The growing rate of ICT utilization particularly the Internet and mobile
phones has influenced at an exponential rate online interaction and
communication among the generality of the populace. However, with the
enormity of businesses on the Internet, Tanzania is yet to harness the
opportunities for optimal financial gains. This study is exploratory in
nature as it attempts to unveil the prospects of ecommerce implementation,
participation, motivation and opportunity to the developing countries like
Tanzania where by the domestic market is very big to ensure the growth of
agricultural sector. The paper proposes to investigate the ability of
consumers to purchase online, the available motivation to do so, and the
opportunities for Internet access. We argue the Government and central bank
to encourage innovative new technological developments by pre-regulating
electronic money to familiarize itself with electronic money schemes
generally. Findings revealed that Tanzanians have the ability to participate
in e-commerce, but there is need for improved national image to bring in the
element of trust and discipline within, and before the international
communities. Currently, consumers source for information online but make
purchases the traditional way.
The security breaches of sensitive information have remained difficult to solve due to increased malware programs and unauthorized access to data stored in critical assets. As risk appetite differ from one organization to another, it prompts the threat analysis tools be integrated with organization's information security policy so as to ensure security controls at local settings. However, it has been noted that the current tools for threat assessment processes have not encompassed information security policy for effective security management (i.e. confidentiality, integrity and availability) based on organization's risk appetite and culture. The information security policy serves as a tool to provide guidance on how to manage and secure all business operations including critical assets, infrastructure and people in the organization. This guidance (e.g. usage and controls) facilitates the provisions for threat assessment and compliance based on local context. The lack of effective threat assessment frameworks at local context have promoted the exposure of critical assets such as database servers, mails servers, web servers and user smart-devices at the hand of attackers and thus increase risks and probability to compromise the assets. In this paper we have proposed a conceptual framework for security threat assessment based on organization's information security policy. Furthermore, the study proposed the policy automation canvas for provision of a methodology to alert the security managers what possible threats found in their organizations for quick security mitigation without depending on security expertise.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.