Advertisement

IT Security Readiness in Developing Countries

Tanzania Case Study
  • Respickius Casmir
  • Louise Yngström
Chapter
  • 238 Downloads
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 125)

Abstract

Much as computer and network security is increasingly becoming a global concern for enterprises, government agencies, academia and even for individuals’home use, still there are some people in some parts of the world who are not even informed of the existence of such a problem. Specifically, of these people are in developing countries. Tanzania is a typical example of the countries in which IT security issues have not been addressed adequately. This was revealed during the course and seminars on IT security conducted in Tanzania in the fall of year 2001. In this paper we shall start by describing the background and current situations of IT and connectivity in the country, followed by a summary discussion of evaluations of the course and seminars. Then we shall cite some of the fatal few reported computer security breach incidents in the country. Finally, we shall discuss what is our next step towards an attempt to deal with the problem.

Key words

IT Security Developing Countries Security Education and Training 

References

  1. 1.
    Accenture, Markle Foundation,&United Nations Development Programme (UNDP). Creating a Development Dynamic — Final Report of the Digital Opportunity Initiative: A Global Call to Action, 2001. Also, available at http://www.opt-init.org/framework/pages/contents.html Google Scholar
  2. 2.
    Alec Yasinsac; Information Security Curricula in Computer Science Departments: Theory and Practice, Department of Computer Science Florida State University, Journal of Computer Security, January 2002.Google Scholar
  3. 3.
    Cynthia Irvine, Shiu-Kai Chin, and Deborah Frincke, “Integrating Security into the curriculum”, IEEE Computer, December 98, Vol. 31, Num 12.Google Scholar
  4. 4.
    Daily News Tanzania Newspaper, “lbn/- Stolen through computer fraud, Says PAC”, of Thursday, June 13, 2002. Available athttp://www.dailynews.co.tz/full.asp?ID=1209999PubID=1 Google Scholar
  5. 5.
    KPMG,“East Africa Fraud Survey 2002”.http://www.kpmg.co.ke
  6. 6.
    Lamtrac AB, Survey of the Need for a Vocational Training Programme for ICT Professionals in Tanzania Final Report,January 2001. Also available athttp://www.ethinktanktz.org/esecretariat/DocArchive/Final%20report%201TSurvey_OnlinePDF.pdf
  7. 7.
    Miller Esselaar and Associates; A Country ICT Survey for Tanzania Final Report for Sida, November 2001.Also available athttp://www.sida.se/Sida/articles/94009499/9481/tanrep_OnlinePDF.pdf
  8. 8.
    National ICT Policy of Tanzania (First order draft [v3.2e]), Ministry of Communications and Transport,The United Republic of Tanzania.Also available athttp://www.moct.go.tz/ict/zerothorder_OnlinePDF.pdf/ict/zerothorder_OnlinePDF.pdf
  9. 9.
    NIST Special Publication 800–16: Information Technology Security Training Requirements: A Role-and Performance-Based Model. April 1998.Google Scholar
  10. 10.
    SAT-3/WASC/SAFE Project. Also available athttp://www.safe-sat3.co.za
  11. 11.
    Tanzania Communications Commission (TCC)http://www.tcc.go.tz
  12. 12.
    The Guardian Newspaper,“TANESCO mismanaged, funds misused —Mkapa”,of Tuesday, April 30, 2002. Available athttp://www.ippmedia.com/guardian/2002/04/30/guardian
  13. 13.
    The Tanzania Development Vision 2025: Planning Commission, The United Republic of Tanzania, 1999. At http://www.tanzania.go.tz/vission_2025f.html Google Scholar

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • Respickius Casmir
    • 1
  • Louise Yngström
    • 1
  1. 1.Department of Computer and Systems Science (DSV)Stockholm University/Royal Institute of TechnologyKistaSweden

Personalised recommendations