ASSESSMENT OF FACTORS AFFECTING CYBERCRIMES
MANAGEMENT IN TANZANIA:
THE CASE OF THE TANZANIA POLICE FORCE
By:
Jacob E. Mbembela
A Dissertation Submitted in Partial Fulfillment of the Requirements for the
Degree of Business Administration in Corporate Management of
Mzumbe University
2019
CERTIFICATION
We, the undersigned, certify that we have read and hereby recommend for acceptance
by Mzumbe University, a thesis entitled; Assessment of cybercrimes management in
Tanzania: the case of the Tanzania Police Force, in partial fulfillment of the
requirements for award of the degree of Masters of Business Administration on
Corporate Management.
_______________
Major Supervisor
________________
Internal Examiner
________________
External Examiner
Accepted for Mzumbe University, Dar Es Salaam Campus College
___________________________________________________________
CHAIRPERSON, DAR ES SALAAM CAMPUS COLLEGE BOARD
DECLARATION
AND
COPYRIGHT
I, Jacob E. Mbembela, declare that this dissertation is my own original work and it
has not been presented and will not be presented to any other University for a similar
any other degree award.
Signature: _____________________________
Date: _________________________________
© 2019
This dissertation is a copyright material protected under the Berne Convention, the
Copyright Act 1999 and other international and national enactments, in that behalf, on
intellectual property. It may not be reproduced by any means in full or in part, except
for short extracts in fair dealings, for research or private study, critical scholarly review
or discourse with an acknowledgement, without the written permission of Mzumbe
University, on behalf of the author.
ACKNOWLEDGEMENTS
Research activity is an enduring experience, which needs patience, perseverance, self-
discipline, and accountability throughout right from the conception of the concept note,
proposal writing, planning and field work, to the presentation of findings. Accordingly,
research is a process that involves many people, from various disciplines and profession
who can provide moral, technical, and material support to make it successful. In this
respect, I wish to express my sincere gratitude to various individuals and institutions
for selfless contribution to the conduct of the current study.
First, I would like to thank the Almighty God for blessing me life, energy, and good
health, which enabled me to undertake this assignment without any hitches. I would
continue to pray to Almighty to continue guiding, protecting, and keeping me healthy
so that I could expend the best of my abilities to rise to the highest levels in academia
and in professional ranks. Secondly, I express my sincere thanks to my Supervisor Dr
Patrick Kihoza for his guidance, encouragement, and professional support, which he
readily and unconditionally provided to me throughout the entire process from the
conception of the concept note to the production of the dissertation.
I would also like to express my deep appreciation to Mr. Willy Mwantembe, one of my
best friends in academia who provided endless support in this endeavor.
It would be difficult to thank everybody individually, who were involved in whatever
way in providing me with invaluable assistance. However, I would like Madam A.A.
Ngoso, the Co-Compensations, and benefits Police Headquarters whose
encouragement inspired me a great deal into expending my energies and intellect into
carrying out this work.
I should lastly but least, thank my work colleagues, family members, and all dear
friends for their sacrifice and kindheartedness which were geared at making the current
research a reality. May Almighty God bless them all with enormous strength, physical
and mental abilities, and good healthy to continuously help other people, who are in
need of similar help.
DEDICATION
This piece of work is dedicated to my beloved Mother D.P. Lukali, my beloved Father
Mr. E. A. Mbembela and my son’s Emmanuel, Emerson and Ethan Mbembela.
LIST OF ABRREVIATIONS
DPP - Director of Public Prosecutions
OUT - The Open University of Tanzania
SPSS - The statistical Package for social Science
TCRA - Tanzania Communications Regulatory
Authority
TDV - Tanzania National Development Vision, 2025
TPF - Tanzania Police Force
TPHQ - Tanzania Police Headquarters
TRA - Tanzania Revenue Authority
WB - World Bank
ABSTRACT
The main objective of the study was to assess the factors affecting the management of
cybercrimes in Tanzania and a focus on the Tanzania Police Force. The study problem
being addressed in this study is premised on the rise in the occurrence of cyber crimes
in Tanzania which has posed a threat to electronic transactions as well as financial
institutions. The Government has made initiatives to manage cyber crimes through
enactment of laws, like the Cyber Crimes Act, 2015, but the public entities empowered
to manage cyber crimes have not sustained the purpose of the initiatives to fight cyber
crimes and this is why this study examined how the Tanzania Police force is engaged
in the management of cyber crimes in Tanzania. Accordingly, the study involved
examining research questions. what Managerial mechanisms used by the Police force
in the Management of Cybercrimes, what is Level of awareness among the Police
Personnel on the Management of Cybercrimes, whether the Tanzania Police Force
Participates in Policy Forums for Managing Cybercrimes and what are the Limitations
being faced by the Tanzania Police Force in Managing Cybercrimes in Tanzania. The
study involved a sample size of the 115 respondents and the case study research design
was used in the conduct of the study. The study relied more on qualitative data and it
was collected from both primary and secondary sources through interviews and
questionnaires. The study has revealed that there is a rise in the commission of
cybercrimes in Tanzania and the Tanzania Police Force is engaged in the management
of cybercrimes though it has not been effective and this is equivalent to 23%. This
being the case, the study has also revealed the level at which the Tanzania Police
Force is aware of the cybercrime dynamics is still very minimal while at the same
time it is facing challenges in the management of cybercrimes in Tanzania. I order that
the Police Force effectively manage the cybercrimes; it ought to establish an
independent cybercrimes authority, invest in technology and forensic matters, training
of its personnel, and influence a public policy on the management of cybercrimes in
Tanzania.
TABLE OF CONTENTS
CERTIFICATION ......................................................................................................... i
DECLARATION AND COPYRIGHT ......................................................................... ii
ACKNOWLEDGEMENTS .......................................................................................... ii
DEDICATION ............................................................................................................. iii
LIST OF ABRREVIATIONS ....................................................................................... v
ABSTRACT ................................................................................................................. vi
LIST OF TABLE .......................................................................................................... x
LIST OF FIGURES ..................................................................................................... xi
CHAPTER ONE ......................................................................................................... 1
INTRODUCTION AND BACKGROUND ............................................................... 1
1.0 Introduction ............................................................................................................. 1
1.1 Problem statement ................................................................................................... 3
1.2 Objectives of the Study .......................................................................................... 5
1.2.1 Main Objective of the Study ................................................................................ 5
1.2.2 Specific Objectives of the Study .......................................................................... 5
1.3 Research Questions ................................................................................................. 5
1.4 Significance of the study ......................................................................................... 5
1.5 Scope of the Study .................................................................................................. 6
1.6 Limitations of the Study .......................................................................................... 7
CHAPTER TWO ........................................................................................................ 9
LITERATURE REVIEW ........................................................................................... 9
2.1 Introduction ............................................................................................................. 9
2.2 Definition and Conceptualization of terms ............................................................. 9
2.2.1 Cyber Crime ......................................................................................................... 9
2.2.2 Cyber Bullying: .................................................................................................. 10
2.2.3 Cyber space ........................................................................................................ 11
2.3 An overview on the genesis of cybercrimes ......................................................... 12
2.3.1 Categories of cybercrimes .................................................................................. 13
2.3.2 An overview on cybercrimes in Tanzania .......................................................... 13
2.3.3 The OECD Guidelines for the Security of Information Systems ...................... 14
2.3.4 The Deauville Declaration for protection of the Internet ................................... 15
2.3.5 The Cybercrimes Act in Tanzania ..................................................................... 16
2.3.6 Main Approaches to cybercrimes in Tanzania ................................................... 17
2.4 Relevant theories to the Study .............................................................................. 19
2.5 Empirical literature ............................................................................................... 23
2.6 Conceptual Model of the Study ............................................................................ 24
CHAPTER THREE .................................................................................................. 26
RESEARCH METHODOLOGY ............................................................................ 26
3.1 Introduction ........................................................................................................... 26
3.2 Research Design .................................................................................................... 26
3.3 Area of Study ........................................................................................................ 27
3.3 Study Population ................................................................................................... 27
3.4 Sample size ........................................................................................................... 28
3.5 Sampling Techniques ............................................................................................ 28
3.5.1 Sampling Procedures .......................................................................................... 29
3.6 Data Collection Methods ...................................................................................... 29
3.7 Ethical considerations ........................................................................................... 32
3.8 Data management framework for the study .......................................................... 32
CHAPTER FOUR ..................................................................................................... 36
DATA PRESENTENTION, ANALYSIS, AND DISCUSSION OF FINDINGS . 36
4.1 Introduction ........................................................................................................... 36
4.2 Demographic Data of the Respondents ................................................................. 36
4.3 Managerial mechanisms used by the Police Force in the Management .............. 38
4.4 Level of awareness among the Police Personnel on the Management of ............. 43
4.5 Participation of the Tanzania Police force in Policy processes on Managing ...... 49
4.6 Limitations being faced by the Tanzania Police Force in Managing .................... 51
CHAPTER FIVE ....................................................................................................... 54
SUMMARY, CONCLUSION AND RECOMMENDATION ............................... 54
5.1 Introduction ........................................................................................................... 54
5.2 Summary of study findings ................................................................................... 54
5.3 Conclusion ............................................................................................................ 55
5.4 Recommendation .................................................................................................. 57
5.5 Suggestion for further study .................................................................................. 59
REFERENCES .......................................................................................................... 60
APPENDICES ................................................................................................................... 62
LIST OF TABLE
Table 3. 1: Sample Size adopted and used in the Study ............................................. 28
Table 4. 1: Sex of the Respondents ............................................................................. 37
Table 4. 2: Ages of the Respondents ........................................................................... 37
Table 4. 3: Education Levels of the Respondents ...................................................... 38
Table 4. 4: Involvement of the Police force in Managing Cybercrimes ..................... 38
Table 4. 5: Views on the Existence of Forums ........................................................... 39
Table 4. 6: Forums within which the Tanzania Police Force manages cybercrimes .. 39
Table 4. 11: Common cybercrimes Committed .......................................................... 45
Table 4. 12: Data Management in managing cybercrimes .......................................... 46
Table 4. 13: Institutions networking with the Police in Managing Cybercrimes ....... 47
Table 4. 14: Extent to which the Police Force is aware of the Dynamics ................. 48
Table 4. 15: Level of awareness .................................................................................. 49
Table 4. 15: Participation of the Tanzania Police Force in Policy Forums ................ 50
Table 4. 16: Policy forums in which the Police Participates ...................................... 50
Table 4. 17: Challenges being faced in managing cybercrimes .................................. 52
LIST OF FIGURES
Figure 2. 1: Conceptual Model of the study ................................................................ 25
CHAPTER ONE
INTRODUCTION AND BACKGROUND
1.0 Introduction
Recently, both Private and Public Sectors have strived to create and develop responses
to the drastic growth in the use and development of Information technology across the
globe (Ghosh and Turrini, 2011). It is believed that, Pubic Organizations, which are
engaged in the provision of public services, may not adequately provide service in the
dynamic society. The Police Force in Tanzania for example may not provide the
expected policing and security services towards meeting the expectations of the Public
in the dynamic society. Nevertheless, the growth of the use and adoption of Technology
has influenced the growth of the commission of organized or white-collar crimes such
as cybercrimes in Tanzania. The Police force in Tanzania is one of the Public
Institutions, which are mandated to carry out investigations with the aim of curbing
cybercrimes in Tanzania.
Background of the Problem
A cybercrime is an offence someone commits versus somebody else or a group of
people via electronic means and other communication networks including the internet
social media, electronic mails, or mobile phones in the form of text messages. as is the
case with any other crime, cybercrime poses a threat the security at individual,
institutional, and national levels (Ghosh and Turrini, (2011)
However, for the past few years, the increase number of cybercrimes has led to the
emergence of factors that influence the Tanzania Police Force ability in managing
cybercrimes. This study therefore aims at examining the factors that influence the
Tanzania Police Force ability in managing cybercrimes in Tanzania.
Cybercrimes in Tanzania are growing exponentially via electronic means. In big cities
such as Arusha, Dar es Salaam, Mbeya, and Mwanza, there have been repeated
incidents of cybercrimes. For instance, one traditional doctor in Mwanza used to be
receiving money fraudulently via tigopesa. The culprit was later apprehended by
cybercrimes unit of the Tanzania Police Force through the assistance of Tigo cyber and
forensic control team. (URT, 2012).
The Economic case no 31of 2019 where one person obtained total TShs.
123,000,000/= (One hundred twenty three million) from different people fraudulently
through mobile money transfer using 629 SIM cards.
This incident posed a formidable threat to our society particularly among young people
who may be obsessed by offences such as cyber pornography and pose a threat to
almost all financial transaction carried out within the financial institutions such as
commercial Banks (Abdallah, 2012).
In the year, 2013, cybercrimes were reported to have caused enormous losses to the
financial sector in Tanzania. According to the World Bank report (World Bank, 2014),
almost TZs. 1 billion wasstolen through cybercrimes. This poses a huge problem to the
financial sector and the government at large especially in the developing countries
including Tanzania. however, the advancement of information Communication
Technology have made it possible for may cybercrime criminals within and outside the
country have been identified, apprehended and brought to the court of law for
prosecution.
This trend has largely been attributed to many factors that have made public institutions
that are directly engaged in such crime face challenges in the Management of
cybercrimes. A good example of such public institution is the Tanzania Police Force.
Upon the realization of this challenge, the Government enacted the Electronic and
Postal Communications Act (EPOCA) of 2010 as well as the Anti money laundering
Act, 2006 to deal with cybercrimes. In order to protect the entire public against the rise
in the commission of cybercrimes, the government recently mobilized efforts of the
Tanzanian Police Force, the Tanzanian Revenue Authority (TRA), institutions in the
Financial sector, the Media and the Tanzania Communications Regulatory Authority
(TCRA) to raise awareness among the public on what cybercrime is and how it could
be effectively managed. (World Bank, 2014)
Accordingly, in the year 2017, the Director of Public Prosecutions (DPP) affirmed that
cybercrime offences, which involved the use of high technology such as money
laundering and financial terrorism, were increasingly becoming a menace in our midst.
Apparently, all business and other communications are currently occurring online, and
not necessarily requiring any interaction with the parties involved in the transaction.
In this regard, criminals have found the internet a fertile ground for committing
criminal activities anonymously and with impunity. Thus, there are some policy and
legal initiatives, which the Government has taken including the enactment of the
National ICT policy, 2003, the Electronic Communications and Transactions Act,
2002, the Electronic Evidence Amendment Act, 2007 and the Electronic and Postal
Communication Act, 2010 (EPOCA) to make electronic evidence as valid in a court of
law.
In addition, the Government has strengthened the systems of operations of the Public
institutions, which are charged with the responsibility of investigating and managing
cybercrimes in Tanzania (URT, 2012). Despite these initiatives, there is a drastic rise
in the rate of cybercrimes within Tanzania society. This is the motivation this study
which was set to examine the Management of Cybercrimes in Tanzania with the focus
on the Tanzania Police Force.
1.1 Problem statement
Cybercrime is a global problem that is engulfing the world at an alarming rate and
Tanzania is not an exception. Cybercrime is a unique threat that can be carried out from
anywhere against any computer system or user in the world. It is a global evil, which
is increasingly and becoming difficult to control (Abdallah, 2012). As a result,
governments, businesses, and individuals all over the world are facing serious financial
threats and new challenges of combating cybercrimes. Its presence and impacts have
been felt by the Banks and all individuals who have been e engaged in provision of
services electronically in Tanzania (Abdallah, 2012).
The threats of cybercrimes have been made severe through the use of the Internet
based Information Systems(IS’s) including mobile money transfer services such as M-
Pesa, Tigopesa, and Airtel-Money, public apathy on reporting cybercrime, lack of
strong management frameworks, and exposure of Internet users to weak security
controls for Internet based Information Systems (IS’s)(URT, 2017).
Moreover, a large proportion of cybercrimes occurring in in Tanzania go unreported
and they are poorly managed by the Institutions engaged in the control of cybercrimes.
The problem is that, the country is overwhelmed by an increase of. From January 2010
to June 2013 alone, there have been countless cyber-criminal infiltrations on
websites/ISs (URT, 2017)
Some of the institutions whose electronic systems have been during this include the
National Bureau of Statistics (NBS), Tanzania Commission for Universities (TCU) and
the National Council for Technical Education (NACTE), Open University of Tanzania
(OUT), Chemi, and Cotex Company Limited. As observed by Kalunde(URT, 2017)
the cybercrimes occurring in Tanzania involve computer system’s infiltration, data
hacking, illegal access of IPs, ATM hacking , and service blocking; as indicated at the
beginning of this paragraph, the cybercrime victims have been government agencies,
the financial institutions, private businesses, public and private universities, and the
public in general).
According to Government report (2012), 230 have so far been arrested over
cybercrime. The report indicates further that there was over 1bn/-, Euro 8,897 and USD
551,777 which are reported to have been stolen through cybercrime implying if efforts
are not made to address the problem, matters are likely to get worse (URT, 2012). This
trend has raised concerns on how Public institutions ought to be engaged in the control
and management of cybercrimes. Literature has done little to elaborate the role of the
police force in managing cybercrimes. This is why this study is aimed at examining the
Management of Cybercrimes in Tanzania with the case of the Tanzania Police Force.
1.2 Objectives of the Study
1.2.1 Main Objective of the Study
The Main objective of the study was to assess the factors affecting the cybercrime
management in Tanzania with the case of the Tanzania Police Force.
1.2.2 Specific Objectives of the Study
i) Specifically, the study intends to assess effectiveness of the managerial
mechanisms used by the Police Force in the management of cybercrimes in
Tanzania
ii) Assess the level of awareness among the Police personnel on the management of
cybercrimes in Tanzania
iii) Investigate the participation of the Tanzania Police Force in Policy Forums for
managing cybercrimes in Tanzania
iv) Identify the limitations faced by the Tanzania Police Force in managing
cybercrimes in Tanzania
1.3 Research Questions
The study seeks to examine the following research questions
i) How effective are the managerial mechanisms used by the Police force in the
management of cybercrimes in Tanzania.
ii) What is the Level of awareness among the Police personnel on the management of
cybercrimes in Tanzania
iii) What is the level of the Tanzania Police Force Participation in the Policy Forums
for managing cybercrimes in Tanzania
iv) What are the limitations being faced by the Tanzania Police Force in managing
cybercrimes in Tanzania
1.4 Significance of the study
The conduct of any study is justified by its significance and this study is justified in the
following areas.
i) Development of Literature Vis-a –Vis addressing the empirical gap:-
One of the significance of this study is adding literature on the issues affecting the
management of cybercrimes by the Tanzania Police Force, which to the best of my
knowledge, has not received much attention. The contribution of literature involved
identifying the relevant theories discussed in literature reviews by demonstrating the
relationship between the causal factors and the management of cybercrimes.
ii) Generation of Information for Policy makers: -
Policy makers ‘decisions have a direct impact on any matter that may potentially posea
threat to corporate and financial businesses transactions including cybercrimes and how
the Police force ought to manage such crimes for public benefit and safety. This
requires evidence based information and in this context, this study examines and
assesses the factors that facilitate or constrain the management of cybercrimes in
Tanzania especially by the Police force.
iii) Institutional Performance: -
The study findings are likely to provide the Tanzania Police Force with a platform of
managing cybercrimes in Tanzania Police Force. The findings may also help the Force
devise mechanisms of improving the existing approaches and framework of control,
management, and elimination of cybercrimes and thus become a platform for strategic
planning by the Police force best practices managing the dynamic and complex issues
surrounding cybercrimes in Tanzania.
iv) To the Researcher; -
Accordingly, the study will serve as a requirement for the completion of a Master’s
degree at Mzumbe University.
1.5 Scope of the Study
The study mainly focused on the assessments of factors affecting the Cybercrimes
Management in Tanzania with the case of the Tanzania Police Force. The study was
conducted at the Tanzania Police Headquarters situated in Dar es Salaam.
1.6 Limitations of the Study
In conducting the study, the researcher experienced the following study limitations:-
i) Privacy and confidentiality
Considering the nature of the study and the involvement of respondents from within
the Police force and some other financial and corporate institutions, which the
researcher included in the sample, some of the information was treated as confidential.
The researcher ensured that the respondents ‘rights to privacy and confidentiality were
observed while collecting data from them.
ii) Extraction of relevant Literature
The study focused on the assessment of factors that affect the management of
cybercrimes in Tanzania and more specifically on part of the Tanzania Police force.
The reviewed literature has made empirical projections on the causes and impacts and
not on how cybercrimes ought to be managed in, implementing the formulated laws
and regulations and their control by the Tanzania Police Force and this was to be dealt
with by this study. Therefore, considering the nature of the study and the confidentiality
of the data and information to be collected, the researcher had the obligation of
extracting relevant Literature. this was done by drawing insights from the existing
literature on how cybercrimes have constrained the performance of corporate entities
and how the Tanzania Police Force can control and manage the cause vis-à-vis the
threat of Cybercrimes while implementing the law. This thus involved an extraction of
literature from Journals, Published reports, and policies to that effect.
iii) Financial Constraints: -
In the study, the researcher experienced financial constraints during designing and
preparing the data collection instruments, which would effectively been used in
gathering and collecting responses from the respondents and piloting from within the
work place of the respondents. Accordingly, in the process of compilation of the
research report, the researcher needed more funds.
iv) Pre-testing the Data Collection tools: -
In the Process of pre-testing the data collection instruments, especially pretesting the
self-distributed questionnaires, the pre-testing exercise was conducted to more than 20
respondents. In the first pretesting exercise, the researcher identified the respective
respondents to participate in the pre testing and the results or feedback obtained was
used in -correcting the data collection instruments and this required money and time.
v) Anticipated Delays caused by Respondents in returning the questionnaires on
time:-
The other which by the researcher in the study process, is that, many of the targeted
respondents were either employees who were at work or those who are engaged in
economic activities and this is likely to affect the time within which the questionnaires
were returned back to the researcher. Never the less, this limitation was addressed
through using self-administered questionnaires.
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
This Chapter reviews literature explored in relation to the study and defines the
concepts cybercrimes and cyber space. The chapter would also provide an overview
and genesis on cybercrimes in Tanzania, categories of cybercrimes in Tanzania, main
approaches to cybercrimes in Tanzania and the relevant theories for the study. The
section further provides for the empirical and conceptual model of the study.
2.2 Definition and Conceptualization of terms
2.2.1 Cyber Crime
Cybercrime is used to refer to all criminal incidents, which are committed through
computers, the Internet, cyberspace, and the worldwide web (Ndumbaro, 2010).
Although there is no consensus on what the terms entails cybercrime encompasses any
criminal activity, which is committed using computers and other electronic networks
(Abdallah, 2012).
These activities encompass illegal downloading of artistic files such as music to
combing millions of any currencies using online banking transactions. other non-
monetary offences such as creating and transmitting viruses or malware on other
computers or posting confidential business information on the Internet (Tushabe and
Baryamureeba, 2013) the widely practiced form of cybercrime is impersonation,
whereby, criminals on line accounts to steal other people’s data (Magalla, 2013)
Shinder (2002) defines cybercrimes as the sub category of computer crimes where the
offences are committed by the use of internet or other computer networks. In this case,
the computer or a network can be involved separately crimes in different ways.
Computer networks can be the tool used in committing crimes, they can also be victims
in commission of offences, and they can be used for incidental related to the offences.
Shinder, (2015) further argues, cybercrimes can be categorized into three classified
steps, and in this regard, cybercrimes are crimes where the computer network becomes
the main target of criminal activities. In addition cybercrimes are the existing offences
whereby the computer is an enabling tool of committing an offence. The third category
is that cybercrimes are crimes whereby computers are used in committing the crime,
which may reveal evidence of the offence committed.
The cybercrime Act, 2015 of the United Republic of Tanzania has no definition of
cybercrime. However, under Section 31 of the cybercrimes Act, 2015 confers to the
Police officer in charge of a station, the powers of searching and seizing whatever tools
which have either been used as evidence or acquired by any person as an impact of
offence, free entrance of premises to conduct search and seizing any device or computer
system.. In addition, Section 32 of the Act empowers the Police Officer to issue an
order against any person who is possessing undisclosed data for usage by investigators
or prosecutors (Magalla, 2013).
2.2.2 Cyber Bullying:
This is the form of crime, whereby minors use -capable devices in the Internet, to
persistently intimidate, cajole, or ridicule other minors. The age limit of the offender
and the makes this crime part of cyber stalking, involving adults instead of minors as
victims/offenders (Onella, 2012)
Cyber stalking;
this is another form of criminal activity which is repeated in more than one occasion
whereby the offender transmits invited contact, discriminatory or sexual advances, or
intimidation of violence through interpersonal communications technologies (ITC)
(Onella, 2012). Accordingly, cyber stalking entails using the Internet. It also may
however be committed offline using other electronic media instruments including
mobile phones. Cyber stalking can also entail the offender damaging their victim's
identity, causing them harm, annoying the offended by signing them up for email
bombs, or damaging computer data or equipment of the victim (Olena, 2012).
Hacking: -
Computer hacking is entails accessing of a computer and network system by the
criminal intruder without any authorization from the account holder or manipulating
with the intent of stealing or using information for committing a crime for another
person (Singh, 2012). Usually, computer hackers are very skilled and can write a
code/program to destabilize or decode a computer or a network system (Singh, 2012).
Another form of hacking is by reconstructing a security password of a user, and thereby
attempting to enter the system for evil intentions. Furthermore, they decrypt any critical
data forwarded via the internet and these may include credit cards especially in online
businesses (electronic commerce) by inserting a software that would every key and
record their details (Kamanda, 2013).
When hackers invade the system and access critical institution’s data, including
business plans, details on customer profiles, and other confidential information, the
affected company or an institution suffers great deal of losses. Attackers may also trade
stolen information to other business competitors. They may make customers run away
from a company whose data have been infiltrated to another company whose security
systems are more secure.
In addition, criminal may transmit malwares to other computer systems and cause
disappearance or damage to crucial data (Abdallah, 2012). Often, websites are
infiltrated by criminals and make them inaccessible causing havoc especially to
business website users. There is also a challenge of using someone else’s identification
to send messages to other people using email (Olena, 2012).
2.2.3 Cyber space
Cyberspace crime has increased tremendously in recent years. Currently, cybercrimes
are commonly occurring in many jurisdictions through Cyberspace. The word
cyberspace was first coined by the author William Gibson in his sci-fi novel
Neuromancer (1984) as-
“A metaphor for describing the non-physical terrain created by computer systems.
Online systems, for example, create a cyberspace within which people can
communicate with one another (via e-mail), do research, or simply window shop. Like
physical space, cyberspace contains objects (files, mail messages, graphics, etc.) and
different modes of transportation and delivery. Unlike real space, though, exploring
cyberspace does not require any physical movement other than pressing keys on a
keyboard or moving a mouse”(Dalla and Geeta, 2013).
In this regard, the virtual world, which is existing in the domain of cyberspace, is
without borders and this created space for cybercrimes, which are more less internet-
based crimes.
2.3 An overview on the genesis of cybercrimes
The first cybercrime is reported to have in the year 1820. This is indisputable because,
computer came into existence from 3500 BC in India, China, and Japan. The first virus
for a personal computer was traced back to 1980, however, the world was largely
unaware until the Melissa virus began to infiltrate millions of computers in the late
March 1999 and which involved the New Jersey State Police and the Federal Bureau
of Investigation (Mambi, 2010).
In the earlier days, around 1970s, information security was only employed to business
computer systems whose focus was on preventing fraudulent activities. the protection
is needed t to deal with such sensitive data as leaks (privacy), worms that affect the
operations of some critical applications (integrity), damaging of important systems
(accessibility), or compromising of users confidential information (theft) (Ollena,
2012).
In Tanzania, optic fiber is currently becoming the National pillar infrastructure for
various ISs (URT, 2012). Optic fiber is widely used after the landing of submarine
cables (EASSY, and SEACOM) and development of the national optic fiber
(NICTBB). This development of national optic fiber in Tanzania and similar
developments elsewhere have made the manner in which countries have to secure their
assets of national interest more complicated (TCRA, 2013). Cybercrimes have now
been widely reported in many other countries around the globe as a result of rapid
development of their web based infrastructure ISs and their internet connectivity. The
phenomenon expansion of cyberspace-based crimes has led to an increase of challenges
in ensuring the security of ISs and thus a rapid increase in the occurrence of
cybercrimes and rising concerns on how the police manage it (TCRA, 2013).
2.3.1 Categories of cybercrimes
There are four main categories of cyberspace-based crimes as follows:
Cybercrime against individuals: This category involves intimidation through
electronic mails, cyber-stalking, transmission of vulgar and immoral material, slander,
unsanctioned control/access to the computer system (hacking), offensive exposure,
email deceiving, spam, dishonesty and deception (Mambi, 2010)
Cybercrime against individual property: This category includes swindling of credit
cards, computer sabotage, spreading of mischievous code (virus/worm/Trojans),
unsanctioned control/access over computer system (hacking), intellectual property
crimes (software piracy: unlawful copying of programs, dissemination of copies of
software, breach of copyright; infringement of trademarks, stealing of computer
source code), and stealing of internet time (Magalla, 2013
Cybercrime against organization: this category involves blocking of service, email
bombing, salami attack, logic bomb, Trojans horse, data diddling, and unsanctioned
control/access over computer system, possession of unauthorized information,
dissemination of plagiarized software and cyber terrorism against the government,
organization and other entities (Singleton, 2014).
Cybercrime against society at large: This category involves absence images
(basically child pornography), corrupting the youth through offensive exposure, illegal
trading, financial crimes, and sale of unlawful articles, online betting, counterfeit, and
web jacking (Singleton, 2014).
2.3.2 An overview on cybercrimes in Tanzania
The global reach and the omnipresence of the Internet have created of wants,
privileges, and susceptibilities to both developed countries and developing countries
including Tanzania. To enable to make secure electronic transactions, there has to be
an environment of trust, which must be sustained through the legal and regulatory
mechanisms (Ndumbaro, 2010).
Cybercriminals worldwide are persistently looking for gaps, which would be utilized
to do criminal activities. A country with insufficient cyber-law is principally providing
an avenue for cyber-criminals to operate freely. Cybercrime poses a huge challenge to
Information and Communication Technology (ICT) industry in the country. This is
particularly so as Information and Communication Technologies (ICTs) especially
mobile phones and the use of the internet and the related e-communication services
have permitted our life systems in this country (URT, 2010).
Over 500 Tanzania people have been arrested by the Cybercrime Unit between 2011
and 2012 over cybercrime activities. According to the Government,(URT, 2010) after
reinforcing the Cybercrime Unit in the country, the battle against cybercrimes has
started to produce fruits and that about 320 people were arrested between July and
December 2011 (URT, 2010). According to the Government, report (URT, 2010).In
year 2012, 230 people were detained over cyber crime. The report indicates further that
over 1bn/-, € 8,897 and $ 551,777 are said to have been stolen through cybercrime.
This is posing a huge challenge to the Government, which has limited resources to be
expended in addressing the problem
2.3.3 The OECD Guidelines for the Security of Information Systems and
Networks
These guidelines were first released by the Organization for Economic Cooperation
and Development (OECD) in September 2002.The guidelines are given with the aim
of developing security and confidentiality in the Digital World among member
countries. These are meant for players in the information system and network to create
consciousness and understanding of security matters in the Digital worlds. The
guidelines, which are the basis for building a tradition of security in the society are as
follows:-
Awareness: awareness of the necessity for safety of information systems and networks
and what players can do to improve security (OECD, 2002).
Responsibility: All players are accountable for maintaining the security of information
systems and Networks (OECD, 2002)
Response: Players should act in an appropriate and co-operative manner to avert,
identify, and respond to security events.
Ethics: Players should respect the genuine interests of others. (OECD, 2002)
Democracy: The security of information systems and networks should be well
matched with essential values of a democratic society (OECD, 2002)
Risk assessments: Players should conduct risk assessments.
Security design and implementation: Players had better incorporate security as
essential elements of information systems and networks. Security management: Players
should embrace a comprehensive approach to security managements (OECD, 2002)
Reassessment: Players should review and reassess the security of information systems
and networks, and make suitable adjustments to security policies, practices, measures,
and procedures (OECD, 2002).
2.3.4 The Deauville Declaration for protection of the Internet
On 26th May 2011, the G8 countries established the Deauville Declaration for Internet
and resolved that its core principles have to be implemented and must be included in a
broader framework. the framework focusing on the rule of law, human rights and basic
freedoms, the protection of intellectual property rights, which motivate life in every
independent society for the advantage of all the people(Yonazi, 2012).
More importantly, it was strongly believed that freedom and security, transparency,
and the respect for privacy and the exercise of rights and accountability have to be
attained together. Both the framework and principles must receive similar protection,
with the same assurances, on the Internet as everywhere else (Yonazi, 2012). This
declaration was meant to harmonize the computer and cybercrime laws and averting
the occurrence of safer heaven cybercriminals. It is recommended that the formation of
laws and a wart against offender sought to be taken together to attain the objectives
(Yonazi, 2012).
2.3.5 The Cybercrimes Act in Tanzania
The Tanzania Cybercrimes Act of 2015 is one of the main Laws governing and
regulating issues of cybercrimes in Tanzania. In this context, this is the principal law
that sets out the offences or the cybercrimes that can be committed and the prescribed
penalties. For instance the Act provides in relation to cybercrimes offences that;
4.-(1) A person shall not intentionally and unlawfully access or cause a computer
system to be accessed.
(2) A person who contravenes subsection (1) commits an offence and is liable, on
conviction, to a fine of not less than three million shillings or three times the value of
the undue advantage received, whichever is greater or to imprisonment for a term of
not less than one year or to both. (URT, 2015)
5-(1) A person shall not intentionally and unlawfully, remain in a computer system or
continue to use a computer system after the expiration of time, which he was allowed
to access the computer system.
(2) A person who contravenes subsection (1) commits an offence and is liable, on
conviction to a fine of not less than one million shillings or to imprisonment for a term
of not less than one year or to both (URT, 2015. The above are some of the cybercrimes
that can be committed.
The act further provides that,
7.-(1) A person who intentionally and unlawfully-
(a) damages or deteriorates computer data;
(b) deletes computer data; (URT, 2015)
(c) alters computer data;
(d) renders computer data meaningless, useless, or ineffective;
(e) obstructs interrupts or interferes with the lawful use of computer data;
(f) obstructs, interrupts or interferes with any person in the lawful use of computer
data; or
(g) denies access to computer data to any person authorized to access it, (URT, 2015)
commits an offence and is liable on conviction, to a fine of not less than ten million
shillings or three times the value of undue advantage received, whichever is greater,
or to imprisonment for a term of not less than three years or to both (URT, 2015) The
act provides inter-alia, many issues that regard cybercrimes in Tanzania.
2.3.6 Main Approaches to cybercrimes in Tanzania
Tanzania does not have one harmonized framework of regulating cyber related crimes.
Most of these frameworks are presented in a disjointed form. These mechanisms may
be divided into the following main classifications:
Legislative Forms:-
The Tanzania economy and the business world have been subjected to a rise of cyber
rimes and the question has always been whether the subsequent reforms of managing
cybercrimes and the related offences have done anything to reverse the situation (URT,
2010). And so follows the review of the efficiency of the cyber law related reform,
which started in earnest from the year 2007. The country has achieved tremendous
success in disseminating ICT (Ndumbaro, 2015).
This development, which has been well received by people and Internet service
providers (ISP) who are were struggling to respond to unprecedented omnipresence of
the Internet, have given rise to new forms of wants, privileges, and created and
sustained through the legal and regulatory framework (Mambi, 2010).
It is evident that the amended Evidence Act, the National Science, and Technology
Policy, the Tanzania Development Vision of 2025 and at least four previously drafted
bills, which are, now acts of Parliaments by the Law Reform Commission. The bills
are as follows; Electronic Evidence Act, (2013), Electronic Transaction and
Communication Act, (2013), Cyber and Computer Related Crimes Act, (2013), Data
and Privacy Protection Act, (2013), were the initiatives of the Government of Tanzania
in going abreast with the e-technology industry. These aimed at creating a legislative
approach aiming at reversing the situation in adopting and combating cybercrimes in
Tanzania (URT, 2010).
Government-based Advisory and Regulatory bodies:-
On the part of regulatory and advisory bodies, Tanzania established the TCRA
(Tanzania Communications Regulatory Authority) which is under the Ministry of
Communications. The TCRA), which was started by the TCRA Act, is an independent
organ for the postal broadcasting and electronic communications sectors and the
Tanzania Police Force in the United Republic of Tanzania (URT, 2010).
However, TCRA is a merger between the then Tanzania Communications Commission
and the Tanzania Broadcasting Commission, and whose roles are licensing, and
regulating postal services, broadcasting services and electronic communications
sectors in the United Republic of Tanzania. This organ is also monitoring the
implementation of Information Computer Technology (ICT) application) (Yonazi,
2012). It is worth noting nevertheless that the foregoing] development of the licensing
framework focuses on the expansion of more ICT infrastructure and not on the
appropriate use and protecting of users from criminal practices. This because there was
very limited development of ICT services with less than 150,000 people using
computers and related services. This gives another arena for many more organizations
coming up with ways of controlling and combating cybercrimes (Yonazi, 2012).
2.4 Relevant theories to the Study
The study was guided by the following theories:-
The Basic Strategic Planning Theory: The theory is usually effective for institutions
that have little previous experience of doing strategic planning. The theory presupposes
that organizations should have time to spend on the process of strategic planning. As
the name implies, , this is the most elementary kind of strategic planning that
establishments and entities can use to become conversant with the process and then
develop on them in the future as they become more with the process and more
conventional as an organization(Free, 2010).
The theory assists entities in internalizing strategic planning in the systems for delivery
and management of services (Free, 2010). The theory is relevant in the current study in
that, addresses cybercrime whose management cannot depend on the legal or
institutional approach alone. The problem requires all concerned institutions such as
Tanzania Police to design and implement strategic planning that would design
managerial responses, mechanisms, and processes of managing cybercrimes in
Tanzania.
Additionally, this theory is linked and operates in consideration of the following
aspects:-
Long-term Strategic Plan:-
The long term strategic Plan is very essential in ensuring that an organization or a public
independent entity like the Tanzania Police force formulates a long term strategic Plan.
The Plan will have a comprehensive definition of what the entity ought to take or to
implement within a five year period.
In this context, it remain equally important that, in order that the Tanzania Police force
manages effectively cyber crimes in Tanzania, it must formulate a comprehensive
strategy that will define the strategic initiatives to be taken by the Tanzania Police
force in managing cyber crimes in Tanzania. However, in the event where, the five
year strategic plan does not comprehensively addresses managerial issues related
to the management of cyber crimes, the controlling and sustaining effective
management of cyber crimes will likely not be sustained.
Resource Pooling:-
The basic planning theory can become operative in relation to how the Tanzania Police
force is engaged in the management of cyber crimes when the entity itself is
strategically engaged in pooling resources which are compatible with its managerial
initiatives to influence the management of cyber crimes in Tanzania.
On the basis of the relevancy of theory in relation to the study, managing cyber crimes
effectively by the Tanzania police force requires resources and these may include,
information and technology devices, funds or the budget component, well equipped
cyber crimes units with requisite office and technological material, steady power
supply and a well equipped electronic investigation laboratory.
However, if the Tanzania Police force fails to pool the necessary resources which are
requisite for its effective management of cyber crimes in Tanzania, then the inability
not to provide the necessary resources to the cyber crimes team or department, will
likely disfavor all the efforts and initiatives that the Tanzania police force is likely to
be engaged in and hence persistence in occurrence of more cyber crimes within the
society.
Qualified Personnel:-
The theory presupposes putting or hiring or recruiting qualified personnel by the
Tanzania police force, in its efforts to manage cyber crimes in Tanzania. In this
perspective and taking on board the planning theory in relation to the management of
cyber crimes in Tanzania by the Tanzania Police force, the hiring and recruitment of
qualified personnel or their frequent training is necessary and important.
The latter is based on the assumption that, issues surrounding cybercrimes are dynamic
and they change f to time to time and the way to manage them and have pro responses
to the emerging cyber crimes is technical and requires personnel with the requisite
knowledge in order to overcome the dynamic challenges involved in the management
of cyber crimes. On the basis of the theory and taking into consideration its strength,
the Tanzania Police must invest and have a well trained personnel in the cyber crimes
units so that it can be able to examine dynamics, carry out investigations and advice
the Tanzania Police force Man agent team effectively on issues of cyber crimes.
Managerial Commitment:-
The theory envisages strategizing on all matters and aspects that have a linkage on the
management of cyber crimes by the Tanzania Police force and this includes having a
committed management that will take and understand cyber crimes as a threat to
businesses, public investments, security as well as financial transactions. Managerial
commitment instigates a culture that everything has to be strategically managed and
this includes cyber crimes management. In this context and under the strategic planning
theory, managerial commitment will spell out on the strategic priorities to the
management on it is strategically committed to manage cyber crimes in Tanzania.
The stewardship Theory:-
This theory has a synonym namely stakeholders’ theory. The theory adopts a different
method from the Basic Strategic Planning theory. The stewardship theory begins with
the assumption that establishments serve a broader social goal than just maximizing
shareholders’ riches. Under this theory, stakeholder can be considered as ‘the end’ as
well as the ‘means to an end (Clarke and Clegg, 1993).
On the other hand, the recognition of the stakeholders value by the theory can be can
be considered as ‘means to an end.’ The theory looks at stakeholders as a tool of
enhancing corporate performance and efficiency of the Tanzania Police Force towards
addressing and managing effectively cybercrimes in Tanzania. The theory therefore
adopts the approach of involving stakeholders or the public towards efficient
management of cybercrimes in a. The operation of the can be sustained through the
following:-
Consideration of Stakeholders interests:-
The stewardship theory is based on the assumption that , good public action of any
entity or public decision making by the Tanzania Police force in respect of in its
initiatives to manage cyber crimes in Tanzania must reflect and take into consideration
the interests and views of stakeholders. This implies that, the Tanzania police force has
an obligation to consider the interests and views of all key stakeholders in its efforts
to effectively manage cyber crimes in Tanzania and this a managerial platform where
the views and interests of stakeholders are streamlined towards having a more
comprehensive strategic plan for management of cyber crimes in Tanzania by the
Tanzania Police force.
Engagement of stakeholders:-
The stewardship theory draws an assumption that, an entity like the Tanzania Police
force should widely engage stakeholders in its efforts to effectively manage cyber
crimes. The latter involves creating formal platforms and forums within which
stakeholders can help the Tanzania Police force in building both policy and institutional
capacity on how to deal with issues affecting the management of cyber crimes in
Tanzania.
This will broaden on the way the Tanzania police force operates on issues affecting
cyber crimes management and this will more likely be sustained through conducting
periodical reviews with stakeholders will also broaden a checks and balancing system
from the Public or stakeholders to the Tanzania Police Force on issues affecting the
Management of Cyber Crimes in Tanzania.
2.5 Empirical literature
In view of the reviewed literature, much has been demonstrated on the regulatory and
legal perspectives by which Tanzania has embarked on addressing the threat
cybercrime. However, literature has not explicitly demonstrated the factors influencing
the management of cybercrimes in Tanzania with reference to Tanzania Police Force,
which this study sought to address.
A study by Mwingira (2013) examined the elimination of cybercrimes in Tanzania by
analyzing the law and practices in the fight against cybercrimes. The study revealed
that there has not been a strategic harmonization of legal practices for the control of
cybercrimes. And in spite of the legal reforms and strategies, which have been adopted,
cybercrimes are highly being committed in Tanzania.
Another study by Ndumbaro, (2013) focused on cybercrimes in relation to the freedom
of expression and revealed that cybercrimes in Tanzania has highly affected the
citizen’s constitutional freedom of expression and this too requires a legal harmony.
These studies never examined the rationale or factors that cause poor management of
cybercrimes. The current study is set to examine the management of cybercrimes with
reference to the Police force in Tanzania.
Further, a study by Robinson, (2015) made a critical analysis on the status of
cybercrimes and legal reforms in Tanzania, and revealed that the earlier laws on the
control of cybercrimes were very inadequate and the recent legal reforms and
formulation of new policies and laws have not yet brought any viable response to in
controlling cybercrimes in Tanzania,
Furthermore, the concerned institutions use reactive approaches to address the problem.
The study did not analyze issues affecting the management of cybercrimes in Tanzania
and this is what this study seeks to address. Elsewhere, Mshangi et al; (2013) examined
rapid growth of cybercrimes in the information systems in Tanzania.
The study revealed that 12.8 percent of users have been suffering from cybercrimes
because of surfing through insecure websites in the cyberspace, over 90.89 percent of
internet suffers were blocked from accessing torrents/p2p applications (with malicious
codes); and over 63.29 percent of the electronic mails received by users were junk
mails. The number of Internet users sky rocked to 5.63 million in 2012 out of 46.9
million of them were in Tanzania; and this figure has been rising and reached 416.98
percent annually and was expected to reach 7.34 million by December 2015. The rise
in the number of Internet users has a direct impact on the rise of cybercrimes, which
are negatively affecting information systems.
These studies never examined issues on how Tanzania Police Force manages in this
study therefore examines the factors affecting Tanzanian Police Force in the
Management of Cybercrimes in Tanzania.
2.6 Conceptual Model of the Study
This conceptual framework represents the relationship between the variables under
investigation. In this study, factors affecting cybercrimes are the independent variables
and the management of cybercrimes by the Tanzania Police Force is the dependent
variable. This conceptual model has been developed based on the relationship between
the independent and the dependent variables under investigation.
The latter is based on the assumption that, the manipulation of the independent
variables in the framework for managing cyber crimes by the Tanzania Police force
will have an impact in terms of managing and controlling cyber crimes in Tanzania on
part of the Tanzania Police force.
In this context, once the Police force puts efforts on strategic planning integration of
information and communication systems, improving all the internal systems within its
cyber crimes unit and sections, training of its personnel and engagement of
stakeholders, then this is likely to produce measurable outputs in form of reduced or
zero cyber crimes, qualified personnel to deal with cyber crimes investigation, an
efficient engagement of stakeholders and effective management of cyber crimes.
The relationship under this conceptual framework between the independent variables
and the dependent variables are in line with the strategic planning and the stewardship
theories as adopted in this study.
Figure 2. 1: Conceptual Model of the study
Source: (Mbembela, 2019)
Framework for Managing Cyber
Crimes by the Tanzania Police
Force Strategic
Planning
ICT Integration
Internal Systems
Integration
Training and
Stakeholders
engagement
Efficient control
and Management
of Cyber Crimes
Ideal
participation of
Stakeholders
Increased No. of
Qualified
Personnel
Reduction on the
rate of Cyber
crimes
commissions
Policy
Budget
Political
Commitment
CHAPTER THREE
RESEARCH METHODOLOGY
3.1 Introduction
This chapter presents the study methodology entailing a description of research design
used; the study area, the sample population, the sample size, and sampling techniques
used, and methods and instruments of data collection. The Chapter also focuses on
issues of validity and reliability of data collection tools and ethics were addressed in
the current study. . Lastly, the Chapter specifies how data were coded, cleaned,
interpreted, and analyzed.
3.2 Research Design
This is a design is a plan, a strategy, and procedures for a research work which begins
from general assumptions, hypotheses, to detailed instrumentation of collecting,
coding, interpreting and analyzing data. The current study used a case study research
design. These designs are a strategy of inquiry where the researcher investigates a
phenomenon, an event, an activity, process, or more individuals in depth. Cases are
time and activity bound; therefore researchers gather data using various data collection
procedures over a given time (Maykut, 1994)
In this study, a case study research design was used in examining the factors that affect
the management of cybercrimes in Tanzania by the Tanzania Police force. The research
design was used because it assisted the researcher in examining in depth what
management style and approach or cycle can influence the functional systems and
mechanisms of the Tanzania Police Force on effective management of cybercrimes.
Accordingly, the use of the design raised a possibility that the researcher collected data
and effectively engaged the respondents in obtaining valid responses in relation to the
research problem.
3.3 Area of Study
The area of study was at the Headquarters of the Tanzania Police Force, which are
located within Ilala Municipality, Dar es Salaam. The Tanzania Police Force is charged
with the responsibility of keeping law and order in all Tanzania geographical societies.
The Police Force is administratively under the auspices of the Ministry of Home affairs
and the force is headed by the Inspector General of Police, the Force has eight
commissions namely Finance and Logistics, Administration and Human Resource,
Criminal Investigation, Criminal Intelligence, Community Engagements, Training and
Operations, Zanzibar and Forensic Bureau.
The Tanzania Police Force is also mandated to investigate crimes as per Section 5 of
the Police Force and Auxiliary Service Act, Cap 322. In this study, all other commands
outside the scope of the Tanzania Police Force headquarters were excluded with the
exception of the corporate and financial institutions, which have been probing
cybercrimes in Tanzania.
3.3 Study Population
This refers to the number of units from which data are likely to be gathered. Units may
be individuals, events, organizations, or artifacts (Murphy, 2003). Sample is a
collection of objects, events, or individuals with some common characteristics, which
the researcher wishes to investigate and then generalize/transfer the findings.
The study population included Tanzania Police force Gazzetted Officers serving at the
headquarters, Inspectorates Police officers, Non Commissioned Officers, Corporate
Managers from Corporate Institutions and other subordinate police officers at the
Headquarters of the Police force and managerial and Police Constables especially
within the cyber departments of corporate and financial institutions which were
sampled.
3.4 Sample size
A sample size refers to the number of sampling units, which were included in the
sample. In this study, the sample size used is as indicated in Table 3.1.
Table 3. 1: Sample Size adopted and used in the Study
Sampling frame No. of Respondents Percentage
Gazzated Officers 15 13
Inspectorates 25 22
Non Commissioned Officers 30 26
Corporate Managers from Corporate
Institutions
20 17
Police Constables (Pc’s from the Cyber
Department)
25 22
Source: The Police force, Human Resource Department, (2018)
The sample size used in the study involved 115 respondents.
3.5 Sampling Techniques
In sampling for this study the non-probability sampling was used.
This is a sampling procedure, which does not provide any basis for approximating the
probability that each item has an equal chance of being included. That is to say, in this
sampling procedure is not guaranteed that every element has an equal chance of being
selected in the sample (Adam and Kamuzora, 2008).
The researcher used this sampling technique because the study sample, which included
Gazzeted Officers of the Police Force, were not guaranteed participation. the technique
helped the researcher to set up the criteria of selecting the respondents.
Similarly, in the current study, the researcher employed accidental or convenience
sampling, which is anon-probability sampling technique that involves selecting the
respondents based on availability and willingness to participate in the study and to
positively reply to questions set out in determining the study objectives. Further, the
study involved stratified sampling technique on Police Officers and Police Constables
in the Cybercrimes Department.
3.5.1 Sampling Procedures
In this study, the sampling techniques described in Section 3 and 5 were used to Obtain
the total number of the Gazzetted Police officers serving at the Headquarters of the
Tanzania Police force.
(I) Obtain the total number of Inspectorates and Noncommissioned officers and other
Police constables of the Tanzania Police Force at the Headquarters of the Tanzania
Police Force.
(II) Select the respondents from the corporate and financial institutions from which the
sample size was drawn and this was done in accordance with the sampling
techniques adopted in the study.
3.6 Data Collection Methods
This section of the methodology in this study shows the nature and sources of data to
be used in the conduct of the study.
3.6.1 Nature and sources of Data
The study was in qualitative in nature and it relied more on qualitative data in
addressing the objectives and research question in relation to the research problem
under investigations. Accordingly, the study involved collection of primary data which
was collected through the use of questionnaires and interviews conducted on
respondents and secondary data was collected through documentary review of laws on
cyber crimes, annual reports of the Tanzania Police force.
3.6.2 Data Collection Methods and instruments
In this study, the researcher used the following data collection methods:-
I. Interviews
II. Focused group discussions.
III. Documentary review
IV. Questionnaires
(i) Interviews
An interview is a formal meeting in which one or more persons question, consult, or
evaluate another person (Maykut, 1994). This method of data collection was
administered to Gazzetted Police Officers and Senior Police Officers at the
Headquarters of the Tanzania Police Force in Tanzania.
The data collected through this method focused on the factors affecting the
management of cybercrimes in Tanzania, managerial mechanisms used in the control
of cybercrimes, the challenges faced, and how they can be addressed. This method was
used because it effectively engaged Police Constables and employees from the
financial institutions in expressing their perceptions on the threats of cybercrimes and
how the Police Force focused was in improving the delivery of quality services.
Accordingly, this method was used because interviews are flexible, involve a high
response rate, and have a wide coverage, control of the interview situation and
completeness. The researcher interviewed the Police commissioners charged with
managerial functions in the data collection process.
(ii) Documentary Review
A documentary review is an independent review of documents. This method of data
collection was used especially in the collection of secondary data, which were relevant
to the research problem. The key documents reviewed in the data collection process
included, the strategic plan for 2015-2020, for the Tanzania Police Force, and the
Cybercrimes Act, 2015, the National Information and Communications Policy of 2016.
Other documents included are the sustainable Development Goals of 2015, the
Tanzania National Development Vision, 2025 and the Tanzania Crimes Report of 2017
issued by the Tanzania Police Force.
(iii) Focused Group Discussion
A focused group is a group of interacting individuals with some common interests or
characteristics, and who have been brought together by a mediator, who uses the group
and its interaction in gaining information about a specific or I the issue under
investigation. This method was administered especially to the Gazzated and
Noncommissioned Police Officers serving at the Headquarters of the Police Force in
Tanzania.
The participants under this method included, 8 Noncommissioned Police Officers from
the Cybercrimes Unit of the Tanzania Police Force and 3 representatives from the
corporate financial and telecommunications companies as well as 10 police constables
from the Tanzania Police Force. The interviewer produced accommodating and
encouraging environment which encouraged different insights and points of view,
without compelling members to vote, plan, or reach a consensus in relation to the
research problem under investigations and the discussion involved open ended
interview questions Accordingly focused group discussion was conducted by the
researcher included a maximum 21 participants.
(iv) Self-administered Questionnaire:-
This is a questionnaire, which has been designed completed by participants with the
direction of the researcher in gathering primary data. This technique was used in the
gathering of primary data on the factors affecting the management of cybercrimes in
Tanzania and on the managerial mechanisms being used. These questionnaires were
administered to more than 50 The set questions addressed both the research objectives
and the research questions. The researcher used this method because of its flexibility
and had a high response rate since the participants were likely to be fully engaged in
responding to structured questions in the questionnaires.
The grouping of the participants under this section was based on their rank in the Police
Force that is 10 respondents were selected from the Gazetted Police Officers, 25
respondents were selected from the Noncommissioned Police Officers, and 15
respondents were selected from the Police Constables who were directly involved in
the cybercrimes investigations.
3.7 Ethical considerations
In the current study, the researcher observed the research ethics by giving all the
participants the opportunity of knowing their privileges and responsibilities as
participants. The purpose of this study, and why the data were collected were
communicated to participants. Important research ethics in the current study also
entailed but not limited to, privacy, secrecy, time management were correctly observed
by the researcher, and names were held confidential.
Accordingly, in observing research ethics in the conduct of the study, the researcher
obtained permission from stakeholder entities, for instance from the bank and financial
institutions which were visited in the data collection process and the information
collected has remained confidential between the entity and the researcher.
3.8 Data management framework for the study
This refers to storage, access, and preservation of data created from a given study. Data
management practices cover the entire lifecycle of the data, from planning the
examination to implementing it, and from backing up data as they are created and used
to long-term preservation of data deliverables after the research investigation has been
finalized. The data management process was used in the editing of data and testing both
data validity and the reliability of data collection instruments used:-
Validity and Reliability
Validity refers to the extent to which a tool measures what it is intended to measure.
In this study, the questionnaire was designed to determine the respondents’ awareness
on cybercrimes issue and their management by the Tanzania Police Force. All the
questions together reflected fully the concept of managing cybercrimes and factors
affecting it within the Tanzania Police Force.
In this study, procedures which were followed to guarantee validity were as follows:-
The questionnaires were articulated and validated by the Police personnel with the
expertise in the field of study.
a) The questionnaire was also given to the experienced managerial practitioners at
Headquarters of the Police Force.
b) The questionnaire was pre-tested, reviewed, and corrections made, where
necessary, following feedback from the pre-test prior to the main study.
Reliability: this is the uniformity with which data collection instruments or methods
measure the target attributes or responses and can be equated with a measure’s stability,
consistency, or dependability. This entails the extent to which all the participants
understand each question in the same manner. Reliability entails that each question in
a questionnaire needs to be understood by all the participants in the same manner and
the responses need to be reliable, data were tested using cronbanch and were found to
be between 0.985 and 0.986, and there was good.
However, the researcher ensured reliability by:-
a) Holding discussions with the Police Personnel with broad experience in the use of
reliable instruments prior to the actual data collection.
b) Pre-testing the questionnaires, this was done to avoid words that were vague or
would yield data that were consistent with the requirement of the research
questions.
c) Developing the questionnaire from formerly used tools and relevant literature in
connection to the management of cybercrimes in Tanzania by the Police force.
d) Adequately checking data collection by looking for accurateness, completeness
and any missing data at least after every three days.
e) Giving every participant unique identification code that will be used during data
entry.
f) Approaching the participants, and informing them of the aim, method, and
significance of the study as well as the duration of the interview and inviting them
to participate in the study. In addition, guaranteeing them of privacy and that
deciding to leave would not compromise the care they would receive.
Editing-
Data editing entails recognizing errors, spelling mistakes, improper information and
oversights in the raw data to be collected (Adam and Kamuzora, 2008). The
fundamental goal of data editing is to secure a quality standard of the data and implied
doing necessary improvements in the interviews and questionnaire data. In this study,
the data from the field went through the crucial data editing procedure where by faults
in the information were consequently corrected. Also, this document was sent to
language expert for final editing of grammar.
Coding and Analysis of Data:- The original coding of data and observing new issues
in the gathered data and this that the researcher went through to read the original data
files several and this involved a formation of a coding scheme and then coding the data.
The codes were employed to identify the specific sections including the interview and
the information to be analyzed by observing new issues in the data through importing
and labeling of data files, coding data files and looking for coded segments in the data.
Data analysis is the calculation of certain procedures along with looking for associates
of the association that exists between data groups. In this study, the qualitative data
were gathered and analyzed using qualitative process of fragmenting data, isolating, or
disaggregating research resources, into bits and pieces, parts, elements, or units and the
facts, into manageable pieces. The qualitative and quantitative data was analyzed in the
following ways:-
Making association with the research questions: this procedure entailed recounting and
further developing the themes from the data to respond to the major study questions.
The themes were recognized and reviewed with the main research questions as a
mechanism for analyzing data, which were applied to each research question and the
data collected on it. Furthermore, the analysis of data was using the Statistical Package
for Social Sciences (SPSS).
Interpreting findings: the collected data were categorized themes by trimming the
interview data into "blocks" and cataloguing them into each of the codes. The data were
then reviewed within the themes or classes, and the understanding of each of them was
arrived in connection with the specific research questions.
CHAPTER FOUR
DATA PRESENTENTION, ANALYSIS, AND DISCUSSION OF FINDINGS
4.1 Introduction
This chapter presents the study findings, analysis, and the discussion of findings. The
chapter comprises five major sections; the first section is on findings on demography
or characteristics of the participants. The second section presents the findings and
discussion on the managerial mechanisms used by the Police Force in the Management
of Cybercrimes in Tanzania, the third section presents the findings and discussion on
the level of awareness among the Police Personnel on the Management of Cybercrimes
in
The fourth section presents the findings on the participation of the Police Force in
Policy Forums on Managing Cybercrimes in Tanzania, and the fifth section presents
the findings and discussion on the limitations faced by the Tanzania Police Force in
Managing Cybercrimes in Tanzania.
The study involved examining four research questions and these included determining
the Managerial mechanisms used by the Police Force in the Management of
Cybercrimes and the Level of awareness among the Police Personnel on the
Management of Cybercrimes. Others include looking at whether the Tanzania Police
Force Participates in Policy Forums for Managing Cybercrimes and the Limitations
faced by the Tanzania Police Force in Managing Cybercrimes in the country. The
findings and the discussion in this chapter reflect the research objectives and the
research questions.
4.2 Demographic Data of the Respondents
The study investigated the demographic statuses and profiles of the participants and the
responses collected are shown in Table 4.1:-
Table 4. 1: Sex of the Respondents
Frequency Percent
Valid
Male 86 74.8
Female 29 25.2
Total 115 100.0
Source: (Field Data, 2019)The findings in Table 4.1 indicate that 86 (74.8%) out of the
115 respondents were males and 29 (25.2%) out of the 115 respondents were females.
The findings imply that more male than female respondents participated in the study
and that more male Police Officers were involved in the cybercrime management.
Though the findings do not suggest any gender differences between the sexes but they
suggest that the Tanzania Police Force employ more male than female personnel do.
Table 4. 2: Ages of the Respondents
Frequency Percent
Valid
18 to 25 years of age 23 20.0
26 to 35 years of age 36 31.3
36 to 45 years of age 39 33.9
46 to 55 years of age 12 10.4
Above 56 years of age 5 4.3
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.2 indicate that 23(20%) respondents were between the ages of
18 to 25 ,while 36(31.3%) respondents were between 26 to 35 years of age,
39(33.9%)were between 36 to 45 years of age, 12 (10.4%)were between 46 to 55 years,
and 5 (4.3%)were above 56 years of age.
The findings imply that the respondents were under various age cohorts, and many of
the respondents were far from the retirement age. This implies that they can still serve
in both the Tanzania Police Force and in other financial institution for effective
management and control of cybercrimes in Tanzania.
Table 4. 3: Education Levels of the Respondents
Frequency Percent
Valid
Primary Level of Education 22 19.1
Secondary Level of Education 19 16.5
Tertiary Level of Education 28 24.3
Diploma Level of Education 18 15.7
Degree Level of Education 17 14.8
Masters Level of Education 11 9.6
Total 115 100.0
Source: (Field Data, 2019)
The findings Table 4.3 indicate that 22(19.1%) attained primary Education, 19(16.5%)
attained secondary education, 28(24.3%) completed tertiary education, and 18 (15.7%)
attained diploma level of education. Furthermore, 17 (14.8%) had a Degree, and lastly
11(9.65) had Masters. The findings imply that majority of the respondents were
educated and knew how to read and write and were able to fully comprehend the
questions asked in both the interviews and in the questionnaires.
4.3 Managerial mechanisms used by the Police Force in the Management of
Cybercrimes in Tanzania
In this study, the respondents were asked as to whether the Tanzania Police Force was
involved in the management of cybercrimes in Tanzania. The findings are presented in
4.4:-
Table 4. 4: Involvement of the Police force in Managing Cybercrimes
Frequency Percent
Yes 76 66.1
No 27 23.5
I dont Know 12 10.4
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.4 indicate that 76 (66.1%) respondents agreed that the police
force was involved in the Management of cybercrimes27 (23.5%) disagreed, and only
12 (10.4%) were uncertain. The respondents had varying views on the involvement of
the Tanzania Police Force in managing cybercrimes and the majority of the respondents
agreed that the Tanzania Police Force in engaged in the Management of cybercrimes
in Tanzania.
The Respondents were further asked whether there were forums whereby the Tanzania
Police Force. Findings are presented in Table 4.5:-
Table 4. 5: Views on the Existence of Forums
Frequency Percent
Valid
Yes 76 66.1
No 24 20.9
I don’t Know 15 13.0
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.5 indicate that 66.1percent of the, respondents agreed that there
are forums whereby the Tanzania Police Force manages cybercrimes, 20.9 percent of
the respondents disagreed, and 13 percent were uncertain. The findings imply that
majority of the respondents had varying views on the engagement of the Tanzania
Police Force in the management of the cybercrimes.
The Respondents were further asked to identify the forums within which the Tanzania
Police Force manages cybercrimes and the responses obtained are presented in Table
4.6:-
Table 4. 6: Forums within which the Tanzania Police Force manages
cybercrimes
Frequency Percent
Valid
International Interpol Cyber
Crime Forum 55 47.8
Tanzania E- Government
Performance Review
Sessions
39 33.9
Corporate and Financial
Institutions Cyber Crime
Network
12 10.4
East Africa Cyber Network
platform 9 7.8
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.6 indicate that 55 or 47.8 percent of respondents identified one
of the forums is the international Interpol cybercrime 39 or 33.9 percent identified the
Tanzania E- government Performance review sessions. Further, 12 of 10.4 percent
identified the corporate and financial institutions (Cybercrime Network), and 9 7.8
percent of the respondents identified the east Africa Cyber network Platform. The
findings imply that the Tanzania Police Force is engaged in the management of
cybercrimes and this is done through forums including the network that exists between
the Tanzania Police Force and the Tanzania police force.
Further, the respondents were asked to identify the nature of managerial techniques
used by the Tanzania Police Force in managing cybercrimes. The findings are presented
in Table 4.7:-
Table 4. 7: Nature of Managerial Techniques used in Managing Cyber crimes
Frequency Percent
Valid
International-Protection and
Management Instruments on
Cybercrimes
60 52.2
Legislative Managerial
Techniques 40 34.8
Policy based Management
Techniques 8 7.0
Institutional Management
Mechanisms 7 6.1
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.7 60 or 52.2 percent of the respondents identified the
international-protection and management instruments on cybercrimes. Forty, 40, which
is equivalent or 34.8 percent identified the legislative managerial techniques, and8,
which is equivalent to 7 percent identified policy based management techniques,
7respondents that is equivalent to 6.1 percent of the respondents identified institutional
management
The findings the nature of the managerial techniques used by the Tanzania Police
Force in the Management of cybercrimes in ranges from institutional policy oriented
to international instruments and all these function interdependently and in the event
that they are intergraded with the structural and other managerial systems within the
Tanzania Police Management processes, then the purpose of managing and controlling
cyber crimes can be addressed.
The respondents were further asked to identify the managerial techniques used in in
Tanzania by the Police Force. The findings are presented in Table 4.48:-
Table 4. 8: Managerial techniques used
Frequency Percent
Valid
Engagement of Stakeholders 21 18.3
Investigation of Cybercrimes
Scenes 25 21.7
Use of the Cybercrimes Act,
2015 30 26.1
Execution and Carrying out of
Cybercrimes Analysis (Use of
Forensic approaches)
18 15.7
Collection of Evidence and
Involvement of the National
Prosecution Office (DPP)
7 6.1
Participation in Court
Proceedings (Cybercrimes Cases) 6 5.2
Internal Cybercrimes
Performance Reviews 5 4.3
Budget allocation to Cyber
Crimes Department 3 2.6
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.8 indicate that 21, which is equivalent to 18.3% percent of the
respondents identified the engagement of stakeholders in the management of
cybercrimes, and 25 which is equivalent to 21.7 percent, identified the investigation of
cybercrimes scenes. furthermore, 30 which is equivalent to 26.1 percent of the
respondents identified the use of cybercrimes Act, 2015.Seven 7, which is equivalent
to 15.7 percent of the respondents identified the execution and carrying out of
cybercrimes Analysis (Use of forensic approaches) and 6.1 percent identified the
collection of evidence and involvement of the National Prosecution Office.
Furthermore, the respondents identified participation in Court proceedings
(Cybercrimes cases and this was reported by6 respondents, which is equivalent to 6.1
percent. Furthermore, 5, which is equivalent to 5.2 percent of the respondents identified
the use of internal cybercrimes performance reviews and this is in contrast to only 3,
which is equivalent to 4.3 percent identified the budget allocation for cybercrimes
management.
The findings in Table 4.8 imply that the Tanzania Police Force uses a multiple of
managerial techniques to manage cybercrimes though they have not be very effective
in sustaining efficiency in managing cybercrimes.
The respondents were also asked on the effectiveness of the mechanisms used in the
Management of cybercrimes. The findings are presented in Table 4.9:-
Table 4. 9: Extent of effectiveness of the Managerial Techniques Used
Frequency Percent
Valid
Low Extent (15%) 35 30.4
Moderate Extent
(25%) 49 42.6
Great Extent (35%) 23 20.0
Greater Extent
(above 45%
8 7.0
Total 115 100.0
Source: (Field Study, 2019)
The findings in Table 4.9, indicate that 35 or 30.4 percent, of the respondents agreed
that the mechanism are effective at a low extent, 49 which is
equivalent to 42.6 percent of the respondents were of the view that the mechanism are
only effective at a moderate extent.
On the other hand, 23 respondents which is 20 percent agreed that the mechanism used
were effective only at a greater extent 8 or 7 percent of the respondents were of the
view that the mechanism are largely effective. The findings imply that even though the
respondents had varying views on the degree and extent to which the mechanisms used
by the Tanzania Police Force can facilitate effective management of cybercrimes,
majority of the respondents agreed that the mechanisms were effective only at a
moderate extent. This means that the mechanism used did not assist the Tanzania Police
Force in managing the cybercrimes effectively.
4.4 Level of awareness among the Police Personnel on the Management of
Cybercrimes in Tanzania
In determining this objective, the respondents were asked to identify the causes of
cybercrimes in Tanzania. The findings are presented in Table 4.10:-
Table 4. 10: Causes of Cyber crimes in Tanzania
Frequency Percent
Valid
Wide use of Information and
Communications Technology 27 23.5
Knowledge gap on
Cybercrimes by the Public and
Community
17 14.8
Weak Laws and Policies being
Implemented 12 10.4
Absence of a strong networking
platform among the most
affected Institutions (Corporate
and Finance)
18 15.7
Imaginary Budget allocate to
the Cybercrimes Department 12 10.4
Absence of Firm Political will
of the Government to fight
Cybercrimes
9 7.8
Inadequate skills within the
Tanzania Police Force to
Manage the dynamics of
Cybercrimes
10 8.7
Lobbying of Internal System
Users by the Cyber Criminals 10 8.7
Total 115 100.0
Source: (Field Data, 2019)
The findings Table 4.10 indicate that 27 or 23.5 percent of the respondents cited a wide
use of Information and Communications technology of the of , 17or 14.8 percent
cited knowledge gap on cybercrimes as a cause.
Furthermore, only 12, which is equivalent to 10.4 percent identified weak policies and
laws on cybercrimes as a cause. Furthermore, 18or 15.7 percent of the respondents
identified lack of a networking platform among the most affected institutions as a cause
of cybercrime. On the other hand, 12, which is equivalent to 10.4 percent of the
respondents identified imaginary budgets allocated to the cybercrimes department as a
cause 9 or 7.8 percent of the respondents identified lack of firm political will of the
government to fight against cybercrimes.
Furthermore, 10 or 8.7 percent, of the respondents identified inadequate skills within
the Tanzania Police Force in managing cybercrimes and lobbying with the internal
systems users with the cyber criminals as a problem. The findings imply that there is
no single factor can be attributed to explaining why cybercrimes occur in a society. The
causes emanate from the growth of the use of the internet, weak policies and imaginary
budgets. All these affect the efforts of by the Tanzania police force.
The respondents were further asked to mention the common cybercrimes committed.
The findings are presented in Table 4.11 below:-
Table 4. 11: Common cybercrimes Committed
Frequency Percent
Valid
Pornography 20 17.4
Publication of False
Information 20 17.4
Cyber Bullying 25 21.7
Computer Related Forgery 9 7.8
Computer Related Fraud 13 11.3
Access to and Retrieving of
Confidential Information 11 9.6
Illegal access to Computer
Networks 7 6.1
Data Espionage 4 3.5
Computer and systems
Hacking 6 5.2
Total 115 100.0
Source: (Findings, 2019)
The findings in Table 4.11 indicate that 20 or 17.4 percent of the, respondents cited
child pornography, and20 or 17.4 percent of the respondents cited publication of false
information. Furthermore, 25 or 21.7 percent identified cyber bullying, and only 9
respondent’s or7.8 percent identified computer related forgery.
Another 20 or 11.3 of the respondents identified computer related fraud, 11 or 9.6
percent of the respondents identified access and retrieval of confidential information as
among the common committed cybercrime. Further, 7, which is equivalent to 6.1
percent of the illegal access to computer networks, and 4or 3.5percent of the
respondents data espionage, 6 or 5.2 percent of the respondents cited computer and
systems hacking as among the common committed cybercrimes. The findings in the
Table and indicate that there is a rise on the commission of cybercrimes and the causes
range from not only using the computer and the internet but also internal users of
computer systems have been the criminal to commit This is why most cybercrimes
committed in the banks are linked to own employees.
The respondents were also asked to provide their views on how data are managed in
the management of cybercrimes. The findings are presented in Table 4.12:-
Table 4. 12: Data Management in managing cybercrimes
Frequency Percent
Valid
Demand for disclosure of all
sorts of Data relating to the
Committed Cyber Crimes
33 28.7
Retrieving and Collection of
Data from the Scene of Crime
or from the Data Devices
15 13.0
Examination of Data through
Forensic Means 16 13.9
Identification, Marking and
Reservation of Data for
Prosecution
24 20.9
Engagement and Interrogation
of all persons involved and
Criminals
10 8.7
A police officer applying to
Court to access data in case it
is Termed to be Confidential
17 14.8
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.12 indicate that 33, which is equivalent to 28.7 percent of the
respondents cited the demand for disclosure of all sorts of data related to the committed
crime. About 15 or 13 percent of the respondents cited retrieval and collection of data
from crime scenes or from the data device as the mechanism of managing cybercrimes.
Further, thirteen (3.9%) percent of the respondents cited examination of the data and
devices through forensic means, and 24 or 20.9 percent of the respondents cited the
marking and reservation of data for prosecution as the mechanism of managing
cybercrimes. On the other hand, only 10 or 8.7percent of the respondents out of the 115
cited the engagement and interrogation of all persons involved, and 17, which is
equivalent 14.8 percent of the respondents cited a police officer applying to a court for
access of confidential data as mechanisms of managing
The findings imply that management of cybercrimes, involves data on the devices used
by the cyber criminals and this begins with the demand for the The devices are
examined with forensic means, and to some degree, the Court is involved in granting
the Police access to confidential data from the private and public institutions, all of
which are involved in the management of data.
Accordingly, the respondents were further asked to identify the institutions that the
Police force works with in the management of cybercrimes in Tanzania. The findings
are presented in Table 4.13
Table 4. 13: Institutions networking with the Police in Managing Cybercrimes
Frequency Percent
Valid The Tanzania Revenue
Authority
36 31.3
The Tanzania
Communications and
Regulatory Authority
49 42.6
The African Centre For
Cyber Laws and Cyber
Crimes Prevention
17 14.8
The Tanzania Financial
Institutions Forums
13 11.3
Total 115 100.0
Source: (Field Data, 2019).
The findings in Table 4.13 indicate that 36, which is equivalent to 31.3percentand of
the respondents identified the Tanzania Revenue Authority, and 42.6percent of the
respondents cited the Tanzania Communications and Regulatory Authority as the
institutions which work with the Police Force in managing cybercrime. Furthermore,
17or 88.7percent of the respondents Identified the African Center for Cyber Laws and
Cyber Prevention Bureau as institutions collaborating with the Police Force.
Further 13, is equivalent to 11.3percent of the respondents cited the Tanzania financial
institutions forums as institutions collaborating with the Police Force. The findings
imply that the Tanzania Police Force networks with other institutions in the efforts of
managing cybercrimes, though the networks are not regulated at all. It is more of a
courtesy process and this is why the networks have-not been effective in managing
cybercrimes in Tanzania.
The respondents were further asked on the extent to which the Police personnel are
aware of the dynamics of cybercrimes in Tanzania. The findings are presented in Table
4.15:-
Table 4. 14: Extent to which the Police Force is aware of the Dynamics of
Cybercrimes
Frequency Percent
Valid
Low Extent (15%) 27 23.5
Moderate Extent
25%) 60 52.2
Big Extent (35%) 12 10.4
Great Extent
(45%) 8 7.0
Greater Extent
(Above 55%) 8 7.0
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.14 indicate that 27 or 23.5percent of the respondents were of
the view that the networking has been effective to a low extent. Sixty, 60 or 52.2 percent
of the respondents were of the view that the networking is effective to a moderate
extent, and 12 or 10.4percent of the of the view that the networking is effective.
Further, 8, which is equivalent to 7percent of the respondents said that the networking
is effective only to great extent.
Only 8 out of the 115 respondents or 8 percent said that the networking has been
effective only to a greater extent .The findings imply that even though the respondents
had varying views on the extent to which the networking has been being used, the
majority were of the view that networking has been effective to a moderate extent. This
shows that the networking has not been effective suggesting that the Police Force has
not benefited much from the networking.
Accordingly, the respondents were asked on the ways within which the level of
awareness can be improved. The findings are presented in Table 4.15:-
Table 4. 15: Level of awareness
Frequency Percent
Valid
Through Cyber Training
Sessions 41 35.7
Through Creating Platforms for
Engaging Stakeholders 45 39.1
Use and Integration of Advanced
Technologies in Cyber
Management Process
16 13.9
Capacity Building through
Workshops on cybercrimes with
other National Institutions
13 11.3
Total 115 100.0
Source: (Field Data, 2019)
The findings indicate that 41 out of the 115 respondents, which is equivalent to
35.7percentcited the use of cyber training sessions, and 45 or 39percent of the
respondents were of the view that creation of platforms for engaging would improve
levels of awareness on cybercrime.
Furthermore, 16 or 13.9percent of the respondents were of the view that using an
integration of advanced technologies in the cyber management process, and 13, which
is equivalent to 11.3percent of the respondents were of the view that capacity-building
workshops on would improve awareness.
The findings imply that the level of awareness on the dynamics of among the police
personnel is still low, and this can be improved through training, seminars and engaging
stakeholders from the most affected institutions and the use of advanced technologies
in examining and analyzing cybercrime devices for effective output would improve
awareness.
4.5 Participation of the Tanzania Police force in Policy processes on Managing
Cybercrimes in Tanzania
In determining this objective, the respondents were asked as to whether the Tanzania
Police Force participates in the policy process for managing cybercrimes. The findings
are presented in Table 4.16:-
Table 4. 16: Participation of the Tanzania Police Force in Policy Forums
Frequency Percent
Valid
Yes 65 56.5
No 37 32.2
I dont Know 13 11.3
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.16 indicate that 65, which equivalent to 56.5 percent of the
respondents agreed that the Tanzania police participate in the policy forums, while 37
or 2.2percent of the respondents disagreed, and 13 or 1.3percent of the respondents
were uncertain about the engagement of the Tanzania Police Force in the Policy
processes.
The findings imply that the respondents had varying views on the participation of the
Tanzania Police Force in the policy processes in the management of cybercrimes and
this depends on the level of awareness on the dynamics of cybercrimes. However,
majority agreed that the police participate in the policy forums for management of
cybercrimes.
The respondents were asked to identify the policy forums within which the Tanzania
Police Force participates in the management of cybercrimes. The findings are in Table
2.17
Table 4. 17: Policy forums in which the Police Participates
Frequency Percent
Valid
The Tanzania E-Government
Performance Reviews 70 60.9
The African Centre for
Cyber Law and Cyber Crime
Prevention
16 13.9
The National Internet
Governance Forums 13 11.3
Budget Formulation Process
within the Ministry of
Internal affairs
16 13.9
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 2.17 indicate that 70 or 60.9percent of the respondents cited the
Tanzania e-government performance reviews 16 or 13.9percent of the respondents
were of the view that the participation was through the African Centre for cyber law
and cybercrime prevention. About 13, which is equivalent to 11.3percent of the
respondents identified the national internet governance forums, and 16 or 13.9percent
of the respondents mentioned the budget formulation within the ministry of internal
affairs as the Policy Forums which the Tanzanian Police Force participates in managing
Cybercrime.
The findings imply that the Tanzania Police Force participates in the policy forums
within which its personnel are exposed to policy issues, which may affect and create
awareness on how to manage cybercrimes through a policy process.
4.6 Limitations being faced by the Tanzania Police Force in Managing
Cybercrimes in the country
In the study objective, the respondents were requested to identify the challenges
Tanzania Police Force faced in the management of cybercrimes. The findings are
shown in Table 4.18:-
Table 4. 18: Challenges being faced in managing cybercrimes
Frequency Percent
Valid
Weak Institutions alongside
the Police to Manage
Cybercrimes in Tanzania
16 13.9
Weak Policies and Laws 18 15.7
Absence of Advanced
Hardware to Manage Cyber
Data
19 16.5
Lack of Commitment on part f
the Government to deal with
cybercrimes
19 16.5
Politicization of the Cyber
Management Process 15 13.0
Lack of Requisite and
qualified Personnel to deal
with cybercrimes
10 8.7
Little Budget allocations 8 7.0
Lack of Control on Use of the
Internet ( Growing Internet
Dynamics)
10 8.7
Total 115 100.0
Source: (Field Data, 2019)
The findings in Table 4.18 indicate that 16, which is equivalent to 13.9percent of the
the existence of weak institutions alongside the police in managing cybercrimes. About
18or 15.7percent of the respondents cited the existence of weak policies and laws, and
19 or 16.5percent of the respondents said that the absence of advanced hardware to
manage were the challenge in managing cybercrime.
Furthermore, 19, which is equivalent to 16.5percent of the respondents cited lack of
commitment on the part of the government to deal with cybercrimes, and 15 or
13percent of the respondents were of the view that the politicization of the cyber
management process was a challenge. Furthermore, 10, which is equivalent to
8.7percent of the respondents, cited lack of requisite and qualified personnel to deal
with cybercrimes, 8 or7percent of the respondents cited constraints on budget
allocations, and 10, which is equivalent to 8.7percent of the respondents, cited lack of
control on the use of the internet as challenges facing the Police Force in managing
The findings imply that that even though the police force has tried to participate
effectively in the management of as the institution still challenges and this sthe efforts
of the Tanzania police of the cybercrimes in Tanzania.
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATION
5.1 Introduction
This chapter has four sections. Secretion one summarizes the study by referring to the
specific objectives, research questions and the findings of the study. The second section
concludes the study also by referring to the research objectives and the research
questions. And the third section presents the recommendations and the last section
presents the suggestions made for further studies.
5.2 Summary of study findings
The study examined four research questions and these included determining the
Managerial mechanisms, which were used by the Police force in the Management of
Cybercrimes; and he Level of awareness among the Police Personnel on the
Management of Cybercrimes. Others include participation of the Tanzania Police Force
in Policy Forums for Managing Cybercrimes, and the challenges Tanzania Police Force
face in Managing Cybercrimes in Tanzania.
On part of the mechanisms the study has revealed that, the engagement of stakeholders
in the management of cybercrimes, investigation of cybercrimes scenes, the use and
implementation of cybercrimes Act, 2015, the execution and carrying out cybercrimes
Analysis (Use of forensic approaches), and the collection of evidence and involvement
of the National prosecution office were part of the mechanisms. Others include,
participation in Court proceedings (Cybercrimes cases), the use of internal cybercrimes
performance reviews and budget allocation for cybercrimes management are all used
by the police force in managing cybercrimes in Tanzania.
In respect of the level of awareness on the dynamics of cybercrimes, the study has
revealed that the level of awareness has not effective and the level is at a low and this
suggests that the police personnel ought to be exposed to more and recent dynamics of
cybercrimes.
Accordingly, on part of the participation of the Tanzania Police Force in the policy
processes, the study has revealed that, the Tanzania Police Force participates in a few
policy process on the management of cybercrimes and these include the Tanzania e-
government performance reviews the African Centre for cyber law and cyber-crime
prevention, the national internet governance forums and the budget formulation within
the ministry of Home Affairs are all used as policy forums to facilitate its efforts of
managing cybercrimes in Tanzania.
While this being the case, the initiatives by the Tanzania Police Force to manage
cybercrimes is still faced with challenges. The study has revealed that, the existence of
weak institutions alongside the police to manage cybercrimes, weak policies and laws,
absence of advanced hardware to manage cybercrimes, and lack of commitment on part
of the government to deal with cybercrimes are among the challenges.
The study has also revealed that politicization of the cyber management process, lack
of requisite and qualified personnel to deal with cybercrimes little budget allocations,
affect the efforts of the Tanzania Police Force to effectively manage cybercrimes in
Tanzania.
5.3 Conclusion
Cybercrimes in the recent developed world is one of the widely experienced challenges
in the digital century and governments and its departments have been devising means
of controlling it as well as managing it so that it does not affects their economies.
In Tanzania, there has been the growth in the use of the internet and this has facilitated
the rise in commission of cybercrimes including fraud, hacking, and access to
confidential data and this s response and action on how to manage such crimes.
The Tanzania Police as one of the public entities entrusted with the mandate of
managing cybercrimes. the force has devised means both at the managerial level and
this involves setting an independent department of cybercrime which facilities the
management of the cybercrimes, participation on the policy forums and networking
with other institutions such as the banks and telecomm companies which have been
affected by the cyber cries.
Accordingly, the managerial mechanism that the Police force uses are not adequately
backed by any formal policy and this waters down the efforts and initiatives that the
Tanzania Police force can or may use in improving the managerial structures within
which the plight of cyber crimes can be well managed in Tanzania while there is still a
big gap of cooperation between the Tanzania police force and the financial institutions
which seemingly are the most affected by the cyber crimes.
The level of awareness in terms of the skills and knowledge on part of the Tanzania
Police Force is still very low and this raises a bigger possibility, that the dynamic cyber
crimes and those which are sophisticated may not necessarily be either identified at
their first instance, neither investigates, effectively prosecuted and strategically
managed and this is a training gap which ought to be addressed.
On part of the participation of the Tanzania police force in the cyber crimes policy
processes and policy forums, it has been evident that, Tanzania has not set out such
policy forums within which the cyber crimes stakeholders can propose the requisite
policy actions towards managing cyber crimes by the Tanzania police force alongside
the actions and efforts of the stakeholders and this requires identifying and setting up
policy forums where the even the media, the banking and financial sector, the civil
society and the academia can assist the Tanzania police force in devising strong
managerial mechanisms in addressing and managing cyber crimes in Tanzania.
However, the plight of the police force to effectively manage cybercrimes in Tanzania
remains inefficient and this is attributed to lack of funds to invest in the fight and
management of cybercrimes, lack of adequate skills and lack, little level of awareness
on part of the police force on the dynamics of cybercrimes and lack of government
commitment to manage cybercrimes.
However, if the latter can be addressed through training and allocation of more funds
as well as integration of advanced technology in the police cybercrimes departments,
efficiency in the management of cybercrimes by the Tanzania Police Force can be
sustained.
5.4 Recommendation
The growth in the use of the internet hassled to an increase in cybercrimes while there
are no strong mechanisms to manage cybercrimes in Tanzania by the police force and
on the basis of the findings, the following recommendation can raise on the efficiency
of the Tanzania police in sustaining efficiency in the management of cybercrimes in
Tanzania:-
Policy:-The government through the efforts being undertaken by the Tanzania police
force, a policy on the management of cybercrimes be formulated and this is to create a
platform of awareness on the dynamics of cybercrimes and thus make a strategic
supplement to the cyber Act, of 2015.
The policy on cyber crimes has to be comprehensive and the inclusion aspect has to be
considered. It will the guideline on how not only the Tanzania Police force should
manage cyber crimes but on how the stakeholders can engage the Tanzania Police
force on issues of cyber crimes Management in society. Once the policy is formulated,
review and evaluation on what the Tanzania Police force has been doing will be
effectively conducted in relation to the policy.
Training: -In order that the Tanzania Police Force sustains its efforts to effectively
manage cybercrimes in Tanzania, its personnel ought to be trained in the field of
cybercrimes prevention and management and this should be supplemented with
requisite trainings in information and Communications technologies.
I acknowledge that in one of the interviews with one of the cyber experts interviewed
from the Tanzania Police cyber crimes department, he revealed that, they the Tanzania
Police force has no qualified and well trained personnel in the field of cyber crimes,
form stages like examination of electrical devices used in the commission of cyber
crimes requires expertise but also cyber cries are dynamic as they change day to day,
thus this requires investing in human resources which will support the overall strategy
of the Tanzania Police Force to effectively manage cyber crimes in Tanzania.
Budget allocation:-One of the challenges being faced by the Tanzania Police Force is
a low margin for budget that is invested in the fight to end, prevent, or manage
cybercrimes in Tanzania and little is invested by the government. In order that
efficiency and effectiveness are sustained, more funds ought to be invested in managing
cybercrimes in Tanzania.
While conducting the study, it was revealed from within the Tanzania Police force that,
the cyber crimes budget is too low to facilitate the management of cyber crimes in
Tanzania and upon enquiry on the equipments used in carrying out investigations, the
cyber crimes unit of the Tanzania Police has only one device to examine mobile phones
which have been used in the commission of cyber crimes and thus, if the crime happens
up country, it has to be sent to Dar es Salaam police headquarters for examination and
even low facilitations are provided or even not at cyber crimes scenes and hence
limiting on the effectiveness of the Tanzania police force to manage cyber crimes as a
result of inadequate budget.
Establishment of an independent cybercrimes Agency: - One of the outstanding
recommendations towards having effective management of cybercrimes in Tanzania is
to establish an independent body under the auspices of the Tanzania Police Force to
deal with issues of cybercrimes in Tanzania
Integration of Technology: - In order that the Tanzania Police Force maximizes its
efforts to manage cybercrimes, it ought to integrate strategically good and reliable
technology systems in its current cyber management systems and structures.
5.5 Suggestion for further study
Based on the findings, I suggest that a study be conducted on the role of information
technology in the management of cybercrimes in Tanzania with a focus on Public
entities.
REFERENCES
A. J. Mambi. (2010)ICT Law Book: A Source Book for Information & Communication
Technologies andCyber Law. Dar es Salaam: MkukinaNyota Publishers
Ltd, 2010.
Abdallah A., (2012). Legal Challenges Brought by Developments of ICT in Tanzania,
An Assessment of the Growth of Mobile Banking Services” a
paper presented at the Oceanic bay Hotel, Bagamoyo on 11th June
B. Magalla (2013). The New Era of Cyberspace: Their Protection, Prevention and
Detection. Tumaini University Iringa University College
https://www.academia.edu/5287646/the_new_era_of_cyberspace_their_d
etection_prevention_and_detection, 2013 Cybercrimes ACT, (2015)
Tanzania
Clough, J. (2015). Principles of Cybercrimes.
Economic Case No 31 (2019), United Republic of Tanzania
E.H. Dalla, and M. Geeta.,(2013). “Cyber Crime A Threat to Persons, Property,
Government and Societies”. International Journal of Advanced
Research in Computer Science and Software Engineering, Vol.3. No.5,
pp.997-1002, 2013.
E. Kamanda (2013). “Spetrum Times: Cyber Crime at Spectrum Network”. Quarterly
Journal on risk Management, Vol.1. No.1, pp.1-8, November, 2013
F.Tushabe, and V.Baryamureeba (2013) .Cyber Crime in Uganda: Myth or Reality?”.
Proceedings of World Academy of Science, Engineering and Technology,
Vol.8, pp.66-70.
Shinder, L. (2002). Scene of the Cybercrime Computer Forensic Handbook.Singh, Y.,(
2012) “Cyber Laws,’’ 5th Edn, New Delhi: Universal Law Publishing Co.
Pvt. Ltd.,
S.Ghosh, and E. Turrini.,(2011). A Multidisciplinary Analysis.Springer-Verlag Berlin
Heidelberg, 2010.
S. M. Kalunde (2011). The status of Cybercrime in Tanzania : Strasbourg, France.
Technical report.Council of Europe
http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Docum
ents/ReportsPresentations/Octopus2011/Update_session_Tanzania.pdf,
2011.TCRA (2013). Quarterly Telecom Statistics Quarter1.Technical
report. The Tanzania Communications Regulatory Authority (TCRA)
http://www.tcra.go.tz/images/documents/telecommunication/telecomStats
Sept13.pdf.accesesd on the 20th May, 2019
Ubena, J. (2009). “Why Tanzania Needs Electronic Communication Legislation? Law
keeping up with Technology” The Law Reform Journal, Vol. 2, No.1,
2009.
URT (2010). Strategy for Anti-Money Laundering and Combating Terrorist Financing,
July 2010 June 2013.
Viswaanathan, (2012), A., Cyber Law, Indian and International Perspectives, Lexis
Nexis Butterworth Wandwa, Nagpur.
V.Olena (2012). Problem of Cybercrime in Ukraine: Spread of, Specific Nature, and
Methods of Fighting”. Internal Security.Vol.4.No.1, pp.153- 163, 2012.
Williams, M. (2005) ‘Cybercrime’, in J. Mitchel Miller (Ed.) Encyclopedia of
Criminology, London: Rutledge
Yonazi, J., (2012). Cyber Security in Tanzania; Report on from the Cyber-Security
Mini-Conference, Center for ICT Research and Innovations
APPENDICES
Appendix I: (Questionnaire) (SAQ)
Instructions:
The objective of the study is to examine Cybercrimes Management in Tanzania with
the case of the Tanzania Police Force. The answers in this questionnaire should be
kindly written in the space provided.
Kindly answer the questions clearly and honestly and the researcher hereby guarantees
that the information given shall be solely used for the study and it shall be treated with
high confidentiality.
1. Personal Information:
(a) Name of the Respondent: (Optional) _________________________
(b) Place of work: ___________________________________________
(c) Department: _____________________________________________
(d) Position held: ____________________________________________
2. Demographics
(a) Sex:
(i.) Male ( )
(ii.) Female ( )
(b) Age:
(i.) 18—25 ( )
(ii.) 25---30 ( )
(iii.) 30---35 ( )
(iv.) 35 and above ( )
3. Level of Education
(a) Primary School ( )
(b) Secondary school ( )
(c) Tertiary education ( )
(d) Higher education ( )
4. (Objective One) managerial mechanisms used by the Police force in the
Management of Cybercrimes in Tanzania
a) In your Opinion, is the Police force involved in the management of Cybercrimes
in Tanzania?
Yes ( )
No ( )
b) Are there any forums within the Police force that are mandated to investigate and
manage Cybercrimes
Yes ( )
No ( )
c) Kindly mention the Forums used by the Police force in Managing Cybercrimes in
Tanzania
____________________________________________________________________
____________________________________________________________________
_________________________________________
d) To what extent are these forums effective?
25% ( )
35 ( )
45 ( )
55% ( )
Above 65% ( )
e) What are the prime causes of cybercrimes
____________________________________________________________________
____________________________________________________________________
_________________________________________
f) Do you think , the Prevalence is a result of the following:-
Lack of adequate Policy ( )
Poor management styles by the Police Force ( )
Lack of adequate Personnel to manage Cybercrimes ( )
Organized Network for Cyber Criminals ( )
Weakness in the Laws ( )
Reliance on Confidential Information ( )
g) How Does the Tanzania Police Force Manage Cybercrime Data
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
________________________________
h) Does the Police force involve stakeholders in Managing Cybercrimes
NO ( )
Yes ( )
i) Kindly state the ways through which the Police force involves stakeholders in
managing cybercrimes in Tanzania
____________________________________________________________________
____________________________________________________________________
_________________________________________
j) Kindly identify the Common cybercrimes experienced in Tanzania
____________________________________________________________________
____________________________________________________________________
_________________________________________
k) Kinky mention the most commonly used cyber instrument to commit cybercrimes
in Tanzania
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
________________________________
In your Opinion, to what extent does confidential information affect the management
of Cybercrimes in Tanzania
Low extent ( )
Big Extent ( )
Great Extent ( )
5. (Objective Two) Level of awareness among the Police Personnel on the
Management of Cybercrimes in Tanzania
a) In your Opinion, is the Police Personnel aware of the dynamics of Cybercrimes?
Yes ( )
No ( )
b) In your opinion, to what extent is the Police Personnel aware on the dynamics of
the Cybercrimes:
20% ( )
30% ( )
40% ( )
50% ( )
Above 55% ( )
c) To what extent are these Mechanisms effective?
Low Extent ( )
Moderate Extent ( )
Big Extent ( )
Great extent ( )
Greater Extent ( )
d) Please, identify any way(s) for improving the Level of awareness on the
management and laws on Cybercrimes within the Police Force
____________________________________________________________________
____________________________________________________________________
__________________________________________________
e) Kindly identify the guiding policies, laws and Regulations on Cybercrimes in
Tanzania
____________________________________________________________________
____________________________________________________________________
__________________________________________________
6. (Objective Three)Participation of the Tanzania Police Force in Policy Forums for
Managing Cybercrimes in Tanzania
a) Does the Tanzania Police Force Participate in Policy forums for Managing
Cybercrimes in Tanzania
Yes ( )
No ( )
b) To what extent does the participation of the Police Force in Cybercrimes Policy
Forums facility effective Management of Cybercrimes.
Small Extent ( )
Big Extent ( )
Great Extent ( )
a) Kindly mention the Policy forums through which the Tanzania Police Force
participates in the Management of Cybercrimes in Tanzania
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________
b) Kindly mention any networks that the Police force has established the effort to
manage cybercrimes in Tanzania
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________
c) Kindly identify the issues affecting effective Management of Cybercrimes in
Tanzania by the Police force
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________
d) How can the above mentioned issues be addressed
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________
Thank you for sharing your knowledge with me
Appendix II:
Appendix I: (Questionnaire for Financial and Corporate Institutions)
Instructions:
The objective of the study is to examine Cybercrimes Management in Tanzania
with the case of the Tanzania Police Force. The answers in this questionnaire should
be kindly written in the space provided.
Kindly answer the questions clearly and honestly and the researcher hereby guarantees
that the information given shall be solely used for the study and it shall be treated with
high confidentiality.
1. Personal Information:
(a) Name of the Respondent: (Optional) _________________________
(b) Place of work: ___________________________________________
(c) Department: _____________________________________________
(d) Position held: ____________________________________________
2. Demographics
(a) Sex:
(i.) Male ( )
(ii.) Female ( )
(b) Age:
(i.) 18—25 ( )
(ii.) 25---30 ( )
(iii.) 30---35 ( )
(iv.) 35 and above ( )
3. Level of Education
(a) Primary School ( )
(b) Secondary school ( )
(c) Tertiary education ( )
(d) Higher education ( )
4. (Objective One) managerial mechanisms used in the Management of Cybercrimes
in Tanzania
a) In your Opinion, is your institution involved in the management of Cybercrimes in
Tanzania?
Yes ( )
No ( )
b) Are there any forums that your institution participates in investigating and
managing Cybercrimes
Yes ( )
No ( )
c) Kindly mention the Forums used e in Managing Cybercrimes in Tanzania and
specifically in your Company
____________________________________________________________________
____________________________________________________________________
_________________________________________
d) To what extent are these forums effective?
25% ( )
35 ( )
45 ( )
55% ( )
Above 65% ( )
e) What are the prime causes of cybercrimes in your Institution
____________________________________________________________________
____________________________________________________________________
_________________________________________
f) Do you think , the Prevalence of Cybercrimes in your Institution is a result of the
following:-
Lack of adequate Policy ( )
Poor management techniques in your Institution ( )
Lack of adequate Personnel to manage Cybercrimes ( )
Organized Network for Cyber Criminals ( )
Weakness in the Laws ( )
Reliance on Confidential Information ( )
g) Does your Institution participates in Managing Cybercrimes Data
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
________________________________
h) Do you involve stakeholders in Managing Cybercrimes
NO ( )
Yes ( )
i) Kindly state the ways through which you involve stakeholders in managing
cybercrimes in Tanzania
____________________________________________________________________
____________________________________________________________________
_________________________________________
j) Kindly identify the Common cybercrimes experienced in your Organization
____________________________________________________________________
____________________________________________________________________
_________________________________________
k) Kinky mention the most commonly used cyber instruments to commit
cybercrimes in your Organization
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
________________________________
In your Opinion, to what extent does confidential information affect the management
of Cybercrimes in your Institution
Low extent ( )
Big Extent ( )
Great Extent ( )
l) How do you manage cybercrimes data in your Company
____________________________________________________________________
____________________________________________________________________
_________________________________________
j) How does your Cyber or forensic department investigate internally on cybercrimes
in your Company?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
________________________________
5. (Objective Two) Level of awareness the Management of Cybercrimes in
Tanzania
a) In your Opinion, is your Cybercrimes Unit aware of the dynamics of
Cybercrimes?
Yes ( )
No ( )
b) In your opinion, to what extent is the Personnel aware on the dynamics of the
Cybercrimes in your institution
20% ( )
30% ( )
40% ( )
50% ( )
Above 55% ( )
c) To what extent are these Mechanisms effective?
Low Extent ( )
Moderate Extent ( )
Big Extent ( )
Great extent ( )
Greater Extent ( )
d) Please, identify any way(s) for improving the Level of awareness on the
management Cybercrimes within your institution
____________________________________________________________________
____________________________________________________________________
__________________________________________________
e) Kindly identify the guiding policies and Regulations on Cybercrimes in your
Institution
____________________________________________________________________
____________________________________________________________________
__________________________________________________
f) To what extent has cybercrimes affected the Performance of Your Company
____________________________________________________________________
____________________________________________________________________
__________________________________________________
6. (Objective Three) Participation of your Institution in Policy Forums for
Managing Cybercrimes in Tanzania
a) Does your institution Participate in Policy forums for Managing Cybercrimes in
Tanzania
Yes ( )
No ( )
b) To what extent does the participation of your institution in Cybercrimes Policy
Forums facility effective Management of Cybercrimes in your Company.
Small Extent ( )
Big Extent ( )
Great Extent ( )
a) Kindly mention the Policy forums through which your Company has ever
participated the Management of Cybercrimes in Tanzania
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________
b) Kindly mention any networks that your Company has established in the effort to
manage cybercrimes
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________
c) Kindly identify the issues affecting effective Management of Cybercrimes in your
Company
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________
d) How can the above mentioned issues be addressed
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________
Thank you for sharing your knowledge with me
Dodoso:
Utangulizi:
Madhumuniyadodosohilinikukusanyataarifajuuyautafitiunaohusuusimamiziwamasual
ayamakosayamtandaonaJeshi la polisi –Tanzania. Hivyo basi, unaombwa kujaza
sehemuzilizokuwawazikatikadodosohili. Aidha,
mtafitiatahakikishakuwataarsifazasirizinatunzwavyemananikwaajiliyautafitihuunasivi
nginevyo.
1.TaarifaBinafsi:
(e) Jina la Mshiriki: _________________________
(f) Mahali pa Kazi: ___________________________________________
(g) Idara: _____________________________________________
(h) Nafasi ya Kazi: ____________________________________________
2.Taarifa za Washiriki
(c) Jinsia
(iii.) Male ( )
(iv.) Female ( )
(d) Umri :
(v.) 18—25 ( )
(vi.) 25---30 ( )
(vii.) 30---35 ( )
(viii.) 35 and above ( )
3.Kiwango cha Elimu
(e) Elimu ya Msingi ( )
(f) Elimu ya Secondari ( )
(g) Elimu ya Vitendo ( )
(h) Elimu ya Juu ( )
4.(Dhumini la Kwanza) managerial mechanisms used by the Police force in the
Management of Cyber Crimes in Tanzania
m) UnadhaniJeshi la Polisi linashiriki katika kusimamia masuala yanayohusu
makosa ya Mtandao?
Ndio ( )
Hapana ( )
n) Je kuna mifumo yeyote ambayo inatumika kwa ajili ya ushirikiano juu ya
managimenti ya makosa ya Mtandao kwa upande wa jeshi la polisi
Ndio ( )
Hapana ( )
o) Tafadhali taja hiyo mifumo inayotumika na Jeshi la polisi katika kusimamia
makosa ya mtandao Tanzania.
____________________________________________________________________
____________________________________________________________________
___________________________________________________________
p) Kwa kiwango gani Mifumo hiyo ikoimara?
Asilimia 25% ( )
Asilimia 35 ( )
Asilimia 45 ( )
Asilimia 55% ( )
Zaidi yaasilimia 65% ( )
q) Kwa uwelewawako, zipisababuzakuwepokwaMakosayaMtandao?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________
r) Je, unadhanikuwepokwamakosahayokunatokananaSababuzilizotajwahapachini?
Kutokuwepokwa Sera Madhubuti ( )
MifumodhaifuinayotumikanaJaeshi la Polisi ( )
Kukosekanakwawataalamukatikamakosaya Mtandao ( )
UshirikianowaWanaotendamakosahayo
SheriaDhaifu ( )
Kuwepo kwa taarifazasiri ( )
s) Jeshi la PolisilinatunzajenakusimamiataarifazasirizinazohusumakosayaMtandao
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
__________________________________________________________
t) Kwa namna gani Jeshi la Polisi linawashirikisha wadau au Waathirika wa Makosa
ya Mtandao
____________________________________________________________________
____________________________________________________________________
_____________________________________________________________
Taja njia ambazo zinatumikana Jeshi la Polisi kuwashirikisha wadau au Waathirika wa
Makosa ya Mtandao
____________________________________________________________________
____________________________________________________________________
_____________________________________________________________
u) Taja Makosa ambayo yanatendeka mara kwa mara katika mifumo ya Mtandao
____________________________________________________________________
____________________________________________________________________
_____________________________________________________________
5.(Dhumuni la Pili) Kiwango cha Uwelewa juu ya Makosa ya Mtandao katika Jeshi la
Polisi- Tanzania.
g) Je, unadhani Jeshi la Polisi linauwelewa juu ya Makosa ya Mtandao?
Ndio ( )
Hapana ( )
h) Kwa kiwango gani wataalamu katika Jeshi la Polisi wana Uwelewa juu ya Makosa
ya Mtandao?
Asilimia 20% ( )
Asilimia 30% ( )
Asilimia 40% ( )
Asilimia 50% ( )
Zaidi ya Asilimia 55% ( )
i) Taja njia ambazo zinaweza kutumika ilikuongeza ujuzi ndani ya Jeshi la polisi juu
ya Uwelewa wa Makosa ya Mtandao
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
j) Taja sheria au kanuni zinazotumika katika kusimamia makosa ya mtandao ndani
ya Jeshi la polisi
____________________________________________________________________
____________________________________________________________________
__________________________________________________________________
6.(Dhumuni la tatu)Ushiriki wa Jeshi la Polisi katika mifumo ya Usimamizi wa
Makosa ya Mtandao
a) Je, Jeshi la polisi linashiriki katika mifumo ya Usimamizi wa Makosa ya Mtandao
Ndio ( )
Hapana ( )
c) Kama ndio, Kwa kiwango Jeshi la polisi linashiriki katika mifumo ya Usimamizi
wa Makosa ya Mtandao
Kiwango kidogo ( )
Kiwango kikubwa ( )
Kiwango kikubwa zaidi ( )
d) Taja mifumo ambayo Jeshi la polisi linashiriki katika masuala ya Usimamizi wa
Makosa ya Mtandao
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
e) Taja mifumo ya ushirikishwaji inayotumiwa na Jeshi la polisi kushiriki katika
masuala ya Usimamizi wa Makosa ya Mtandao
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
f) Tajachangamoto zinazokabili jeshi la polisi katika masuala ya Usimamizi wa
Makosa ya Mtandao
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
e) Kwa namna gani changamoto hizo zinaweza kutatuliwa
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
Asante kwa Ushirikiano