEW ........................................................................................... 9

2.1 Introduction ............................................................................................................. 9

2.2 Definition and Conceptualization of terms ............................................................. 9

2.2.1 Cyber Crime ......................................................................................................... 9

2.2.2 Cyber Bullying: .................................................................................................. 10

2.2.3 Cyber space ........................................................................................................ 11

2.3 An overview on the genesis of cybercrimes ......................................................... 12

2.3.1 Categories of cybercrimes .................................................................................. 13

Page 9: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

2.3.2 An overview on cybercrimes in Tanzania .......................................................... 13

2.3.3 The OECD Guidelines for the Security of Information Systems ...................... 14

2.3.4 The Deauville Declaration for protection of the Internet ................................... 15

2.3.5 The Cybercrimes Act in Tanzania ..................................................................... 16

2.3.6 Main Approaches to cybercrimes in Tanzania ................................................... 17

2.4 Relevant theories to the Study .............................................................................. 19

2.5 Empirical literature ............................................................................................... 23

2.6 Conceptual Model of the Study ............................................................................ 24

CHAPTER THREE .................................................................................................. 26

RESEARCH METHODOLOGY ............................................................................ 26

3.1 Introduction ........................................................................................................... 26

3.2 Research Design .................................................................................................... 26

3.3 Area of Study ........................................................................................................ 27

3.3 Study Population ................................................................................................... 27

3.4 Sample size ........................................................................................................... 28

3.5 Sampling Techniques ............................................................................................ 28

3.5.1 Sampling Procedures .......................................................................................... 29

3.6 Data Collection Methods ...................................................................................... 29

3.7 Ethical considerations ........................................................................................... 32

3.8 Data management framework for the study .......................................................... 32

CHAPTER FOUR ..................................................................................................... 36

DATA PRESENTENTION, ANALYSIS, AND DISCUSSION OF FINDINGS . 36

4.1 Introduction ........................................................................................................... 36

4.2 Demographic Data of the Respondents ................................................................. 36

4.3 Managerial mechanisms used by the Police Force in the Management .............. 38

4.4 Level of awareness among the Police Personnel on the Management of ............. 43

4.5 Participation of the Tanzania Police force in Policy processes on Managing ...... 49

4.6 Limitations being faced by the Tanzania Police Force in Managing .................... 51

CHAPTER FIVE ....................................................................................................... 54

SUMMARY, CONCLUSION AND RECOMMENDATION ............................... 54

Page 10: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

5.1 Introduction ........................................................................................................... 54

5.2 Summary of study findings ................................................................................... 54

5.3 Conclusion ............................................................................................................ 55

5.4 Recommendation .................................................................................................. 57

5.5 Suggestion for further study .................................................................................. 59

REFERENCES .......................................................................................................... 60

APPENDICES ................................................................................................................... 62

Page 11: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

LIST OF TABLE

Table 3. 1: Sample Size adopted and used in the Study ............................................. 28

Table 4. 1: Sex of the Respondents ............................................................................. 37

Table 4. 2: Ages of the Respondents ........................................................................... 37

Table 4. 3: Education Levels of the Respondents ...................................................... 38

Table 4. 4: Involvement of the Police force in Managing Cybercrimes ..................... 38

Table 4. 5: Views on the Existence of Forums ........................................................... 39

Table 4. 6: Forums within which the Tanzania Police Force manages cybercrimes .. 39

Table 4. 11: Common cybercrimes Committed .......................................................... 45

Table 4. 12: Data Management in managing cybercrimes .......................................... 46

Table 4. 13: Institutions networking with the Police in Managing Cybercrimes ....... 47

Table 4. 14: Extent to which the Police Force is aware of the Dynamics ................. 48

Table 4. 15: Level of awareness .................................................................................. 49

Table 4. 15: Participation of the Tanzania Police Force in Policy Forums ................ 50

Table 4. 16: Policy forums in which the Police Participates ...................................... 50

Table 4. 17: Challenges being faced in managing cybercrimes .................................. 52

Page 12: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

LIST OF FIGURES

Figure 2. 1: Conceptual Model of the study ................................................................ 25

Page 13: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

CHAPTER ONE

INTRODUCTION AND BACKGROUND

1.0 Introduction

Recently, both Private and Public Sectors have strived to create and develop responses

to the drastic growth in the use and development of Information technology across the

globe (Ghosh and Turrini, 2011). It is believed that, Pubic Organizations, which are

engaged in the provision of public services, may not adequately provide service in the

dynamic society. The Police Force in Tanzania for example may not provide the

expected policing and security services towards meeting the expectations of the Public

in the dynamic society. Nevertheless, the growth of the use and adoption of Technology

has influenced the growth of the commission of organized or white-collar crimes such

as cybercrimes in Tanzania. The Police force in Tanzania is one of the Public

Institutions, which are mandated to carry out investigations with the aim of curbing

cybercrimes in Tanzania.

Background of the Problem

A cybercrime is an offence someone commits versus somebody else or a group of

people via electronic means and other communication networks including the internet

social media, electronic mails, or mobile phones in the form of text messages. as is the

case with any other crime, cybercrime poses a threat the security at individual,

institutional, and national levels (Ghosh and Turrini, (2011)

However, for the past few years, the increase number of cybercrimes has led to the

emergence of factors that influence the Tanzania Police Force ability in managing

cybercrimes. This study therefore aims at examining the factors that influence the

Tanzania Police Force ability in managing cybercrimes in Tanzania.

Cybercrimes in Tanzania are growing exponentially via electronic means. In big cities

such as Arusha, Dar es Salaam, Mbeya, and Mwanza, there have been repeated

incidents of cybercrimes. For instance, one traditional doctor in Mwanza used to be

Page 14: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

receiving money fraudulently via tigopesa. The culprit was later apprehended by

cybercrimes unit of the Tanzania Police Force through the assistance of Tigo cyber and

forensic control team. (URT, 2012).

The Economic case no 31of 2019 where one person obtained total TShs.

123,000,000/= (One hundred twenty three million) from different people fraudulently

through mobile money transfer using 629 SIM cards.

This incident posed a formidable threat to our society particularly among young people

who may be obsessed by offences such as cyber pornography and pose a threat to

almost all financial transaction carried out within the financial institutions such as

commercial Banks (Abdallah, 2012).

In the year, 2013, cybercrimes were reported to have caused enormous losses to the

financial sector in Tanzania. According to the World Bank report (World Bank, 2014),

almost TZs. 1 billion wasstolen through cybercrimes. This poses a huge problem to the

financial sector and the government at large especially in the developing countries

including Tanzania. however, the advancement of information Communication

Technology have made it possible for may cybercrime criminals within and outside the

country have been identified, apprehended and brought to the court of law for

prosecution.

This trend has largely been attributed to many factors that have made public institutions

that are directly engaged in such crime face challenges in the Management of

cybercrimes. A good example of such public institution is the Tanzania Police Force.

Upon the realization of this challenge, the Government enacted the Electronic and

Postal Communications Act (EPOCA) of 2010 as well as the Anti money laundering

Act, 2006 to deal with cybercrimes. In order to protect the entire public against the rise

in the commission of cybercrimes, the government recently mobilized efforts of the

Tanzanian Police Force, the Tanzanian Revenue Authority (TRA), institutions in the

Financial sector, the Media and the Tanzania Communications Regulatory Authority

Page 15: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

(TCRA) to raise awareness among the public on what cybercrime is and how it could

be effectively managed. (World Bank, 2014)

Accordingly, in the year 2017, the Director of Public Prosecutions (DPP) affirmed that

cybercrime offences, which involved the use of high technology such as money

laundering and financial terrorism, were increasingly becoming a menace in our midst.

Apparently, all business and other communications are currently occurring online, and

not necessarily requiring any interaction with the parties involved in the transaction.

In this regard, criminals have found the internet a fertile ground for committing

criminal activities anonymously and with impunity. Thus, there are some policy and

legal initiatives, which the Government has taken including the enactment of the

National ICT policy, 2003, the Electronic Communications and Transactions Act,

2002, the Electronic Evidence Amendment Act, 2007 and the Electronic and Postal

Communication Act, 2010 (EPOCA) to make electronic evidence as valid in a court of

law.

In addition, the Government has strengthened the systems of operations of the Public

institutions, which are charged with the responsibility of investigating and managing

cybercrimes in Tanzania (URT, 2012). Despite these initiatives, there is a drastic rise

in the rate of cybercrimes within Tanzania society. This is the motivation this study

which was set to examine the Management of Cybercrimes in Tanzania with the focus

on the Tanzania Police Force.

1.1 Problem statement

Cybercrime is a global problem that is engulfing the world at an alarming rate and

Tanzania is not an exception. Cybercrime is a unique threat that can be carried out from

anywhere against any computer system or user in the world. It is a global evil, which

is increasingly and becoming difficult to control (Abdallah, 2012). As a result,

governments, businesses, and individuals all over the world are facing serious financial

threats and new challenges of combating cybercrimes. Its presence and impacts have

Page 16: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

been felt by the Banks and all individuals who have been e engaged in provision of

services electronically in Tanzania (Abdallah, 2012).

The threats of cybercrimes have been made severe through the use of the Internet

based Information Systems(IS’s) including mobile money transfer services such as M-

Pesa, Tigopesa, and Airtel-Money, public apathy on reporting cybercrime, lack of

strong management frameworks, and exposure of Internet users to weak security

controls for Internet based Information Systems (IS’s)(URT, 2017).

Moreover, a large proportion of cybercrimes occurring in in Tanzania go unreported

and they are poorly managed by the Institutions engaged in the control of cybercrimes.

The problem is that, the country is overwhelmed by an increase of. From January 2010

to June 2013 alone, there have been countless cyber-criminal infiltrations on

websites/ISs (URT, 2017)

Some of the institutions whose electronic systems have been during this include the

National Bureau of Statistics (NBS), Tanzania Commission for Universities (TCU) and

the National Council for Technical Education (NACTE), Open University of Tanzania

(OUT), Chemi, and Cotex Company Limited. As observed by Kalunde(URT, 2017)

the cybercrimes occurring in Tanzania involve computer system’s infiltration, data

hacking, illegal access of IPs, ATM hacking , and service blocking; as indicated at the

beginning of this paragraph, the cybercrime victims have been government agencies,

the financial institutions, private businesses, public and private universities, and the

public in general).

According to Government report (2012), 230 have so far been arrested over

cybercrime. The report indicates further that there was over 1bn/-, Euro 8,897 and USD

551,777 which are reported to have been stolen through cybercrime implying if efforts

are not made to address the problem, matters are likely to get worse (URT, 2012). This

trend has raised concerns on how Public institutions ought to be engaged in the control

and management of cybercrimes. Literature has done little to elaborate the role of the

Page 17: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

police force in managing cybercrimes. This is why this study is aimed at examining the

Management of Cybercrimes in Tanzania with the case of the Tanzania Police Force.

1.2 Objectives of the Study

1.2.1 Main Objective of the Study

The Main objective of the study was to assess the factors affecting the cybercrime

management in Tanzania with the case of the Tanzania Police Force.

1.2.2 Specific Objectives of the Study

i) Specifically, the study intends to assess effectiveness of the managerial

mechanisms used by the Police Force in the management of cybercrimes in

Tanzania

ii) Assess the level of awareness among the Police personnel on the management of

cybercrimes in Tanzania

iii) Investigate the participation of the Tanzania Police Force in Policy Forums for

managing cybercrimes in Tanzania

iv) Identify the limitations faced by the Tanzania Police Force in managing

cybercrimes in Tanzania

1.3 Research Questions

The study seeks to examine the following research questions

i) How effective are the managerial mechanisms used by the Police force in the

management of cybercrimes in Tanzania.

ii) What is the Level of awareness among the Police personnel on the management of

cybercrimes in Tanzania

iii) What is the level of the Tanzania Police Force Participation in the Policy Forums

for managing cybercrimes in Tanzania

iv) What are the limitations being faced by the Tanzania Police Force in managing

cybercrimes in Tanzania

1.4 Significance of the study

The conduct of any study is justified by its significance and this study is justified in the

following areas.

Page 18: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

i) Development of Literature Vis-a –Vis addressing the empirical gap:-

One of the significance of this study is adding literature on the issues affecting the

management of cybercrimes by the Tanzania Police Force, which to the best of my

knowledge, has not received much attention. The contribution of literature involved

identifying the relevant theories discussed in literature reviews by demonstrating the

relationship between the causal factors and the management of cybercrimes.

ii) Generation of Information for Policy makers: -

Policy makers ‘decisions have a direct impact on any matter that may potentially posea

threat to corporate and financial businesses transactions including cybercrimes and how

the Police force ought to manage such crimes for public benefit and safety. This

requires evidence based information and in this context, this study examines and

assesses the factors that facilitate or constrain the management of cybercrimes in

Tanzania especially by the Police force.

iii) Institutional Performance: -

The study findings are likely to provide the Tanzania Police Force with a platform of

managing cybercrimes in Tanzania Police Force. The findings may also help the Force

devise mechanisms of improving the existing approaches and framework of control,

management, and elimination of cybercrimes and thus become a platform for strategic

planning by the Police force best practices managing the dynamic and complex issues

surrounding cybercrimes in Tanzania.

iv) To the Researcher; -

Accordingly, the study will serve as a requirement for the completion of a Master’s

degree at Mzumbe University.

1.5 Scope of the Study

The study mainly focused on the assessments of factors affecting the Cybercrimes

Management in Tanzania with the case of the Tanzania Police Force. The study was

conducted at the Tanzania Police Headquarters situated in Dar es Salaam.

Page 19: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

1.6 Limitations of the Study

In conducting the study, the researcher experienced the following study limitations:-

i) Privacy and confidentiality

Considering the nature of the study and the involvement of respondents from within

the Police force and some other financial and corporate institutions, which the

researcher included in the sample, some of the information was treated as confidential.

The researcher ensured that the respondents ‘rights to privacy and confidentiality were

observed while collecting data from them.

ii) Extraction of relevant Literature

The study focused on the assessment of factors that affect the management of

cybercrimes in Tanzania and more specifically on part of the Tanzania Police force.

The reviewed literature has made empirical projections on the causes and impacts and

not on how cybercrimes ought to be managed in, implementing the formulated laws

and regulations and their control by the Tanzania Police Force and this was to be dealt

with by this study. Therefore, considering the nature of the study and the confidentiality

of the data and information to be collected, the researcher had the obligation of

extracting relevant Literature. this was done by drawing insights from the existing

literature on how cybercrimes have constrained the performance of corporate entities

and how the Tanzania Police Force can control and manage the cause vis-à-vis the

threat of Cybercrimes while implementing the law. This thus involved an extraction of

literature from Journals, Published reports, and policies to that effect.

iii) Financial Constraints: -

In the study, the researcher experienced financial constraints during designing and

preparing the data collection instruments, which would effectively been used in

gathering and collecting responses from the respondents and piloting from within the

work place of the respondents. Accordingly, in the process of compilation of the

research report, the researcher needed more funds.

Page 20: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

iv) Pre-testing the Data Collection tools: -

In the Process of pre-testing the data collection instruments, especially pretesting the

self-distributed questionnaires, the pre-testing exercise was conducted to more than 20

respondents. In the first pretesting exercise, the researcher identified the respective

respondents to participate in the pre testing and the results or feedback obtained was

used in -correcting the data collection instruments and this required money and time.

v) Anticipated Delays caused by Respondents in returning the questionnaires on

time:-

The other which by the researcher in the study process, is that, many of the targeted

respondents were either employees who were at work or those who are engaged in

economic activities and this is likely to affect the time within which the questionnaires

were returned back to the researcher. Never the less, this limitation was addressed

through using self-administered questionnaires.

Page 21: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

CHAPTER TWO

LITERATURE REVIEW

2.1 Introduction

This Chapter reviews literature explored in relation to the study and defines the

concepts cybercrimes and cyber space. The chapter would also provide an overview

and genesis on cybercrimes in Tanzania, categories of cybercrimes in Tanzania, main

approaches to cybercrimes in Tanzania and the relevant theories for the study. The

section further provides for the empirical and conceptual model of the study.

2.2 Definition and Conceptualization of terms

2.2.1 Cyber Crime

Cybercrime is used to refer to all criminal incidents, which are committed through

computers, the Internet, cyberspace, and the worldwide web (Ndumbaro, 2010).

Although there is no consensus on what the terms entails cybercrime encompasses any

criminal activity, which is committed using computers and other electronic networks

(Abdallah, 2012).

These activities encompass illegal downloading of artistic files such as music to

combing millions of any currencies using online banking transactions. other non-

monetary offences such as creating and transmitting viruses or malware on other

computers or posting confidential business information on the Internet (Tushabe and

Baryamureeba, 2013) the widely practiced form of cybercrime is impersonation,

whereby, criminals on line accounts to steal other people’s data (Magalla, 2013)

Shinder (2002) defines cybercrimes as the sub category of computer crimes where the

offences are committed by the use of internet or other computer networks. In this case,

the computer or a network can be involved separately crimes in different ways.

Computer networks can be the tool used in committing crimes, they can also be victims

in commission of offences, and they can be used for incidental related to the offences.

Page 22: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Shinder, (2015) further argues, cybercrimes can be categorized into three classified

steps, and in this regard, cybercrimes are crimes where the computer network becomes

the main target of criminal activities. In addition cybercrimes are the existing offences

whereby the computer is an enabling tool of committing an offence. The third category

is that cybercrimes are crimes whereby computers are used in committing the crime,

which may reveal evidence of the offence committed.

The cybercrime Act, 2015 of the United Republic of Tanzania has no definition of

cybercrime. However, under Section 31 of the cybercrimes Act, 2015 confers to the

Police officer in charge of a station, the powers of searching and seizing whatever tools

which have either been used as evidence or acquired by any person as an impact of

offence, free entrance of premises to conduct search and seizing any device or computer

system.. In addition, Section 32 of the Act empowers the Police Officer to issue an

order against any person who is possessing undisclosed data for usage by investigators

or prosecutors (Magalla, 2013).

2.2.2 Cyber Bullying:

This is the form of crime, whereby minors use -capable devices in the Internet, to

persistently intimidate, cajole, or ridicule other minors. The age limit of the offender

and the makes this crime part of cyber stalking, involving adults instead of minors as

victims/offenders (Onella, 2012)

Cyber stalking;

this is another form of criminal activity which is repeated in more than one occasion

whereby the offender transmits invited contact, discriminatory or sexual advances, or

intimidation of violence through interpersonal communications technologies (ITC)

(Onella, 2012). Accordingly, cyber stalking entails using the Internet. It also may

however be committed offline using other electronic media instruments including

mobile phones. Cyber stalking can also entail the offender damaging their victim's

identity, causing them harm, annoying the offended by signing them up for email

bombs, or damaging computer data or equipment of the victim (Olena, 2012).

Page 23: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Hacking: -

Computer hacking is entails accessing of a computer and network system by the

criminal intruder without any authorization from the account holder or manipulating

with the intent of stealing or using information for committing a crime for another

person (Singh, 2012). Usually, computer hackers are very skilled and can write a

code/program to destabilize or decode a computer or a network system (Singh, 2012).

Another form of hacking is by reconstructing a security password of a user, and thereby

attempting to enter the system for evil intentions. Furthermore, they decrypt any critical

data forwarded via the internet and these may include credit cards especially in online

businesses (electronic commerce) by inserting a software that would every key and

record their details (Kamanda, 2013).

When hackers invade the system and access critical institution’s data, including

business plans, details on customer profiles, and other confidential information, the

affected company or an institution suffers great deal of losses. Attackers may also trade

stolen information to other business competitors. They may make customers run away

from a company whose data have been infiltrated to another company whose security

systems are more secure.

In addition, criminal may transmit malwares to other computer systems and cause

disappearance or damage to crucial data (Abdallah, 2012). Often, websites are

infiltrated by criminals and make them inaccessible causing havoc especially to

business website users. There is also a challenge of using someone else’s identification

to send messages to other people using email (Olena, 2012).

2.2.3 Cyber space

Cyberspace crime has increased tremendously in recent years. Currently, cybercrimes

are commonly occurring in many jurisdictions through Cyberspace. The word

cyberspace was first coined by the author William Gibson in his sci-fi novel

Neuromancer (1984) as-

Page 24: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

“A metaphor for describing the non-physical terrain created by computer systems.

Online systems, for example, create a cyberspace within which people can

communicate with one another (via e-mail), do research, or simply window shop. Like

physical space, cyberspace contains objects (files, mail messages, graphics, etc.) and

different modes of transportation and delivery. Unlike real space, though, exploring

cyberspace does not require any physical movement other than pressing keys on a

keyboard or moving a mouse”(Dalla and Geeta, 2013).

In this regard, the virtual world, which is existing in the domain of cyberspace, is

without borders and this created space for cybercrimes, which are more less internet-

based crimes.

2.3 An overview on the genesis of cybercrimes

The first cybercrime is reported to have in the year 1820. This is indisputable because,

computer came into existence from 3500 BC in India, China, and Japan. The first virus

for a personal computer was traced back to 1980, however, the world was largely

unaware until the Melissa virus began to infiltrate millions of computers in the late

March 1999 and which involved the New Jersey State Police and the Federal Bureau

of Investigation (Mambi, 2010).

In the earlier days, around 1970s, information security was only employed to business

computer systems whose focus was on preventing fraudulent activities. the protection

is needed t to deal with such sensitive data as leaks (privacy), worms that affect the

operations of some critical applications (integrity), damaging of important systems

(accessibility), or compromising of users confidential information (theft) (Ollena,

2012).

In Tanzania, optic fiber is currently becoming the National pillar infrastructure for

various ISs (URT, 2012). Optic fiber is widely used after the landing of submarine

cables (EASSY, and SEACOM) and development of the national optic fiber

(NICTBB). This development of national optic fiber in Tanzania and similar

developments elsewhere have made the manner in which countries have to secure their

assets of national interest more complicated (TCRA, 2013). Cybercrimes have now

Page 25: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

been widely reported in many other countries around the globe as a result of rapid

development of their web based infrastructure ISs and their internet connectivity. The

phenomenon expansion of cyberspace-based crimes has led to an increase of challenges

in ensuring the security of ISs and thus a rapid increase in the occurrence of

cybercrimes and rising concerns on how the police manage it (TCRA, 2013).

2.3.1 Categories of cybercrimes

There are four main categories of cyberspace-based crimes as follows:

Cybercrime against individuals: This category involves intimidation through

electronic mails, cyber-stalking, transmission of vulgar and immoral material, slander,

unsanctioned control/access to the computer system (hacking), offensive exposure,

email deceiving, spam, dishonesty and deception (Mambi, 2010)

Cybercrime against individual property: This category includes swindling of credit

cards, computer sabotage, spreading of mischievous code (virus/worm/Trojans),

unsanctioned control/access over computer system (hacking), intellectual property

crimes (software piracy: unlawful copying of programs, dissemination of copies of

software, breach of copyright; infringement of trademarks, stealing of computer

source code), and stealing of internet time (Magalla, 2013

Cybercrime against organization: this category involves blocking of service, email

bombing, salami attack, logic bomb, Trojans horse, data diddling, and unsanctioned

control/access over computer system, possession of unauthorized information,

dissemination of plagiarized software and cyber terrorism against the government,

organization and other entities (Singleton, 2014).

Cybercrime against society at large: This category involves absence images

(basically child pornography), corrupting the youth through offensive exposure, illegal

trading, financial crimes, and sale of unlawful articles, online betting, counterfeit, and

web jacking (Singleton, 2014).

2.3.2 An overview on cybercrimes in Tanzania

Page 26: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

The global reach and the omnipresence of the Internet have created of wants,

privileges, and susceptibilities to both developed countries and developing countries

including Tanzania. To enable to make secure electronic transactions, there has to be

an environment of trust, which must be sustained through the legal and regulatory

mechanisms (Ndumbaro, 2010).

Cybercriminals worldwide are persistently looking for gaps, which would be utilized

to do criminal activities. A country with insufficient cyber-law is principally providing

an avenue for cyber-criminals to operate freely. Cybercrime poses a huge challenge to

Information and Communication Technology (ICT) industry in the country. This is

particularly so as Information and Communication Technologies (ICTs) especially

mobile phones and the use of the internet and the related e-communication services

have permitted our life systems in this country (URT, 2010).

Over 500 Tanzania people have been arrested by the Cybercrime Unit between 2011

and 2012 over cybercrime activities. According to the Government,(URT, 2010) after

reinforcing the Cybercrime Unit in the country, the battle against cybercrimes has

started to produce fruits and that about 320 people were arrested between July and

December 2011 (URT, 2010). According to the Government, report (URT, 2010).In

year 2012, 230 people were detained over cyber crime. The report indicates further that

over 1bn/-, € 8,897 and $ 551,777 are said to have been stolen through cybercrime.

This is posing a huge challenge to the Government, which has limited resources to be

expended in addressing the problem

2.3.3 The OECD Guidelines for the Security of Information Systems and

Networks

These guidelines were first released by the Organization for Economic Cooperation

and Development (OECD) in September 2002.The guidelines are given with the aim

of developing security and confidentiality in the Digital World among member

countries. These are meant for players in the information system and network to create

consciousness and understanding of security matters in the Digital worlds. The

Page 27: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

guidelines, which are the basis for building a tradition of security in the society are as

follows:-

Awareness: awareness of the necessity for safety of information systems and networks

and what players can do to improve security (OECD, 2002).

Responsibility: All players are accountable for maintaining the security of information

systems and Networks (OECD, 2002)

Response: Players should act in an appropriate and co-operative manner to avert,

identify, and respond to security events.

Ethics: Players should respect the genuine interests of others. (OECD, 2002)

Democracy: The security of information systems and networks should be well

matched with essential values of a democratic society (OECD, 2002)

Risk assessments: Players should conduct risk assessments.

Security design and implementation: Players had better incorporate security as

essential elements of information systems and networks. Security management: Players

should embrace a comprehensive approach to security managements (OECD, 2002)

Reassessment: Players should review and reassess the security of information systems

and networks, and make suitable adjustments to security policies, practices, measures,

and procedures (OECD, 2002).

2.3.4 The Deauville Declaration for protection of the Internet

On 26th May 2011, the G8 countries established the Deauville Declaration for Internet

and resolved that its core principles have to be implemented and must be included in a

broader framework. the framework focusing on the rule of law, human rights and basic

freedoms, the protection of intellectual property rights, which motivate life in every

independent society for the advantage of all the people(Yonazi, 2012).

Page 28: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

More importantly, it was strongly believed that freedom and security, transparency,

and the respect for privacy and the exercise of rights and accountability have to be

attained together. Both the framework and principles must receive similar protection,

with the same assurances, on the Internet as everywhere else (Yonazi, 2012). This

declaration was meant to harmonize the computer and cybercrime laws and averting

the occurrence of safer heaven cybercriminals. It is recommended that the formation of

laws and a wart against offender sought to be taken together to attain the objectives

(Yonazi, 2012).

2.3.5 The Cybercrimes Act in Tanzania

The Tanzania Cybercrimes Act of 2015 is one of the main Laws governing and

regulating issues of cybercrimes in Tanzania. In this context, this is the principal law

that sets out the offences or the cybercrimes that can be committed and the prescribed

penalties. For instance the Act provides in relation to cybercrimes offences that;

4.-(1) A person shall not intentionally and unlawfully access or cause a computer

system to be accessed.

(2) A person who contravenes subsection (1) commits an offence and is liable, on

conviction, to a fine of not less than three million shillings or three times the value of

the undue advantage received, whichever is greater or to imprisonment for a term of

not less than one year or to both. (URT, 2015)

5-(1) A person shall not intentionally and unlawfully, remain in a computer system or

continue to use a computer system after the expiration of time, which he was allowed

to access the computer system.

(2) A person who contravenes subsection (1) commits an offence and is liable, on

conviction to a fine of not less than one million shillings or to imprisonment for a term

of not less than one year or to both (URT, 2015. The above are some of the cybercrimes

that can be committed.

The act further provides that,

7.-(1) A person who intentionally and unlawfully-

Page 29: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

(a) damages or deteriorates computer data;

(b) deletes computer data; (URT, 2015)

(c) alters computer data;

(d) renders computer data meaningless, useless, or ineffective;

(e) obstructs interrupts or interferes with the lawful use of computer data;

(f) obstructs, interrupts or interferes with any person in the lawful use of computer

data; or

(g) denies access to computer data to any person authorized to access it, (URT, 2015)

commits an offence and is liable on conviction, to a fine of not less than ten million

shillings or three times the value of undue advantage received, whichever is greater,

or to imprisonment for a term of not less than three years or to both (URT, 2015) The

act provides inter-alia, many issues that regard cybercrimes in Tanzania.

2.3.6 Main Approaches to cybercrimes in Tanzania

Tanzania does not have one harmonized framework of regulating cyber related crimes.

Most of these frameworks are presented in a disjointed form. These mechanisms may

be divided into the following main classifications:

Legislative Forms:-

The Tanzania economy and the business world have been subjected to a rise of cyber

rimes and the question has always been whether the subsequent reforms of managing

cybercrimes and the related offences have done anything to reverse the situation (URT,

2010). And so follows the review of the efficiency of the cyber law related reform,

which started in earnest from the year 2007. The country has achieved tremendous

success in disseminating ICT (Ndumbaro, 2015).

This development, which has been well received by people and Internet service

providers (ISP) who are were struggling to respond to unprecedented omnipresence of

the Internet, have given rise to new forms of wants, privileges, and created and

sustained through the legal and regulatory framework (Mambi, 2010).

It is evident that the amended Evidence Act, the National Science, and Technology

Policy, the Tanzania Development Vision of 2025 and at least four previously drafted

Page 30: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

bills, which are, now acts of Parliaments by the Law Reform Commission. The bills

are as follows; Electronic Evidence Act, (2013), Electronic Transaction and

Communication Act, (2013), Cyber and Computer Related Crimes Act, (2013), Data

and Privacy Protection Act, (2013), were the initiatives of the Government of Tanzania

in going abreast with the e-technology industry. These aimed at creating a legislative

approach aiming at reversing the situation in adopting and combating cybercrimes in

Tanzania (URT, 2010).

Government-based Advisory and Regulatory bodies:-

On the part of regulatory and advisory bodies, Tanzania established the TCRA

(Tanzania Communications Regulatory Authority) which is under the Ministry of

Communications. The TCRA), which was started by the TCRA Act, is an independent

organ for the postal broadcasting and electronic communications sectors and the

Tanzania Police Force in the United Republic of Tanzania (URT, 2010).

However, TCRA is a merger between the then Tanzania Communications Commission

and the Tanzania Broadcasting Commission, and whose roles are licensing, and

regulating postal services, broadcasting services and electronic communications

sectors in the United Republic of Tanzania. This organ is also monitoring the

implementation of Information Computer Technology (ICT) application) (Yonazi,

2012). It is worth noting nevertheless that the foregoing] development of the licensing

framework focuses on the expansion of more ICT infrastructure and not on the

appropriate use and protecting of users from criminal practices. This because there was

very limited development of ICT services with less than 150,000 people using

computers and related services. This gives another arena for many more organizations

coming up with ways of controlling and combating cybercrimes (Yonazi, 2012).

Page 31: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

2.4 Relevant theories to the Study

The study was guided by the following theories:-

The Basic Strategic Planning Theory: The theory is usually effective for institutions

that have little previous experience of doing strategic planning. The theory presupposes

that organizations should have time to spend on the process of strategic planning. As

the name implies, , this is the most elementary kind of strategic planning that

establishments and entities can use to become conversant with the process and then

develop on them in the future as they become more with the process and more

conventional as an organization(Free, 2010).

The theory assists entities in internalizing strategic planning in the systems for delivery

and management of services (Free, 2010). The theory is relevant in the current study in

that, addresses cybercrime whose management cannot depend on the legal or

institutional approach alone. The problem requires all concerned institutions such as

Tanzania Police to design and implement strategic planning that would design

managerial responses, mechanisms, and processes of managing cybercrimes in

Tanzania.

Additionally, this theory is linked and operates in consideration of the following

aspects:-

Long-term Strategic Plan:-

The long term strategic Plan is very essential in ensuring that an organization or a public

independent entity like the Tanzania Police force formulates a long term strategic Plan.

The Plan will have a comprehensive definition of what the entity ought to take or to

implement within a five year period.

In this context, it remain equally important that, in order that the Tanzania Police force

manages effectively cyber crimes in Tanzania, it must formulate a comprehensive

strategy that will define the strategic initiatives to be taken by the Tanzania Police

force in managing cyber crimes in Tanzania. However, in the event where, the five

year strategic plan does not comprehensively addresses managerial issues related

Page 32: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

to the management of cyber crimes, the controlling and sustaining effective

management of cyber crimes will likely not be sustained.

Resource Pooling:-

The basic planning theory can become operative in relation to how the Tanzania Police

force is engaged in the management of cyber crimes when the entity itself is

strategically engaged in pooling resources which are compatible with its managerial

initiatives to influence the management of cyber crimes in Tanzania.

On the basis of the relevancy of theory in relation to the study, managing cyber crimes

effectively by the Tanzania police force requires resources and these may include,

information and technology devices, funds or the budget component, well equipped

cyber crimes units with requisite office and technological material, steady power

supply and a well equipped electronic investigation laboratory.

However, if the Tanzania Police force fails to pool the necessary resources which are

requisite for its effective management of cyber crimes in Tanzania, then the inability

not to provide the necessary resources to the cyber crimes team or department, will

likely disfavor all the efforts and initiatives that the Tanzania police force is likely to

be engaged in and hence persistence in occurrence of more cyber crimes within the

society.

Qualified Personnel:-

The theory presupposes putting or hiring or recruiting qualified personnel by the

Tanzania police force, in its efforts to manage cyber crimes in Tanzania. In this

perspective and taking on board the planning theory in relation to the management of

cyber crimes in Tanzania by the Tanzania Police force, the hiring and recruitment of

qualified personnel or their frequent training is necessary and important.

Page 33: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

The latter is based on the assumption that, issues surrounding cybercrimes are dynamic

and they change f to time to time and the way to manage them and have pro responses

to the emerging cyber crimes is technical and requires personnel with the requisite

knowledge in order to overcome the dynamic challenges involved in the management

of cyber crimes. On the basis of the theory and taking into consideration its strength,

the Tanzania Police must invest and have a well trained personnel in the cyber crimes

units so that it can be able to examine dynamics, carry out investigations and advice

the Tanzania Police force Man agent team effectively on issues of cyber crimes.

Managerial Commitment:-

The theory envisages strategizing on all matters and aspects that have a linkage on the

management of cyber crimes by the Tanzania Police force and this includes having a

committed management that will take and understand cyber crimes as a threat to

businesses, public investments, security as well as financial transactions. Managerial

commitment instigates a culture that everything has to be strategically managed and

this includes cyber crimes management. In this context and under the strategic planning

theory, managerial commitment will spell out on the strategic priorities to the

management on it is strategically committed to manage cyber crimes in Tanzania.

The stewardship Theory:-

This theory has a synonym namely stakeholders’ theory. The theory adopts a different

method from the Basic Strategic Planning theory. The stewardship theory begins with

the assumption that establishments serve a broader social goal than just maximizing

shareholders’ riches. Under this theory, stakeholder can be considered as ‘the end’ as

well as the ‘means to an end (Clarke and Clegg, 1993).

On the other hand, the recognition of the stakeholders value by the theory can be can

be considered as ‘means to an end.’ The theory looks at stakeholders as a tool of

enhancing corporate performance and efficiency of the Tanzania Police Force towards

addressing and managing effectively cybercrimes in Tanzania. The theory therefore

adopts the approach of involving stakeholders or the public towards efficient

management of cybercrimes in a. The operation of the can be sustained through the

following:-

Page 34: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Consideration of Stakeholders interests:-

The stewardship theory is based on the assumption that , good public action of any

entity or public decision making by the Tanzania Police force in respect of in its

initiatives to manage cyber crimes in Tanzania must reflect and take into consideration

the interests and views of stakeholders. This implies that, the Tanzania police force has

an obligation to consider the interests and views of all key stakeholders in its efforts

to effectively manage cyber crimes in Tanzania and this a managerial platform where

the views and interests of stakeholders are streamlined towards having a more

comprehensive strategic plan for management of cyber crimes in Tanzania by the

Tanzania Police force.

Engagement of stakeholders:-

The stewardship theory draws an assumption that, an entity like the Tanzania Police

force should widely engage stakeholders in its efforts to effectively manage cyber

crimes. The latter involves creating formal platforms and forums within which

stakeholders can help the Tanzania Police force in building both policy and institutional

capacity on how to deal with issues affecting the management of cyber crimes in

Tanzania.

This will broaden on the way the Tanzania police force operates on issues affecting

cyber crimes management and this will more likely be sustained through conducting

periodical reviews with stakeholders will also broaden a checks and balancing system

from the Public or stakeholders to the Tanzania Police Force on issues affecting the

Management of Cyber Crimes in Tanzania.

Page 35: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

2.5 Empirical literature

In view of the reviewed literature, much has been demonstrated on the regulatory and

legal perspectives by which Tanzania has embarked on addressing the threat

cybercrime. However, literature has not explicitly demonstrated the factors influencing

the management of cybercrimes in Tanzania with reference to Tanzania Police Force,

which this study sought to address.

A study by Mwingira (2013) examined the elimination of cybercrimes in Tanzania by

analyzing the law and practices in the fight against cybercrimes. The study revealed

that there has not been a strategic harmonization of legal practices for the control of

cybercrimes. And in spite of the legal reforms and strategies, which have been adopted,

cybercrimes are highly being committed in Tanzania.

Another study by Ndumbaro, (2013) focused on cybercrimes in relation to the freedom

of expression and revealed that cybercrimes in Tanzania has highly affected the

citizen’s constitutional freedom of expression and this too requires a legal harmony.

These studies never examined the rationale or factors that cause poor management of

cybercrimes. The current study is set to examine the management of cybercrimes with

reference to the Police force in Tanzania.

Further, a study by Robinson, (2015) made a critical analysis on the status of

cybercrimes and legal reforms in Tanzania, and revealed that the earlier laws on the

control of cybercrimes were very inadequate and the recent legal reforms and

formulation of new policies and laws have not yet brought any viable response to in

controlling cybercrimes in Tanzania,

Furthermore, the concerned institutions use reactive approaches to address the problem.

The study did not analyze issues affecting the management of cybercrimes in Tanzania

and this is what this study seeks to address. Elsewhere, Mshangi et al; (2013) examined

rapid growth of cybercrimes in the information systems in Tanzania.

The study revealed that 12.8 percent of users have been suffering from cybercrimes

because of surfing through insecure websites in the cyberspace, over 90.89 percent of

Page 36: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

internet suffers were blocked from accessing torrents/p2p applications (with malicious

codes); and over 63.29 percent of the electronic mails received by users were junk

mails. The number of Internet users sky rocked to 5.63 million in 2012 out of 46.9

million of them were in Tanzania; and this figure has been rising and reached 416.98

percent annually and was expected to reach 7.34 million by December 2015. The rise

in the number of Internet users has a direct impact on the rise of cybercrimes, which

are negatively affecting information systems.

These studies never examined issues on how Tanzania Police Force manages in this

study therefore examines the factors affecting Tanzanian Police Force in the

Management of Cybercrimes in Tanzania.

2.6 Conceptual Model of the Study

This conceptual framework represents the relationship between the variables under

investigation. In this study, factors affecting cybercrimes are the independent variables

and the management of cybercrimes by the Tanzania Police Force is the dependent

variable. This conceptual model has been developed based on the relationship between

the independent and the dependent variables under investigation.

The latter is based on the assumption that, the manipulation of the independent

variables in the framework for managing cyber crimes by the Tanzania Police force

will have an impact in terms of managing and controlling cyber crimes in Tanzania on

part of the Tanzania Police force.

In this context, once the Police force puts efforts on strategic planning integration of

information and communication systems, improving all the internal systems within its

cyber crimes unit and sections, training of its personnel and engagement of

stakeholders, then this is likely to produce measurable outputs in form of reduced or

zero cyber crimes, qualified personnel to deal with cyber crimes investigation, an

efficient engagement of stakeholders and effective management of cyber crimes.

The relationship under this conceptual framework between the independent variables

and the dependent variables are in line with the strategic planning and the stewardship

theories as adopted in this study.

Page 37: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Figure 2. 1: Conceptual Model of the study

Source: (Mbembela, 2019)

Framework for Managing Cyber

Crimes by the Tanzania Police

Force Strategic

Planning

ICT Integration

Internal Systems

Integration

Training and

Stakeholders

engagement

Efficient control

and Management

of Cyber Crimes

Ideal

participation of

Stakeholders

Increased No. of

Qualified

Personnel

Reduction on the

rate of Cyber

crimes

commissions

Policy

Budget

Political

Commitment

Page 38: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

CHAPTER THREE

RESEARCH METHODOLOGY

3.1 Introduction

This chapter presents the study methodology entailing a description of research design

used; the study area, the sample population, the sample size, and sampling techniques

used, and methods and instruments of data collection. The Chapter also focuses on

issues of validity and reliability of data collection tools and ethics were addressed in

the current study. . Lastly, the Chapter specifies how data were coded, cleaned,

interpreted, and analyzed.

3.2 Research Design

This is a design is a plan, a strategy, and procedures for a research work which begins

from general assumptions, hypotheses, to detailed instrumentation of collecting,

coding, interpreting and analyzing data. The current study used a case study research

design. These designs are a strategy of inquiry where the researcher investigates a

phenomenon, an event, an activity, process, or more individuals in depth. Cases are

time and activity bound; therefore researchers gather data using various data collection

procedures over a given time (Maykut, 1994)

In this study, a case study research design was used in examining the factors that affect

the management of cybercrimes in Tanzania by the Tanzania Police force. The research

design was used because it assisted the researcher in examining in depth what

management style and approach or cycle can influence the functional systems and

mechanisms of the Tanzania Police Force on effective management of cybercrimes.

Accordingly, the use of the design raised a possibility that the researcher collected data

and effectively engaged the respondents in obtaining valid responses in relation to the

research problem.

Page 39: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

3.3 Area of Study

The area of study was at the Headquarters of the Tanzania Police Force, which are

located within Ilala Municipality, Dar es Salaam. The Tanzania Police Force is charged

with the responsibility of keeping law and order in all Tanzania geographical societies.

The Police Force is administratively under the auspices of the Ministry of Home affairs

and the force is headed by the Inspector General of Police, the Force has eight

commissions namely Finance and Logistics, Administration and Human Resource,

Criminal Investigation, Criminal Intelligence, Community Engagements, Training and

Operations, Zanzibar and Forensic Bureau.

The Tanzania Police Force is also mandated to investigate crimes as per Section 5 of

the Police Force and Auxiliary Service Act, Cap 322. In this study, all other commands

outside the scope of the Tanzania Police Force headquarters were excluded with the

exception of the corporate and financial institutions, which have been probing

cybercrimes in Tanzania.

3.3 Study Population

This refers to the number of units from which data are likely to be gathered. Units may

be individuals, events, organizations, or artifacts (Murphy, 2003). Sample is a

collection of objects, events, or individuals with some common characteristics, which

the researcher wishes to investigate and then generalize/transfer the findings.

The study population included Tanzania Police force Gazzetted Officers serving at the

headquarters, Inspectorates Police officers, Non Commissioned Officers, Corporate

Managers from Corporate Institutions and other subordinate police officers at the

Headquarters of the Police force and managerial and Police Constables especially

within the cyber departments of corporate and financial institutions which were

sampled.

Page 40: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

3.4 Sample size

A sample size refers to the number of sampling units, which were included in the

sample. In this study, the sample size used is as indicated in Table 3.1.

Table 3. 1: Sample Size adopted and used in the Study

Sampling frame No. of Respondents Percentage

Gazzated Officers 15 13

Inspectorates 25 22

Non Commissioned Officers 30 26

Corporate Managers from Corporate

Institutions

20 17

Police Constables (Pc’s from the Cyber

Department)

25 22

Source: The Police force, Human Resource Department, (2018)

The sample size used in the study involved 115 respondents.

3.5 Sampling Techniques

In sampling for this study the non-probability sampling was used.

This is a sampling procedure, which does not provide any basis for approximating the

probability that each item has an equal chance of being included. That is to say, in this

sampling procedure is not guaranteed that every element has an equal chance of being

selected in the sample (Adam and Kamuzora, 2008).

The researcher used this sampling technique because the study sample, which included

Gazzeted Officers of the Police Force, were not guaranteed participation. the technique

helped the researcher to set up the criteria of selecting the respondents.

Similarly, in the current study, the researcher employed accidental or convenience

sampling, which is anon-probability sampling technique that involves selecting the

respondents based on availability and willingness to participate in the study and to

positively reply to questions set out in determining the study objectives. Further, the

study involved stratified sampling technique on Police Officers and Police Constables

in the Cybercrimes Department.

Page 41: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

3.5.1 Sampling Procedures

In this study, the sampling techniques described in Section 3 and 5 were used to Obtain

the total number of the Gazzetted Police officers serving at the Headquarters of the

Tanzania Police force.

(I) Obtain the total number of Inspectorates and Noncommissioned officers and other

Police constables of the Tanzania Police Force at the Headquarters of the Tanzania

Police Force.

(II) Select the respondents from the corporate and financial institutions from which the

sample size was drawn and this was done in accordance with the sampling

techniques adopted in the study.

3.6 Data Collection Methods

This section of the methodology in this study shows the nature and sources of data to

be used in the conduct of the study.

3.6.1 Nature and sources of Data

The study was in qualitative in nature and it relied more on qualitative data in

addressing the objectives and research question in relation to the research problem

under investigations. Accordingly, the study involved collection of primary data which

was collected through the use of questionnaires and interviews conducted on

respondents and secondary data was collected through documentary review of laws on

cyber crimes, annual reports of the Tanzania Police force.

3.6.2 Data Collection Methods and instruments

In this study, the researcher used the following data collection methods:-

I. Interviews

II. Focused group discussions.

III. Documentary review

IV. Questionnaires

Page 42: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

(i) Interviews

An interview is a formal meeting in which one or more persons question, consult, or

evaluate another person (Maykut, 1994). This method of data collection was

administered to Gazzetted Police Officers and Senior Police Officers at the

Headquarters of the Tanzania Police Force in Tanzania.

The data collected through this method focused on the factors affecting the

management of cybercrimes in Tanzania, managerial mechanisms used in the control

of cybercrimes, the challenges faced, and how they can be addressed. This method was

used because it effectively engaged Police Constables and employees from the

financial institutions in expressing their perceptions on the threats of cybercrimes and

how the Police Force focused was in improving the delivery of quality services.

Accordingly, this method was used because interviews are flexible, involve a high

response rate, and have a wide coverage, control of the interview situation and

completeness. The researcher interviewed the Police commissioners charged with

managerial functions in the data collection process.

(ii) Documentary Review

A documentary review is an independent review of documents. This method of data

collection was used especially in the collection of secondary data, which were relevant

to the research problem. The key documents reviewed in the data collection process

included, the strategic plan for 2015-2020, for the Tanzania Police Force, and the

Cybercrimes Act, 2015, the National Information and Communications Policy of 2016.

Other documents included are the sustainable Development Goals of 2015, the

Tanzania National Development Vision, 2025 and the Tanzania Crimes Report of 2017

issued by the Tanzania Police Force.

(iii) Focused Group Discussion

A focused group is a group of interacting individuals with some common interests or

characteristics, and who have been brought together by a mediator, who uses the group

and its interaction in gaining information about a specific or I the issue under

investigation. This method was administered especially to the Gazzated and

Page 43: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Noncommissioned Police Officers serving at the Headquarters of the Police Force in

Tanzania.

The participants under this method included, 8 Noncommissioned Police Officers from

the Cybercrimes Unit of the Tanzania Police Force and 3 representatives from the

corporate financial and telecommunications companies as well as 10 police constables

from the Tanzania Police Force. The interviewer produced accommodating and

encouraging environment which encouraged different insights and points of view,

without compelling members to vote, plan, or reach a consensus in relation to the

research problem under investigations and the discussion involved open ended

interview questions Accordingly focused group discussion was conducted by the

researcher included a maximum 21 participants.

(iv) Self-administered Questionnaire:-

This is a questionnaire, which has been designed completed by participants with the

direction of the researcher in gathering primary data. This technique was used in the

gathering of primary data on the factors affecting the management of cybercrimes in

Tanzania and on the managerial mechanisms being used. These questionnaires were

administered to more than 50 The set questions addressed both the research objectives

and the research questions. The researcher used this method because of its flexibility

and had a high response rate since the participants were likely to be fully engaged in

responding to structured questions in the questionnaires.

The grouping of the participants under this section was based on their rank in the Police

Force that is 10 respondents were selected from the Gazetted Police Officers, 25

respondents were selected from the Noncommissioned Police Officers, and 15

respondents were selected from the Police Constables who were directly involved in

the cybercrimes investigations.

Page 44: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

3.7 Ethical considerations

In the current study, the researcher observed the research ethics by giving all the

participants the opportunity of knowing their privileges and responsibilities as

participants. The purpose of this study, and why the data were collected were

communicated to participants. Important research ethics in the current study also

entailed but not limited to, privacy, secrecy, time management were correctly observed

by the researcher, and names were held confidential.

Accordingly, in observing research ethics in the conduct of the study, the researcher

obtained permission from stakeholder entities, for instance from the bank and financial

institutions which were visited in the data collection process and the information

collected has remained confidential between the entity and the researcher.

3.8 Data management framework for the study

This refers to storage, access, and preservation of data created from a given study. Data

management practices cover the entire lifecycle of the data, from planning the

examination to implementing it, and from backing up data as they are created and used

to long-term preservation of data deliverables after the research investigation has been

finalized. The data management process was used in the editing of data and testing both

data validity and the reliability of data collection instruments used:-

Validity and Reliability

Validity refers to the extent to which a tool measures what it is intended to measure.

In this study, the questionnaire was designed to determine the respondents’ awareness

on cybercrimes issue and their management by the Tanzania Police Force. All the

questions together reflected fully the concept of managing cybercrimes and factors

affecting it within the Tanzania Police Force.

In this study, procedures which were followed to guarantee validity were as follows:-

The questionnaires were articulated and validated by the Police personnel with the

expertise in the field of study.

a) The questionnaire was also given to the experienced managerial practitioners at

Headquarters of the Police Force.

Page 45: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

b) The questionnaire was pre-tested, reviewed, and corrections made, where

necessary, following feedback from the pre-test prior to the main study.

Reliability: this is the uniformity with which data collection instruments or methods

measure the target attributes or responses and can be equated with a measure’s stability,

consistency, or dependability. This entails the extent to which all the participants

understand each question in the same manner. Reliability entails that each question in

a questionnaire needs to be understood by all the participants in the same manner and

the responses need to be reliable, data were tested using cronbanch and were found to

be between 0.985 and 0.986, and there was good.

However, the researcher ensured reliability by:-

a) Holding discussions with the Police Personnel with broad experience in the use of

reliable instruments prior to the actual data collection.

b) Pre-testing the questionnaires, this was done to avoid words that were vague or

would yield data that were consistent with the requirement of the research

questions.

c) Developing the questionnaire from formerly used tools and relevant literature in

connection to the management of cybercrimes in Tanzania by the Police force.

d) Adequately checking data collection by looking for accurateness, completeness

and any missing data at least after every three days.

e) Giving every participant unique identification code that will be used during data

entry.

f) Approaching the participants, and informing them of the aim, method, and

significance of the study as well as the duration of the interview and inviting them

to participate in the study. In addition, guaranteeing them of privacy and that

deciding to leave would not compromise the care they would receive.

Page 46: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Editing-

Data editing entails recognizing errors, spelling mistakes, improper information and

oversights in the raw data to be collected (Adam and Kamuzora, 2008). The

fundamental goal of data editing is to secure a quality standard of the data and implied

doing necessary improvements in the interviews and questionnaire data. In this study,

the data from the field went through the crucial data editing procedure where by faults

in the information were consequently corrected. Also, this document was sent to

language expert for final editing of grammar.

Coding and Analysis of Data:- The original coding of data and observing new issues

in the gathered data and this that the researcher went through to read the original data

files several and this involved a formation of a coding scheme and then coding the data.

The codes were employed to identify the specific sections including the interview and

the information to be analyzed by observing new issues in the data through importing

and labeling of data files, coding data files and looking for coded segments in the data.

Data analysis is the calculation of certain procedures along with looking for associates

of the association that exists between data groups. In this study, the qualitative data

were gathered and analyzed using qualitative process of fragmenting data, isolating, or

disaggregating research resources, into bits and pieces, parts, elements, or units and the

facts, into manageable pieces. The qualitative and quantitative data was analyzed in the

following ways:-

Making association with the research questions: this procedure entailed recounting and

further developing the themes from the data to respond to the major study questions.

The themes were recognized and reviewed with the main research questions as a

mechanism for analyzing data, which were applied to each research question and the

data collected on it. Furthermore, the analysis of data was using the Statistical Package

for Social Sciences (SPSS).

Page 47: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Interpreting findings: the collected data were categorized themes by trimming the

interview data into "blocks" and cataloguing them into each of the codes. The data were

then reviewed within the themes or classes, and the understanding of each of them was

arrived in connection with the specific research questions.

Page 48: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

CHAPTER FOUR

DATA PRESENTENTION, ANALYSIS, AND DISCUSSION OF FINDINGS

4.1 Introduction

This chapter presents the study findings, analysis, and the discussion of findings. The

chapter comprises five major sections; the first section is on findings on demography

or characteristics of the participants. The second section presents the findings and

discussion on the managerial mechanisms used by the Police Force in the Management

of Cybercrimes in Tanzania, the third section presents the findings and discussion on

the level of awareness among the Police Personnel on the Management of Cybercrimes

in

The fourth section presents the findings on the participation of the Police Force in

Policy Forums on Managing Cybercrimes in Tanzania, and the fifth section presents

the findings and discussion on the limitations faced by the Tanzania Police Force in

Managing Cybercrimes in Tanzania.

The study involved examining four research questions and these included determining

the Managerial mechanisms used by the Police Force in the Management of

Cybercrimes and the Level of awareness among the Police Personnel on the

Management of Cybercrimes. Others include looking at whether the Tanzania Police

Force Participates in Policy Forums for Managing Cybercrimes and the Limitations

faced by the Tanzania Police Force in Managing Cybercrimes in the country. The

findings and the discussion in this chapter reflect the research objectives and the

research questions.

4.2 Demographic Data of the Respondents

The study investigated the demographic statuses and profiles of the participants and the

responses collected are shown in Table 4.1:-

Page 49: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Table 4. 1: Sex of the Respondents

Frequency Percent

Valid

Male 86 74.8

Female 29 25.2

Total 115 100.0

Source: (Field Data, 2019)The findings in Table 4.1 indicate that 86 (74.8%) out of the

115 respondents were males and 29 (25.2%) out of the 115 respondents were females.

The findings imply that more male than female respondents participated in the study

and that more male Police Officers were involved in the cybercrime management.

Though the findings do not suggest any gender differences between the sexes but they

suggest that the Tanzania Police Force employ more male than female personnel do.

Table 4. 2: Ages of the Respondents

Frequency Percent

Valid

18 to 25 years of age 23 20.0

26 to 35 years of age 36 31.3

36 to 45 years of age 39 33.9

46 to 55 years of age 12 10.4

Above 56 years of age 5 4.3

Total 115 100.0

Source: (Field Data, 2019)

The findings in Table 4.2 indicate that 23(20%) respondents were between the ages of

18 to 25 ,while 36(31.3%) respondents were between 26 to 35 years of age,

39(33.9%)were between 36 to 45 years of age, 12 (10.4%)were between 46 to 55 years,

and 5 (4.3%)were above 56 years of age.

The findings imply that the respondents were under various age cohorts, and many of

the respondents were far from the retirement age. This implies that they can still serve

in both the Tanzania Police Force and in other financial institution for effective

management and control of cybercrimes in Tanzania.

Page 50: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Table 4. 3: Education Levels of the Respondents

Frequency Percent

Valid

Primary Level of Education 22 19.1

Secondary Level of Education 19 16.5

Tertiary Level of Education 28 24.3

Diploma Level of Education 18 15.7

Degree Level of Education 17 14.8

Masters Level of Education 11 9.6

Total 115 100.0

Source: (Field Data, 2019)

The findings Table 4.3 indicate that 22(19.1%) attained primary Education, 19(16.5%)

attained secondary education, 28(24.3%) completed tertiary education, and 18 (15.7%)

attained diploma level of education. Furthermore, 17 (14.8%) had a Degree, and lastly

11(9.65) had Masters. The findings imply that majority of the respondents were

educated and knew how to read and write and were able to fully comprehend the

questions asked in both the interviews and in the questionnaires.

4.3 Managerial mechanisms used by the Police Force in the Management of

Cybercrimes in Tanzania

In this study, the respondents were asked as to whether the Tanzania Police Force was

involved in the management of cybercrimes in Tanzania. The findings are presented in

4.4:-

Table 4. 4: Involvement of the Police force in Managing Cybercrimes

Frequency Percent

Yes 76 66.1

No 27 23.5

I dont Know 12 10.4

Total 115 100.0

Source: (Field Data, 2019)

The findings in Table 4.4 indicate that 76 (66.1%) respondents agreed that the police

force was involved in the Management of cybercrimes27 (23.5%) disagreed, and only

12 (10.4%) were uncertain. The respondents had varying views on the involvement of

the Tanzania Police Force in managing cybercrimes and the majority of the respondents

Page 51: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

agreed that the Tanzania Police Force in engaged in the Management of cybercrimes

in Tanzania.

The Respondents were further asked whether there were forums whereby the Tanzania

Police Force. Findings are presented in Table 4.5:-

Table 4. 5: Views on the Existence of Forums

Frequency Percent

Valid

Yes 76 66.1

No 24 20.9

I don’t Know 15 13.0

Total 115 100.0

Source: (Field Data, 2019)

The findings in Table 4.5 indicate that 66.1percent of the, respondents agreed that there

are forums whereby the Tanzania Police Force manages cybercrimes, 20.9 percent of

the respondents disagreed, and 13 percent were uncertain. The findings imply that

majority of the respondents had varying views on the engagement of the Tanzania

Police Force in the management of the cybercrimes.

The Respondents were further asked to identify the forums within which the Tanzania

Police Force manages cybercrimes and the responses obtained are presented in Table

4.6:-

Table 4. 6: Forums within which the Tanzania Police Force manages

cybercrimes

Frequency Percent

Valid

International Interpol Cyber

Crime Forum 55 47.8

Tanzania E- Government

Performance Review

Sessions

39 33.9

Corporate and Financial

Institutions Cyber Crime

Network

12 10.4

East Africa Cyber Network

platform 9 7.8

Total 115 100.0

Source: (Field Data, 2019)

Page 52: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

The findings in Table 4.6 indicate that 55 or 47.8 percent of respondents identified one

of the forums is the international Interpol cybercrime 39 or 33.9 percent identified the

Tanzania E- government Performance review sessions. Further, 12 of 10.4 percent

identified the corporate and financial institutions (Cybercrime Network), and 9 7.8

percent of the respondents identified the east Africa Cyber network Platform. The

findings imply that the Tanzania Police Force is engaged in the management of

cybercrimes and this is done through forums including the network that exists between

the Tanzania Police Force and the Tanzania police force.

Further, the respondents were asked to identify the nature of managerial techniques

used by the Tanzania Police Force in managing cybercrimes. The findings are presented

in Table 4.7:-

Table 4. 7: Nature of Managerial Techniques used in Managing Cyber crimes

Frequency Percent

Valid

International-Protection and

Management Instruments on

Cybercrimes

60 52.2

Legislative Managerial

Techniques 40 34.8

Policy based Management

Techniques 8 7.0

Institutional Management

Mechanisms 7 6.1

Total 115 100.0

Source: (Field Data, 2019)

The findings in Table 4.7 60 or 52.2 percent of the respondents identified the

international-protection and management instruments on cybercrimes. Forty, 40, which

is equivalent or 34.8 percent identified the legislative managerial techniques, and8,

which is equivalent to 7 percent identified policy based management techniques,

7respondents that is equivalent to 6.1 percent of the respondents identified institutional

management

Page 53: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

The findings the nature of the managerial techniques used by the Tanzania Police

Force in the Management of cybercrimes in ranges from institutional policy oriented

to international instruments and all these function interdependently and in the event

that they are intergraded with the structural and other managerial systems within the

Tanzania Police Management processes, then the purpose of managing and controlling

cyber crimes can be addressed.

The respondents were further asked to identify the managerial techniques used in in

Tanzania by the Police Force. The findings are presented in Table 4.48:-

Table 4. 8: Managerial techniques used

Frequency Percent

Valid

Engagement of Stakeholders 21 18.3

Investigation of Cybercrimes

Scenes 25 21.7

Use of the Cybercrimes Act,

2015 30 26.1

Execution and Carrying out of

Cybercrimes Analysis (Use of

Forensic approaches)

18 15.7

Collection of Evidence and

Involvement of the National

Prosecution Office (DPP)

7 6.1

Participation in Court

Proceedings (Cybercrimes Cases) 6 5.2

Internal Cybercrimes

Performance Reviews 5 4.3

Budget allocation to Cyber

Crimes Department 3 2.6

Total 115 100.0

Source: (Field Data, 2019)

The findings in Table 4.8 indicate that 21, which is equivalent to 18.3% percent of the

respondents identified the engagement of stakeholders in the management of

cybercrimes, and 25 which is equivalent to 21.7 percent, identified the investigation of

cybercrimes scenes. furthermore, 30 which is equivalent to 26.1 percent of the

respondents identified the use of cybercrimes Act, 2015.Seven 7, which is equivalent

to 15.7 percent of the respondents identified the execution and carrying out of

Page 54: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

cybercrimes Analysis (Use of forensic approaches) and 6.1 percent identified the

collection of evidence and involvement of the National Prosecution Office.

Furthermore, the respondents identified participation in Court proceedings

(Cybercrimes cases and this was reported by6 respondents, which is equivalent to 6.1

percent. Furthermore, 5, which is equivalent to 5.2 percent of the respondents identified

the use of internal cybercrimes performance reviews and this is in contrast to only 3,

which is equivalent to 4.3 percent identified the budget allocation for cybercrimes

management.

The findings in Table 4.8 imply that the Tanzania Police Force uses a multiple of

managerial techniques to manage cybercrimes though they have not be very effective

in sustaining efficiency in managing cybercrimes.

The respondents were also asked on the effectiveness of the mechanisms used in the

Management of cybercrimes. The findings are presented in Table 4.9:-

Table 4. 9: Extent of effectiveness of the Managerial Techniques Used

Frequency Percent

Valid

Low Extent (15%) 35 30.4

Moderate Extent

(25%) 49 42.6

Great Extent (35%) 23 20.0

Greater Extent

(above 45%

8 7.0

Total 115 100.0

Source: (Field Study, 2019)

The findings in Table 4.9, indicate that 35 or 30.4 percent, of the respondents agreed

that the mechanism are effective at a low extent, 49 which is

equivalent to 42.6 percent of the respondents were of the view that the mechanism are

only effective at a moderate extent.

Page 55: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

On the other hand, 23 respondents which is 20 percent agreed that the mechanism used

were effective only at a greater extent 8 or 7 percent of the respondents were of the

view that the mechanism are largely effective. The findings imply that even though the

respondents had varying views on the degree and extent to which the mechanisms used

by the Tanzania Police Force can facilitate effective management of cybercrimes,

majority of the respondents agreed that the mechanisms were effective only at a

moderate extent. This means that the mechanism used did not assist the Tanzania Police

Force in managing the cybercrimes effectively.

4.4 Level of awareness among the Police Personnel on the Management of

Cybercrimes in Tanzania

In determining this objective, the respondents were asked to identify the causes of

cybercrimes in Tanzania. The findings are presented in Table 4.10:-

Table 4. 10: Causes of Cyber crimes in Tanzania

Frequency Percent

Valid

Wide use of Information and

Communications Technology 27 23.5

Knowledge gap on

Cybercrimes by the Public and

Community

17 14.8

Weak Laws and Policies being

Implemented 12 10.4

Absence of a strong networking

platform among the most

affected Institutions (Corporate

and Finance)

18 15.7

Imaginary Budget allocate to

the Cybercrimes Department 12 10.4

Absence of Firm Political will

of the Government to fight

Cybercrimes

9 7.8

Inadequate skills within the

Tanzania Police Force to

Manage the dynamics of

Cybercrimes

10 8.7

Lobbying of Internal System

Users by the Cyber Criminals 10 8.7

Total 115 100.0

Source: (Field Data, 2019)

Page 56: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

The findings Table 4.10 indicate that 27 or 23.5 percent of the respondents cited a wide

use of Information and Communications technology of the of , 17or 14.8 percent

cited knowledge gap on cybercrimes as a cause.

Furthermore, only 12, which is equivalent to 10.4 percent identified weak policies and

laws on cybercrimes as a cause. Furthermore, 18or 15.7 percent of the respondents

identified lack of a networking platform among the most affected institutions as a cause

of cybercrime. On the other hand, 12, which is equivalent to 10.4 percent of the

respondents identified imaginary budgets allocated to the cybercrimes department as a

cause 9 or 7.8 percent of the respondents identified lack of firm political will of the

government to fight against cybercrimes.

Furthermore, 10 or 8.7 percent, of the respondents identified inadequate skills within

the Tanzania Police Force in managing cybercrimes and lobbying with the internal

systems users with the cyber criminals as a problem. The findings imply that there is

no single factor can be attributed to explaining why cybercrimes occur in a society. The

causes emanate from the growth of the use of the internet, weak policies and imaginary

budgets. All these affect the efforts of by the Tanzania police force.

The respondents were further asked to mention the common cybercrimes committed.

The findings are presented in Table 4.11 below:-

Page 57: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Table 4. 11: Common cybercrimes Committed

Frequency Percent

Valid

Pornography 20 17.4

Publication of False

Information 20 17.4

Cyber Bullying 25 21.7

Computer Related Forgery 9 7.8

Computer Related Fraud 13 11.3

Access to and Retrieving of

Confidential Information 11 9.6

Illegal access to Computer

Networks 7 6.1

Data Espionage 4 3.5

Computer and systems

Hacking 6 5.2

Total 115 100.0

Source: (Findings, 2019)

The findings in Table 4.11 indicate that 20 or 17.4 percent of the, respondents cited

child pornography, and20 or 17.4 percent of the respondents cited publication of false

information. Furthermore, 25 or 21.7 percent identified cyber bullying, and only 9

respondent’s or7.8 percent identified computer related forgery.

Another 20 or 11.3 of the respondents identified computer related fraud, 11 or 9.6

percent of the respondents identified access and retrieval of confidential information as

among the common committed cybercrime. Further, 7, which is equivalent to 6.1

percent of the illegal access to computer networks, and 4or 3.5percent of the

respondents data espionage, 6 or 5.2 percent of the respondents cited computer and

systems hacking as among the common committed cybercrimes. The findings in the

Table and indicate that there is a rise on the commission of cybercrimes and the causes

range from not only using the computer and the internet but also internal users of

computer systems have been the criminal to commit This is why most cybercrimes

committed in the banks are linked to own employees.

The respondents were also asked to provide their views on how data are managed in

the management of cybercrimes. The findings are presented in Table 4.12:-

Page 58: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Table 4. 12: Data Management in managing cybercrimes

Frequency Percent

Valid

Demand for disclosure of all

sorts of Data relating to the

Committed Cyber Crimes

33 28.7

Retrieving and Collection of

Data from the Scene of Crime

or from the Data Devices

15 13.0

Examination of Data through

Forensic Means 16 13.9

Identification, Marking and

Reservation of Data for

Prosecution

24 20.9

Engagement and Interrogation

of all persons involved and

Criminals

10 8.7

A police officer applying to

Court to access data in case it

is Termed to be Confidential

17 14.8

Total 115 100.0

Source: (Field Data, 2019)

The findings in Table 4.12 indicate that 33, which is equivalent to 28.7 percent of the

respondents cited the demand for disclosure of all sorts of data related to the committed

crime. About 15 or 13 percent of the respondents cited retrieval and collection of data

from crime scenes or from the data device as the mechanism of managing cybercrimes.

Further, thirteen (3.9%) percent of the respondents cited examination of the data and

devices through forensic means, and 24 or 20.9 percent of the respondents cited the

marking and reservation of data for prosecution as the mechanism of managing

cybercrimes. On the other hand, only 10 or 8.7percent of the respondents out of the 115

cited the engagement and interrogation of all persons involved, and 17, which is

equivalent 14.8 percent of the respondents cited a police officer applying to a court for

access of confidential data as mechanisms of managing

The findings imply that management of cybercrimes, involves data on the devices used

by the cyber criminals and this begins with the demand for the The devices are

examined with forensic means, and to some degree, the Court is involved in granting

the Police access to confidential data from the private and public institutions, all of

which are involved in the management of data.

Page 59: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Accordingly, the respondents were further asked to identify the institutions that the

Police force works with in the management of cybercrimes in Tanzania. The findings

are presented in Table 4.13

Table 4. 13: Institutions networking with the Police in Managing Cybercrimes

Frequency Percent

Valid The Tanzania Revenue

Authority

36 31.3

The Tanzania

Communications and

Regulatory Authority

49 42.6

The African Centre For

Cyber Laws and Cyber

Crimes Prevention

17 14.8

The Tanzania Financial

Institutions Forums

13 11.3

Total 115 100.0

Source: (Field Data, 2019).

The findings in Table 4.13 indicate that 36, which is equivalent to 31.3percentand of

the respondents identified the Tanzania Revenue Authority, and 42.6percent of the

respondents cited the Tanzania Communications and Regulatory Authority as the

institutions which work with the Police Force in managing cybercrime. Furthermore,

17or 88.7percent of the respondents Identified the African Center for Cyber Laws and

Cyber Prevention Bureau as institutions collaborating with the Police Force.

Further 13, is equivalent to 11.3percent of the respondents cited the Tanzania financial

institutions forums as institutions collaborating with the Police Force. The findings

imply that the Tanzania Police Force networks with other institutions in the efforts of

managing cybercrimes, though the networks are not regulated at all. It is more of a

courtesy process and this is why the networks have-not been effective in managing

cybercrimes in Tanzania.

The respondents were further asked on the extent to which the Police personnel are

aware of the dynamics of cybercrimes in Tanzania. The findings are presented in Table

4.15:-

Page 60: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Table 4. 14: Extent to which the Police Force is aware of the Dynamics of

Cybercrimes

Frequency Percent

Valid

Low Extent (15%) 27 23.5

Moderate Extent

25%) 60 52.2

Big Extent (35%) 12 10.4

Great Extent

(45%) 8 7.0

Greater Extent

(Above 55%) 8 7.0

Total 115 100.0

Source: (Field Data, 2019)

The findings in Table 4.14 indicate that 27 or 23.5percent of the respondents were of

the view that the networking has been effective to a low extent. Sixty, 60 or 52.2 percent

of the respondents were of the view that the networking is effective to a moderate

extent, and 12 or 10.4percent of the of the view that the networking is effective.

Further, 8, which is equivalent to 7percent of the respondents said that the networking

is effective only to great extent.

Only 8 out of the 115 respondents or 8 percent said that the networking has been

effective only to a greater extent .The findings imply that even though the respondents

had varying views on the extent to which the networking has been being used, the

majority were of the view that networking has been effective to a moderate extent. This

shows that the networking has not been effective suggesting that the Police Force has

not benefited much from the networking.

Accordingly, the respondents were asked on the ways within which the level of

awareness can be improved. The findings are presented in Table 4.15:-

Page 61: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Table 4. 15: Level of awareness

Frequency Percent

Valid

Through Cyber Training

Sessions 41 35.7

Through Creating Platforms for

Engaging Stakeholders 45 39.1

Use and Integration of Advanced

Technologies in Cyber

Management Process

16 13.9

Capacity Building through

Workshops on cybercrimes with

other National Institutions

13 11.3

Total 115 100.0

Source: (Field Data, 2019)

The findings indicate that 41 out of the 115 respondents, which is equivalent to

35.7percentcited the use of cyber training sessions, and 45 or 39percent of the

respondents were of the view that creation of platforms for engaging would improve

levels of awareness on cybercrime.

Furthermore, 16 or 13.9percent of the respondents were of the view that using an

integration of advanced technologies in the cyber management process, and 13, which

is equivalent to 11.3percent of the respondents were of the view that capacity-building

workshops on would improve awareness.

The findings imply that the level of awareness on the dynamics of among the police

personnel is still low, and this can be improved through training, seminars and engaging

stakeholders from the most affected institutions and the use of advanced technologies

in examining and analyzing cybercrime devices for effective output would improve

awareness.

4.5 Participation of the Tanzania Police force in Policy processes on Managing

Cybercrimes in Tanzania

In determining this objective, the respondents were asked as to whether the Tanzania

Police Force participates in the policy process for managing cybercrimes. The findings

are presented in Table 4.16:-

Page 62: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Table 4. 16: Participation of the Tanzania Police Force in Policy Forums

Frequency Percent

Valid

Yes 65 56.5

No 37 32.2

I dont Know 13 11.3

Total 115 100.0

Source: (Field Data, 2019)

The findings in Table 4.16 indicate that 65, which equivalent to 56.5 percent of the

respondents agreed that the Tanzania police participate in the policy forums, while 37

or 2.2percent of the respondents disagreed, and 13 or 1.3percent of the respondents

were uncertain about the engagement of the Tanzania Police Force in the Policy

processes.

The findings imply that the respondents had varying views on the participation of the

Tanzania Police Force in the policy processes in the management of cybercrimes and

this depends on the level of awareness on the dynamics of cybercrimes. However,

majority agreed that the police participate in the policy forums for management of

cybercrimes.

The respondents were asked to identify the policy forums within which the Tanzania

Police Force participates in the management of cybercrimes. The findings are in Table

2.17

Table 4. 17: Policy forums in which the Police Participates

Frequency Percent

Valid

The Tanzania E-Government

Performance Reviews 70 60.9

The African Centre for

Cyber Law and Cyber Crime

Prevention

16 13.9

The National Internet

Governance Forums 13 11.3

Budget Formulation Process

within the Ministry of

Internal affairs

16 13.9

Total 115 100.0

Source: (Field Data, 2019)

Page 63: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

The findings in Table 2.17 indicate that 70 or 60.9percent of the respondents cited the

Tanzania e-government performance reviews 16 or 13.9percent of the respondents

were of the view that the participation was through the African Centre for cyber law

and cybercrime prevention. About 13, which is equivalent to 11.3percent of the

respondents identified the national internet governance forums, and 16 or 13.9percent

of the respondents mentioned the budget formulation within the ministry of internal

affairs as the Policy Forums which the Tanzanian Police Force participates in managing

Cybercrime.

The findings imply that the Tanzania Police Force participates in the policy forums

within which its personnel are exposed to policy issues, which may affect and create

awareness on how to manage cybercrimes through a policy process.

4.6 Limitations being faced by the Tanzania Police Force in Managing

Cybercrimes in the country

In the study objective, the respondents were requested to identify the challenges

Tanzania Police Force faced in the management of cybercrimes. The findings are

shown in Table 4.18:-

Page 64: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Table 4. 18: Challenges being faced in managing cybercrimes

Frequency Percent

Valid

Weak Institutions alongside

the Police to Manage

Cybercrimes in Tanzania

16 13.9

Weak Policies and Laws 18 15.7

Absence of Advanced

Hardware to Manage Cyber

Data

19 16.5

Lack of Commitment on part f

the Government to deal with

cybercrimes

19 16.5

Politicization of the Cyber

Management Process 15 13.0

Lack of Requisite and

qualified Personnel to deal

with cybercrimes

10 8.7

Little Budget allocations 8 7.0

Lack of Control on Use of the

Internet ( Growing Internet

Dynamics)

10 8.7

Total 115 100.0

Source: (Field Data, 2019)

The findings in Table 4.18 indicate that 16, which is equivalent to 13.9percent of the

the existence of weak institutions alongside the police in managing cybercrimes. About

18or 15.7percent of the respondents cited the existence of weak policies and laws, and

19 or 16.5percent of the respondents said that the absence of advanced hardware to

manage were the challenge in managing cybercrime.

Furthermore, 19, which is equivalent to 16.5percent of the respondents cited lack of

commitment on the part of the government to deal with cybercrimes, and 15 or

13percent of the respondents were of the view that the politicization of the cyber

management process was a challenge. Furthermore, 10, which is equivalent to

8.7percent of the respondents, cited lack of requisite and qualified personnel to deal

with cybercrimes, 8 or7percent of the respondents cited constraints on budget

allocations, and 10, which is equivalent to 8.7percent of the respondents, cited lack of

control on the use of the internet as challenges facing the Police Force in managing

Page 65: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

The findings imply that that even though the police force has tried to participate

effectively in the management of as the institution still challenges and this sthe efforts

of the Tanzania police of the cybercrimes in Tanzania.

Page 66: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1 Introduction

This chapter has four sections. Secretion one summarizes the study by referring to the

specific objectives, research questions and the findings of the study. The second section

concludes the study also by referring to the research objectives and the research

questions. And the third section presents the recommendations and the last section

presents the suggestions made for further studies.

5.2 Summary of study findings

The study examined four research questions and these included determining the

Managerial mechanisms, which were used by the Police force in the Management of

Cybercrimes; and he Level of awareness among the Police Personnel on the

Management of Cybercrimes. Others include participation of the Tanzania Police Force

in Policy Forums for Managing Cybercrimes, and the challenges Tanzania Police Force

face in Managing Cybercrimes in Tanzania.

On part of the mechanisms the study has revealed that, the engagement of stakeholders

in the management of cybercrimes, investigation of cybercrimes scenes, the use and

implementation of cybercrimes Act, 2015, the execution and carrying out cybercrimes

Analysis (Use of forensic approaches), and the collection of evidence and involvement

of the National prosecution office were part of the mechanisms. Others include,

participation in Court proceedings (Cybercrimes cases), the use of internal cybercrimes

performance reviews and budget allocation for cybercrimes management are all used

by the police force in managing cybercrimes in Tanzania.

Page 67: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

In respect of the level of awareness on the dynamics of cybercrimes, the study has

revealed that the level of awareness has not effective and the level is at a low and this

suggests that the police personnel ought to be exposed to more and recent dynamics of

cybercrimes.

Accordingly, on part of the participation of the Tanzania Police Force in the policy

processes, the study has revealed that, the Tanzania Police Force participates in a few

policy process on the management of cybercrimes and these include the Tanzania e-

government performance reviews the African Centre for cyber law and cyber-crime

prevention, the national internet governance forums and the budget formulation within

the ministry of Home Affairs are all used as policy forums to facilitate its efforts of

managing cybercrimes in Tanzania.

While this being the case, the initiatives by the Tanzania Police Force to manage

cybercrimes is still faced with challenges. The study has revealed that, the existence of

weak institutions alongside the police to manage cybercrimes, weak policies and laws,

absence of advanced hardware to manage cybercrimes, and lack of commitment on part

of the government to deal with cybercrimes are among the challenges.

The study has also revealed that politicization of the cyber management process, lack

of requisite and qualified personnel to deal with cybercrimes little budget allocations,

affect the efforts of the Tanzania Police Force to effectively manage cybercrimes in

Tanzania.

5.3 Conclusion

Cybercrimes in the recent developed world is one of the widely experienced challenges

in the digital century and governments and its departments have been devising means

of controlling it as well as managing it so that it does not affects their economies.

Page 68: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

In Tanzania, there has been the growth in the use of the internet and this has facilitated

the rise in commission of cybercrimes including fraud, hacking, and access to

confidential data and this s response and action on how to manage such crimes.

The Tanzania Police as one of the public entities entrusted with the mandate of

managing cybercrimes. the force has devised means both at the managerial level and

this involves setting an independent department of cybercrime which facilities the

management of the cybercrimes, participation on the policy forums and networking

with other institutions such as the banks and telecomm companies which have been

affected by the cyber cries.

Accordingly, the managerial mechanism that the Police force uses are not adequately

backed by any formal policy and this waters down the efforts and initiatives that the

Tanzania Police force can or may use in improving the managerial structures within

which the plight of cyber crimes can be well managed in Tanzania while there is still a

big gap of cooperation between the Tanzania police force and the financial institutions

which seemingly are the most affected by the cyber crimes.

The level of awareness in terms of the skills and knowledge on part of the Tanzania

Police Force is still very low and this raises a bigger possibility, that the dynamic cyber

crimes and those which are sophisticated may not necessarily be either identified at

their first instance, neither investigates, effectively prosecuted and strategically

managed and this is a training gap which ought to be addressed.

On part of the participation of the Tanzania police force in the cyber crimes policy

processes and policy forums, it has been evident that, Tanzania has not set out such

policy forums within which the cyber crimes stakeholders can propose the requisite

policy actions towards managing cyber crimes by the Tanzania police force alongside

the actions and efforts of the stakeholders and this requires identifying and setting up

policy forums where the even the media, the banking and financial sector, the civil

society and the academia can assist the Tanzania police force in devising strong

managerial mechanisms in addressing and managing cyber crimes in Tanzania.

Page 69: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

However, the plight of the police force to effectively manage cybercrimes in Tanzania

remains inefficient and this is attributed to lack of funds to invest in the fight and

management of cybercrimes, lack of adequate skills and lack, little level of awareness

on part of the police force on the dynamics of cybercrimes and lack of government

commitment to manage cybercrimes.

However, if the latter can be addressed through training and allocation of more funds

as well as integration of advanced technology in the police cybercrimes departments,

efficiency in the management of cybercrimes by the Tanzania Police Force can be

sustained.

5.4 Recommendation

The growth in the use of the internet hassled to an increase in cybercrimes while there

are no strong mechanisms to manage cybercrimes in Tanzania by the police force and

on the basis of the findings, the following recommendation can raise on the efficiency

of the Tanzania police in sustaining efficiency in the management of cybercrimes in

Tanzania:-

Policy:-The government through the efforts being undertaken by the Tanzania police

force, a policy on the management of cybercrimes be formulated and this is to create a

platform of awareness on the dynamics of cybercrimes and thus make a strategic

supplement to the cyber Act, of 2015.

The policy on cyber crimes has to be comprehensive and the inclusion aspect has to be

considered. It will the guideline on how not only the Tanzania Police force should

manage cyber crimes but on how the stakeholders can engage the Tanzania Police

force on issues of cyber crimes Management in society. Once the policy is formulated,

review and evaluation on what the Tanzania Police force has been doing will be

effectively conducted in relation to the policy.

Page 70: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Training: -In order that the Tanzania Police Force sustains its efforts to effectively

manage cybercrimes in Tanzania, its personnel ought to be trained in the field of

cybercrimes prevention and management and this should be supplemented with

requisite trainings in information and Communications technologies.

I acknowledge that in one of the interviews with one of the cyber experts interviewed

from the Tanzania Police cyber crimes department, he revealed that, they the Tanzania

Police force has no qualified and well trained personnel in the field of cyber crimes,

form stages like examination of electrical devices used in the commission of cyber

crimes requires expertise but also cyber cries are dynamic as they change day to day,

thus this requires investing in human resources which will support the overall strategy

of the Tanzania Police Force to effectively manage cyber crimes in Tanzania.

Budget allocation:-One of the challenges being faced by the Tanzania Police Force is

a low margin for budget that is invested in the fight to end, prevent, or manage

cybercrimes in Tanzania and little is invested by the government. In order that

efficiency and effectiveness are sustained, more funds ought to be invested in managing

cybercrimes in Tanzania.

While conducting the study, it was revealed from within the Tanzania Police force that,

the cyber crimes budget is too low to facilitate the management of cyber crimes in

Tanzania and upon enquiry on the equipments used in carrying out investigations, the

cyber crimes unit of the Tanzania Police has only one device to examine mobile phones

which have been used in the commission of cyber crimes and thus, if the crime happens

up country, it has to be sent to Dar es Salaam police headquarters for examination and

even low facilitations are provided or even not at cyber crimes scenes and hence

limiting on the effectiveness of the Tanzania police force to manage cyber crimes as a

result of inadequate budget.

Page 71: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Establishment of an independent cybercrimes Agency: - One of the outstanding

recommendations towards having effective management of cybercrimes in Tanzania is

to establish an independent body under the auspices of the Tanzania Police Force to

deal with issues of cybercrimes in Tanzania

Integration of Technology: - In order that the Tanzania Police Force maximizes its

efforts to manage cybercrimes, it ought to integrate strategically good and reliable

technology systems in its current cyber management systems and structures.

5.5 Suggestion for further study

Based on the findings, I suggest that a study be conducted on the role of information

technology in the management of cybercrimes in Tanzania with a focus on Public

entities.

Page 72: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

REFERENCES

A. J. Mambi. (2010)ICT Law Book: A Source Book for Information & Communication

Technologies andCyber Law. Dar es Salaam: MkukinaNyota Publishers

Ltd, 2010.

Abdallah A., (2012). Legal Challenges Brought by Developments of ICT in Tanzania,

An Assessment of the Growth of Mobile Banking Services” a

paper presented at the Oceanic bay Hotel, Bagamoyo on 11th June

B. Magalla (2013). The New Era of Cyberspace: Their Protection, Prevention and

Detection. Tumaini University Iringa University College

https://www.academia.edu/5287646/the_new_era_of_cyberspace_their_d

etection_prevention_and_detection, 2013 Cybercrimes ACT, (2015)

Tanzania

Clough, J. (2015). Principles of Cybercrimes.

Economic Case No 31 (2019), United Republic of Tanzania

E.H. Dalla, and M. Geeta.,(2013). “Cyber Crime A Threat to Persons, Property,

Government and Societies”. International Journal of Advanced

Research in Computer Science and Software Engineering, Vol.3. No.5,

pp.997-1002, 2013.

E. Kamanda (2013). “Spetrum Times: Cyber Crime at Spectrum Network”. Quarterly

Journal on risk Management, Vol.1. No.1, pp.1-8, November, 2013

F.Tushabe, and V.Baryamureeba (2013) .Cyber Crime in Uganda: Myth or Reality?”.

Proceedings of World Academy of Science, Engineering and Technology,

Vol.8, pp.66-70.

Shinder, L. (2002). Scene of the Cybercrime Computer Forensic Handbook.Singh, Y.,(

2012) “Cyber Laws,’’ 5th Edn, New Delhi: Universal Law Publishing Co.

Pvt. Ltd.,

S.Ghosh, and E. Turrini.,(2011). A Multidisciplinary Analysis.Springer-Verlag Berlin

Heidelberg, 2010.

Page 73: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

S. M. Kalunde (2011). The status of Cybercrime in Tanzania : Strasbourg, France.

Technical report.Council of Europe

http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Docum

ents/ReportsPresentations/Octopus2011/Update_session_Tanzania.pdf,

2011.TCRA (2013). Quarterly Telecom Statistics Quarter1.Technical

report. The Tanzania Communications Regulatory Authority (TCRA)

http://www.tcra.go.tz/images/documents/telecommunication/telecomStats

Sept13.pdf.accesesd on the 20th May, 2019

Ubena, J. (2009). “Why Tanzania Needs Electronic Communication Legislation? Law

keeping up with Technology” The Law Reform Journal, Vol. 2, No.1,

2009.

URT (2010). Strategy for Anti-Money Laundering and Combating Terrorist Financing,

July 2010 June 2013.

Viswaanathan, (2012), A., Cyber Law, Indian and International Perspectives, Lexis

Nexis Butterworth Wandwa, Nagpur.

V.Olena (2012). Problem of Cybercrime in Ukraine: Spread of, Specific Nature, and

Methods of Fighting”. Internal Security.Vol.4.No.1, pp.153- 163, 2012.

Williams, M. (2005) ‘Cybercrime’, in J. Mitchel Miller (Ed.) Encyclopedia of

Criminology, London: Rutledge

Yonazi, J., (2012). Cyber Security in Tanzania; Report on from the Cyber-Security

Mini-Conference, Center for ICT Research and Innovations

Page 74: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

APPENDICES

Appendix I: (Questionnaire) (SAQ)

Instructions:

The objective of the study is to examine Cybercrimes Management in Tanzania with

the case of the Tanzania Police Force. The answers in this questionnaire should be

kindly written in the space provided.

Kindly answer the questions clearly and honestly and the researcher hereby guarantees

that the information given shall be solely used for the study and it shall be treated with

high confidentiality.

1. Personal Information:

(a) Name of the Respondent: (Optional) _________________________

(b) Place of work: ___________________________________________

(c) Department: _____________________________________________

(d) Position held: ____________________________________________

2. Demographics

(a) Sex:

(i.) Male ( )

(ii.) Female ( )

(b) Age:

(i.) 18—25 ( )

(ii.) 25---30 ( )

(iii.) 30---35 ( )

(iv.) 35 and above ( )

3. Level of Education

(a) Primary School ( )

(b) Secondary school ( )

(c) Tertiary education ( )

Page 75: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

(d) Higher education ( )

4. (Objective One) managerial mechanisms used by the Police force in the

Management of Cybercrimes in Tanzania

a) In your Opinion, is the Police force involved in the management of Cybercrimes

in Tanzania?

Yes ( )

No ( )

b) Are there any forums within the Police force that are mandated to investigate and

manage Cybercrimes

Yes ( )

No ( )

c) Kindly mention the Forums used by the Police force in Managing Cybercrimes in

Tanzania

____________________________________________________________________

____________________________________________________________________

_________________________________________

d) To what extent are these forums effective?

25% ( )

35 ( )

45 ( )

55% ( )

Above 65% ( )

e) What are the prime causes of cybercrimes

____________________________________________________________________

____________________________________________________________________

_________________________________________

f) Do you think , the Prevalence is a result of the following:-

Lack of adequate Policy ( )

Poor management styles by the Police Force ( )

Page 76: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Lack of adequate Personnel to manage Cybercrimes ( )

Organized Network for Cyber Criminals ( )

Weakness in the Laws ( )

Reliance on Confidential Information ( )

g) How Does the Tanzania Police Force Manage Cybercrime Data

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

________________________________

h) Does the Police force involve stakeholders in Managing Cybercrimes

NO ( )

Yes ( )

i) Kindly state the ways through which the Police force involves stakeholders in

managing cybercrimes in Tanzania

____________________________________________________________________

____________________________________________________________________

_________________________________________

j) Kindly identify the Common cybercrimes experienced in Tanzania

____________________________________________________________________

____________________________________________________________________

_________________________________________

k) Kinky mention the most commonly used cyber instrument to commit cybercrimes

in Tanzania

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

________________________________

Page 77: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

In your Opinion, to what extent does confidential information affect the management

of Cybercrimes in Tanzania

Low extent ( )

Big Extent ( )

Great Extent ( )

5. (Objective Two) Level of awareness among the Police Personnel on the

Management of Cybercrimes in Tanzania

a) In your Opinion, is the Police Personnel aware of the dynamics of Cybercrimes?

Yes ( )

No ( )

b) In your opinion, to what extent is the Police Personnel aware on the dynamics of

the Cybercrimes:

20% ( )

30% ( )

40% ( )

50% ( )

Above 55% ( )

c) To what extent are these Mechanisms effective?

Low Extent ( )

Moderate Extent ( )

Big Extent ( )

Great extent ( )

Greater Extent ( )

d) Please, identify any way(s) for improving the Level of awareness on the

management and laws on Cybercrimes within the Police Force

____________________________________________________________________

____________________________________________________________________

__________________________________________________

e) Kindly identify the guiding policies, laws and Regulations on Cybercrimes in

Tanzania

Page 78: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

____________________________________________________________________

____________________________________________________________________

__________________________________________________

6. (Objective Three)Participation of the Tanzania Police Force in Policy Forums for

Managing Cybercrimes in Tanzania

a) Does the Tanzania Police Force Participate in Policy forums for Managing

Cybercrimes in Tanzania

Yes ( )

No ( )

b) To what extent does the participation of the Police Force in Cybercrimes Policy

Forums facility effective Management of Cybercrimes.

Small Extent ( )

Big Extent ( )

Great Extent ( )

a) Kindly mention the Policy forums through which the Tanzania Police Force

participates in the Management of Cybercrimes in Tanzania

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________

Page 79: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

b) Kindly mention any networks that the Police force has established the effort to

manage cybercrimes in Tanzania

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________

c) Kindly identify the issues affecting effective Management of Cybercrimes in

Tanzania by the Police force

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________

d) How can the above mentioned issues be addressed

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________

Thank you for sharing your knowledge with me

Page 80: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Appendix II:

Appendix I: (Questionnaire for Financial and Corporate Institutions)

Instructions:

The objective of the study is to examine Cybercrimes Management in Tanzania

with the case of the Tanzania Police Force. The answers in this questionnaire should

be kindly written in the space provided.

Kindly answer the questions clearly and honestly and the researcher hereby guarantees

that the information given shall be solely used for the study and it shall be treated with

high confidentiality.

1. Personal Information:

(a) Name of the Respondent: (Optional) _________________________

(b) Place of work: ___________________________________________

(c) Department: _____________________________________________

(d) Position held: ____________________________________________

2. Demographics

(a) Sex:

(i.) Male ( )

(ii.) Female ( )

(b) Age:

(i.) 18—25 ( )

(ii.) 25---30 ( )

(iii.) 30---35 ( )

(iv.) 35 and above ( )

3. Level of Education

(a) Primary School ( )

(b) Secondary school ( )

(c) Tertiary education ( )

(d) Higher education ( )

Page 81: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

4. (Objective One) managerial mechanisms used in the Management of Cybercrimes

in Tanzania

a) In your Opinion, is your institution involved in the management of Cybercrimes in

Tanzania?

Yes ( )

No ( )

b) Are there any forums that your institution participates in investigating and

managing Cybercrimes

Yes ( )

No ( )

c) Kindly mention the Forums used e in Managing Cybercrimes in Tanzania and

specifically in your Company

____________________________________________________________________

____________________________________________________________________

_________________________________________

d) To what extent are these forums effective?

25% ( )

35 ( )

45 ( )

55% ( )

Above 65% ( )

e) What are the prime causes of cybercrimes in your Institution

____________________________________________________________________

____________________________________________________________________

_________________________________________

f) Do you think , the Prevalence of Cybercrimes in your Institution is a result of the

following:-

Lack of adequate Policy ( )

Poor management techniques in your Institution ( )

Lack of adequate Personnel to manage Cybercrimes ( )

Page 82: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Organized Network for Cyber Criminals ( )

Weakness in the Laws ( )

Reliance on Confidential Information ( )

g) Does your Institution participates in Managing Cybercrimes Data

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

________________________________

h) Do you involve stakeholders in Managing Cybercrimes

NO ( )

Yes ( )

i) Kindly state the ways through which you involve stakeholders in managing

cybercrimes in Tanzania

____________________________________________________________________

____________________________________________________________________

_________________________________________

j) Kindly identify the Common cybercrimes experienced in your Organization

____________________________________________________________________

____________________________________________________________________

_________________________________________

k) Kinky mention the most commonly used cyber instruments to commit

cybercrimes in your Organization

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

________________________________

In your Opinion, to what extent does confidential information affect the management

of Cybercrimes in your Institution

Low extent ( )

Big Extent ( )

Great Extent ( )

Page 83: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

l) How do you manage cybercrimes data in your Company

____________________________________________________________________

____________________________________________________________________

_________________________________________

j) How does your Cyber or forensic department investigate internally on cybercrimes

in your Company?

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

________________________________

5. (Objective Two) Level of awareness the Management of Cybercrimes in

Tanzania

a) In your Opinion, is your Cybercrimes Unit aware of the dynamics of

Cybercrimes?

Yes ( )

No ( )

b) In your opinion, to what extent is the Personnel aware on the dynamics of the

Cybercrimes in your institution

20% ( )

30% ( )

40% ( )

50% ( )

Above 55% ( )

c) To what extent are these Mechanisms effective?

Low Extent ( )

Moderate Extent ( )

Big Extent ( )

Great extent ( )

Greater Extent ( )

Page 84: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

d) Please, identify any way(s) for improving the Level of awareness on the

management Cybercrimes within your institution

____________________________________________________________________

____________________________________________________________________

__________________________________________________

e) Kindly identify the guiding policies and Regulations on Cybercrimes in your

Institution

____________________________________________________________________

____________________________________________________________________

__________________________________________________

f) To what extent has cybercrimes affected the Performance of Your Company

____________________________________________________________________

____________________________________________________________________

__________________________________________________

6. (Objective Three) Participation of your Institution in Policy Forums for

Managing Cybercrimes in Tanzania

a) Does your institution Participate in Policy forums for Managing Cybercrimes in

Tanzania

Yes ( )

No ( )

b) To what extent does the participation of your institution in Cybercrimes Policy

Forums facility effective Management of Cybercrimes in your Company.

Small Extent ( )

Big Extent ( )

Great Extent ( )

a) Kindly mention the Policy forums through which your Company has ever

participated the Management of Cybercrimes in Tanzania

____________________________________________________________________

____________________________________________________________________

Page 85: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

____________________________________________________________________

____________________________________________

b) Kindly mention any networks that your Company has established in the effort to

manage cybercrimes

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________

c) Kindly identify the issues affecting effective Management of Cybercrimes in your

Company

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________

d) How can the above mentioned issues be addressed

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________

Thank you for sharing your knowledge with me

Dodoso:

Utangulizi:

Madhumuniyadodosohilinikukusanyataarifajuuyautafitiunaohusuusimamiziwamasual

ayamakosayamtandaonaJeshi la polisi –Tanzania. Hivyo basi, unaombwa kujaza

sehemuzilizokuwawazikatikadodosohili. Aidha,

Page 86: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

mtafitiatahakikishakuwataarsifazasirizinatunzwavyemananikwaajiliyautafitihuunasivi

nginevyo.

1.TaarifaBinafsi:

(e) Jina la Mshiriki: _________________________

(f) Mahali pa Kazi: ___________________________________________

(g) Idara: _____________________________________________

(h) Nafasi ya Kazi: ____________________________________________

2.Taarifa za Washiriki

(c) Jinsia

(iii.) Male ( )

(iv.) Female ( )

(d) Umri :

(v.) 18—25 ( )

(vi.) 25---30 ( )

(vii.) 30---35 ( )

(viii.) 35 and above ( )

3.Kiwango cha Elimu

(e) Elimu ya Msingi ( )

(f) Elimu ya Secondari ( )

(g) Elimu ya Vitendo ( )

(h) Elimu ya Juu ( )

4.(Dhumini la Kwanza) managerial mechanisms used by the Police force in the

Management of Cyber Crimes in Tanzania

m) UnadhaniJeshi la Polisi linashiriki katika kusimamia masuala yanayohusu

makosa ya Mtandao?

Ndio ( )

Page 87: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

Hapana ( )

n) Je kuna mifumo yeyote ambayo inatumika kwa ajili ya ushirikiano juu ya

managimenti ya makosa ya Mtandao kwa upande wa jeshi la polisi

Ndio ( )

Hapana ( )

o) Tafadhali taja hiyo mifumo inayotumika na Jeshi la polisi katika kusimamia

makosa ya mtandao Tanzania.

____________________________________________________________________

____________________________________________________________________

___________________________________________________________

p) Kwa kiwango gani Mifumo hiyo ikoimara?

Asilimia 25% ( )

Asilimia 35 ( )

Asilimia 45 ( )

Asilimia 55% ( )

Zaidi yaasilimia 65% ( )

q) Kwa uwelewawako, zipisababuzakuwepokwaMakosayaMtandao?

____________________________________________________________________

____________________________________________________________________

____________________________________________________________

r) Je, unadhanikuwepokwamakosahayokunatokananaSababuzilizotajwahapachini?

Kutokuwepokwa Sera Madhubuti ( )

MifumodhaifuinayotumikanaJaeshi la Polisi ( )

Kukosekanakwawataalamukatikamakosaya Mtandao ( )

UshirikianowaWanaotendamakosahayo

SheriaDhaifu ( )

Kuwepo kwa taarifazasiri ( )

s) Jeshi la PolisilinatunzajenakusimamiataarifazasirizinazohusumakosayaMtandao

____________________________________________________________________

____________________________________________________________________

Page 88: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

____________________________________________________________________

__________________________________________________________

t) Kwa namna gani Jeshi la Polisi linawashirikisha wadau au Waathirika wa Makosa

ya Mtandao

____________________________________________________________________

____________________________________________________________________

_____________________________________________________________

Taja njia ambazo zinatumikana Jeshi la Polisi kuwashirikisha wadau au Waathirika wa

Makosa ya Mtandao

____________________________________________________________________

____________________________________________________________________

_____________________________________________________________

u) Taja Makosa ambayo yanatendeka mara kwa mara katika mifumo ya Mtandao

____________________________________________________________________

____________________________________________________________________

_____________________________________________________________

5.(Dhumuni la Pili) Kiwango cha Uwelewa juu ya Makosa ya Mtandao katika Jeshi la

Polisi- Tanzania.

g) Je, unadhani Jeshi la Polisi linauwelewa juu ya Makosa ya Mtandao?

Ndio ( )

Hapana ( )

h) Kwa kiwango gani wataalamu katika Jeshi la Polisi wana Uwelewa juu ya Makosa

ya Mtandao?

Asilimia 20% ( )

Asilimia 30% ( )

Asilimia 40% ( )

Asilimia 50% ( )

Zaidi ya Asilimia 55% ( )

Page 89: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

i) Taja njia ambazo zinaweza kutumika ilikuongeza ujuzi ndani ya Jeshi la polisi juu

ya Uwelewa wa Makosa ya Mtandao

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

j) Taja sheria au kanuni zinazotumika katika kusimamia makosa ya mtandao ndani

ya Jeshi la polisi

____________________________________________________________________

____________________________________________________________________

__________________________________________________________________

6.(Dhumuni la tatu)Ushiriki wa Jeshi la Polisi katika mifumo ya Usimamizi wa

Makosa ya Mtandao

a) Je, Jeshi la polisi linashiriki katika mifumo ya Usimamizi wa Makosa ya Mtandao

Ndio ( )

Hapana ( )

c) Kama ndio, Kwa kiwango Jeshi la polisi linashiriki katika mifumo ya Usimamizi

wa Makosa ya Mtandao

Kiwango kidogo ( )

Kiwango kikubwa ( )

Kiwango kikubwa zaidi ( )

d) Taja mifumo ambayo Jeshi la polisi linashiriki katika masuala ya Usimamizi wa

Makosa ya Mtandao

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

Page 90: ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES …

e) Taja mifumo ya ushirikishwaji inayotumiwa na Jeshi la polisi kushiriki katika

masuala ya Usimamizi wa Makosa ya Mtandao

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

f) Tajachangamoto zinazokabili jeshi la polisi katika masuala ya Usimamizi wa

Makosa ya Mtandao

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

e) Kwa namna gani changamoto hizo zinaweza kutatuliwa

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

Asante kwa Ushirikiano