Aaron Joseph MIS Assignment
Aaron Joseph MIS Assignment
Aaron Joseph MIS Assignment
MIS ASSIGNMENT
BY – AARON V JOSEPH
210903002, BCom Hons (A) ,VI SEM
1. INTRODUCTION
Internet and Network Use: This describes how much a company relies
on the Internet and networks to run its operations. The need for an
Internet connection in the current business climate is essential to being
competitive . The usage of the Internet becomes a risk to the security
of information systems if the organisation uses it to support its
operations without properly weighing the security concerns [53].
Findings show that respondents are unaware of any restrictions
regarding the use of internet and network facilities at IAA (Item 3.4).
This can result in the inappropriate use of such services, which leads
to information system security risks and vulnerabilities.
Internet User Age: These study findings show that the internet use
habits of young people have more information system security
incidents compared to senior employees . According to the researcher
in reference, younger individuals are more likely than older people to
be aware of information system security threats and vulnerabilities.
They are similarly irresponsible with their security knowledge .
Additionally, when undergoing new changes, youthful people are
simple to teach, which is important when the firm changes its security
procedures [60]. Based on these results, more work needs to be done
to deal with how careless young people are and to teach adults more
about security vulnerabilities and threats at IAA.
Level of Education: The results of this study show that the people who
took part in it think that a level of education in the internet, cyber
security, and information system security can protect the institute from
vulnerabilities and threats to information system security . According
to research in reference , businesses face a variety of information
security risks as a result of the information being shared via the
Internet. These difficulties with maintaining information integrity and
confidentiality depend on the understanding, education, and conduct
of the end user. A trained cyber-literate workforce and an education
system that can create such a workforce are necessary for successfully
defending the organisation’s vital infrastructure against cyberattacks.
2) Given that women are disproportionately affected, the institutes should make
a concerted effort to increase their awareness.
3) The institute should create up-to-date policies that fully handle the issues
with contemporary information system security and update in a minimum of
every four (4) years.
References
[1] Kundy, E.D. and Lyimo, B.J. (2019) Cyber Security Threats in Higher
Learning Institutions in Tanzania A Case Study of University of Arusha
and Tumaini University Makumira. Olva Academy—School of
Researchers, 2, 1-37.
[2] Semlambo, A., Almasi, K. and Liechuka, Y. (2022) Perceived Usefulness
and Ease of Use of Online Examination System: A Case of Institute of
Accountancy Arusha. International Journal of Scientific Research and
Management (IJSRM), 10, 851-861.
https://doi.org/10.18535/ijsrm/v10i4.ec08
[3] Semlambo, A., Almasi, K. and Liechuka, Y. (2022) Facilitators’
Perceptions on Online Assessment in Public Higher Learning Institutions
in Tanzania: A Case Study of the Institute of Accountancy Arusha (IAA).
International Journal of Scientific Research and Management (IJSRM),
10, 34-42.
https://doi.org/10.18535/ijsrm/v10i6.lis02
[4] Lubua, E.W., Semlambo, A. and Pretorius, P.D. (2017) Factors Affecting
The Use of Social Media in the Learning Process. South African Journal
of Information Management, 19, a764.
https://doi.org/10.4102/sajim.v19i1.764
[5] Nfuka, E.N., Sanga, C. and Mshangi, M. (2015) The Rapid Growth of
Cybercrimes Affecting Information Systems in the Global: Is this a Myth
or Reality in Tanzania? International Journal of Information Security
Science, 3, 182-199.
[6] Tanzania Communication Regulatory Authority. (2022) 2022 Quarterly
Statistics Reports. Tanzania Communication Regulatory Authority, Dar es
Salaam.
[7] Saunders, J. (2017) Tackling Cybercrime—The UK Response. Journal of
Cyber Policy, 2, 4-15.
https://doi.org/10.1080/23738871.2017.1293117
[8] Lewis, J. (2018) Economic Impact of Cybercrimes-No Slowing Down.
McAfee, Santa Clara.
https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-
economic-impact-cybercrime.pdf
[9] Kaspersky (2021) Top Ransomware Attacks of 2020. Kaspersky,
Moscow.
[10] International Telecommunication Union (2021) Cyber Security in
Tanzania: Country Report. International Telecommunication Union,
Geneva.
[11] International Business Machine Cooperation (IBM) (2021) Cost of Data
Breach Report. International Business Machine Cooperation, Armonk.
[12] Gordon, L.A., Loeb, M.P. and Zhou, L. (2011) The Impact of Information
Security Breaches: Has There Been a Downward Shift in Costs? Journal
of Computer Security, 19, 33-56.
https://doi.org/10.3233/JCS-2009-0398
[13] Lubua, E.W. and Pretorius, P.D. (2019) Ranking Cybercrimes Based on
Their Impact on Organisations’ Welfare. 2019 THREAT Conference
Proceedings, Johannesburg, 26-27 June 2019, 1-11.
[14] Al-Omari, A., El-Gayar, O. and Deokar, A. (2012) Security Policy
Compliance: User Acceptance Perspective. 2012 45th Hawaii
International Conference on System Sciences, Maui, 4-7 January 2012, 1-
10.
https://doi.org/10.1109/HICSS.2012.516