Difficulties in learning the data structures course: Literature review

AB Mtaho, LJ Mselle - The Journal of Informatics, 2024 - ajol.info
Data structures is a highly demanding course for computer science students, often
associated with high cognitive load and consequently, high failure and dropout rates. This …

[PDF][PDF] Strengthening Tanzania's Digital Infrastructure: Assessing Cyber Threats to the Government e-Payment Gateway for National Security

NS Shalua, AA Semlambo - Educational Research (IJMCER), 2024 - ijmcer.com
This study investigates the cybersecurity landscape in Tanzania through a descriptive
research design, focusing on the threats and vulnerabilities within government and financial …

Assessing Cybersecurity Threats To Tanzania's Government E-Payment Systems And Their Impact On National Security

A Semlambo, NS Shalua - The Journal of Informatics, 2024 - journals.iaa.ac.tz
This research delves into the cybersecurity ecosystem of Tanzania, concentrating on the
threats and vulnerabilities inherent in the government's electronic payment gateway and …

[PDF][PDF] Explore the intersection of Self-Determination Theory and cybersecurity education-A literature review

I Feraru, L Bacali - International Journal of Advanced Statistics and …, 2024 - sciendo.com
This paper explores how organizations can create a sustainable, security-first culture in an
increasingly complex environment where organizational and national cultures are strong …

Information Security Awareness in Sub-Saharan African Schools: The Role of Educational Leadership in Turbulent Times

M Kabanda - … , MN (2024). Information Security Awareness in Sub …, 2024 - papers.ssrn.com
The COVID-19 pandemic has influenced the increased adoption of digital tools in
educational institutions across sub-Saharan Africa. The efficient flow of information within …

[HTML][HTML] Сравнительный анализ платформ для цифровизации государственных услуг

ВВ Бритвина, АК Агоштинью… - International Journal of …, 2024 - cyberleninka.ru
Приведен сравнительный анализ исполь-зуемых технологий государственных услуг.
По результа-там обзора представлены выводы о применимости данного опыта в …

Determinants that affect information security awareness and behavior: A systematic literature review

A Ali, S Negash - 2023 - digitalcommons.kennesaw.edu
In today's digital age, it is crucial for all organizations to manage their information systems
security. This makes them potentially endangered by actions of employees and users. So …

Comparative analysis of platforms for digitalization of public services

VV Britvina, AС Agostinho, GP Konyukhova - International Journal of Open …, 2024 - injoit.ru
A comparative analysis of the technologies used in public services is presented. Based on
the results of the review, conclusions are presented on the applicability of this experience in …

The Driving Forces for the Involvement of Higher Learning Institution's Students in Cybercrime Acts. A Case of Selected Higher Learning Institutions in Tanzania

FN Ntembo, R Casmir - European Journal of Theoretical and Applied …, 2023 - ejtas.com
This study investigates the extent and driving forces of cybercrime acts among students in
higher learning institutions. The research digs into common cybercrime involvement and …

STRENGTHENING CYBER DEFENSES: HOW LIMITED EXPERTISE IMPACTS TANZANIA'S FIGHT AGAINST DIGITAL THREATS

AL Seruhere, AA Semlambo - The African Conference of Applied …, 2024 - journals.iaa.ac.tz
This article examines the critical impact of limited expertise on the effectiveness of the
Tanzania Police Force (TPF) in combating cybersecurity threats. Employing a mixed …