• English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
  • New user? Click here to register. Have you forgotten your password?
    Communities & Collections
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
  • New user? Click here to register. Have you forgotten your password?
MoF Repository
  1. Home
  2. Browse by Author

Browsing by Author "Sanga, Camilius"

Now showing 1 - 20 of 22
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    A survey on detection of Sinkhole attack in wireless sensor network
    Kibirige, George W.; Sanga, Camilius
  • No Thumbnail Available
    Item
    Designing secure web and mobile-based information system for dissemination of students’ examination results: the suitability of soft design science methodology
    (International Journal of Computing and ICT Research) Mshangi, Maduhu; Nfuka, Edephonce Ngemera; Sanga, Camilius
  • No Thumbnail Available
    Item
    Designing secure web and mobile-based information system for dissemination of students’ examination results: the suitability of soft design science methodology
    (International Journal of Computing and ICT Research, 2016-12) Mshangi, Maduhu; Nfuka, Edephonce Ngemera; Sanga, Camilius
    The trend of organizations offering services through integrated applications using web- and mobile- based information systems has raised security concerns on how to ensure security goals are attained. The foundation of many systems’ security problems is the lack of integrating secure aspects throughout the processes of architecture design of information systems. This problem is contributed by lack of systematic research methodology and standard security guidelines and principles in many organizations dealing with development of systems in Tanzania. In order to address the weakness of previous studies in the research design, this study employed soft design science methodology (integration of Soft Systems Methodology and Design Science Research); this enabled triangulation of research methodology to take place. The security goals for the proposed secure information system design architecture were explored and incorporated in all stages of the design of system architecture. The proposed secure architecture design of information system for dissemination of students’ examinations results can be replicated to schools, colleges or universities in developing countries. The study contributes to body of knowledge by developing secure information systems architecture using a system thinking engineering approach (Soft System Methodology) compounded by Design Science Research principles. The application of the system engineering approach and design principles resulted to a new strategy, secure software development life cycle (secure-SDLC), in solving real world problematic situation and filling the identified research gap in terms of knowledge in the field of information systems’ security research.
  • No Thumbnail Available
    Item
    Exploring electronic waste situation in Africa: a review
    (J. Appl. Sci. Environ. Manage., 2023-12-30) Martin, Respikius; Madaha, Rasel Mpuya; Mwakatoga, Joyce; Babili, Innocent; Kinonde, Suma; Sanga, Camilius
    In recent years African countries are grappling with the increase of electronic waste (e-waste) which poses challenge to environment and human health. However, factors influencing electronic waste situation in Africa have not been explored and thus not well understood. To fill the gap, this paper aims at exploring e-waste situation in Africa and analysing factors influencing the situation. To address the objective, a systematic literature review was adopted. Findings show that the amount of e-waste has been increasing in both developed and developing countries over time. Although there are common factors associated with the increase of e-waste, some factors are unique to Africa. These are: reduced cost of used items, taxi incentives for importation of electronic devices and increased use of ICT devices in various sectors. Furthermore, findings show that developed and developing countries differ in terms of the risks posed by the e-waste and this difference is dependent on how e-waste is managed. Based on the findings, it can be concluded that the situation of e-waste in Africa is somehow different from developed world both in terms of the factors influencing the situation and ways of managing e-waste. In order to deal with e-waste situation, African countries need to improve awareness of their people, establish and capacitate institutions for dealing with e-waste and invest in technologies for managing e-waste.
  • No Thumbnail Available
    Item
    Exploring students’ skills and attitudes on effective use of ICTs: case study of selected Tanzanian public secondary schools
    (Universal Journal of Educational Research, 2015) Barakabitze, Alcardo Alex; Kitindi, Edvin J.; Sanga, Camilius; Kibirige, George; Makwinya, Noel
    This study was conducted purposely following various initiatives and programmes by the Government of Tanzania to incorporate ICT in education since 2007 with the National ICT policy theme “ICT for improved education”. The study provides insights regarding secondary school students’ skills and attitudes in effective use of information and communication technology. The study was a co-relational and cross-sectional survey biased to the quantitative approach involving students, ICT teachers and school administrators. A total of 246 students from six public secondary schools in Tanzania were involved in this study. Primary data were collected using a self-administered questionnaire. Using inferential and descriptive analyzes, results show that, secondary school students do not have enough skills on effective use of information and communication technologies. However, students have basic knowledge in different aspects of ICTs particularly Internet and various hardware and software available in Tanzania. The implications to the approach of teaching and learning of ICT subjects in secondary schools, its evaluation and assessment and future initiatives related to ICT educations and infrastructure development have impacts towards creating a well-connected society. It is therefore recommended that secondary schools should provide enough ICT tools for students’ hands-on experiences. The utmost end result of integrating ICT in secondary education system will eventually be the economic engine of Tanzania by preparing her students for the knowledge based economy
  • No Thumbnail Available
    Item
    Farmers' Access and Use of Mobile Phones for Improving the Coverage of Agricultural Extension Service: A Case of Kilosa District, Tanzania
    (IGI Global) Sanga, Camilius; Mlozi, Prof M R S; Tumbo, Siza; Haug, Ruth
  • No Thumbnail Available
    Item
    Mobile learning bridging the gap in agricultural extension service delivery: Experiences from Sokoine University of Agriculture, Tanzania
    (International Journal of Education and Development using Information and Communication Technology) Sanga, Camilius; Mlozi, Malongo; Haug, Ruth; Tumbo, Siza
  • No Thumbnail Available
    Item
    New technologies for teaching and learning: Challenges for higher learning institutions in developing countries
    (International Journal of Education and Development using Information and Communication Technology (IJEDICT)) Sife, Alfred; Lwoga, Edda Tandi; Sanga, Camilius
  • No Thumbnail Available
    Item
    New technologies for teaching and learning: Challenges for higher learning institutions in developing countries
    (International Journal of Education and Development using Information and Communication Technology (IJEDICT)) Sife, Alfred; Lwoga, Edda Tandi; Sanga, Camilius
  • No Thumbnail Available
    Item
    New technologies for teaching and learning: Challenges for higher learning institutions in developing countries
    (International Journal of Education and Development using Information and Communication Technology (IJEDICT)) Sife, Alfred; Lwoga, Edda Tandi; Sanga, Camilius
  • No Thumbnail Available
    Item
    Open Courseware as a Tool for Teaching and Learning in Africa
    (College of Business Education) Sanga, Camilius; Lwoga, Edda Tandi; Venter, Isabella
  • No Thumbnail Available
    Item
    Open Courseware as a Tool for Teaching and Learning in Africa
    (College of Business Education) Sanga, Camilius; Lwoga, Edda Tandi; Venter, Isabella
  • No Thumbnail Available
    Item
    Perceived benefits of participation in public electronic procurement: a comparative analysis of vendors in Ilala district, Tanzania
    Siwandeti, Meshack; Sanga, Camilius; Panga, Faustine
  • No Thumbnail Available
    Item
    Perceived benefits of participation in public electronic procurement: a comparative analysis of vendors in Ilala district, Tanzania
    (2021) Siwandeti, Meshack; Sanga, Camilius; Panga, Faustine
    Public electronic procurement (PEPS) is an emerging technology in public procurement for efficiency and value assurance. Vendors’ participation has been un-avoidable for true realisation (benefits) of PEPS; however, studies are still inconclusive regarding perceived benefits contributions on participation for participants and non-participants vendors. This study therefore did a comparative analysis on perceived benefits contributions for participants and non-participants vendors’ participation in PEPS. The study adopted across-sectional research design and Ilala District was a study area. Simple random sampling technique was used to select 300 respondents with 73 participants and 227non-participants vendors. A purposive sampling technique used to select three key informants, each one from Public Procurement Regulatory Authority (PPRA), Government Procurement Service Agency (GPSA) and Medical Stores Department (MSD). The structured questionnaire and Key informant Interview guide were used for collecting quantitative and qualitative data respectively. Quantitative data used multiple response analysis and independent samples t-test for analysis while content analysis technique analysed qualitative data. The Findings have revealed a significant difference (p< 0.05) between participants and non-participants on perceived benefits (transparent, paper reduction, cost control and corruption control). The study therefore concludes that, perceived benefits have contribution for vendors’ participation in PEPS. The study recommends to non-participants vendors to consider participating in PEPS in order to gain significant perceived benefits. The study also to PPRA to make sure the PEPS offer the perceived benefits for vendors’ participation. This can be done once the system stakeholders improve impacting benefits knowledge to vendors, hence attracts more vendors to participate in PEPS.
  • No Thumbnail Available
    Item
    Secure web application technologies implementation through hardening security headers using automated threat modelling techniques
    (Scientific Research Publishing Inc., 2022) Mlyatu, Maduhu Mshangi; Sanga, Camilius
    This paper investigates whether security headers are enforced to mitigate cyber- attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, Content-Security-Policy, and Permissions-Policy. The study employed a controlled experiment using a security header analysis tool. The web-based applications (websites) were analyzed to determine whether security headers have been correctly implemented. The experiment was iterated for 100 universities in Africa which are ranked high. The purposive sampling technique was employed to understand the status quo of the security headers implementations. The results revealed that 70% of the web-based applications in Africa have not enforced security headers in web-based applications. The study proposes a secure system architecture design for addressing web-based applications’ misconfiguration and insecure design. It presents security techniques for securing web-based applications through hardening security headers using automated threat modelling techniques. Furthermore, it recommends adopting the security headers in web-based applications using the proposed secure system architecture design.
  • No Thumbnail Available
    Item
    Using Free and Open Source Software for E-Learning System (FOSES) in Tanzania
    (College of Business Education) Lwoga, Edda Tandi; Sanga, Camilius; Kazwala, RR; Mganilwa, ZM
  • No Thumbnail Available
    Item
    Using Free and Open Source Software for E-Learning System (FOSES) in Tanzania
    (College of Business Education) Lwoga, Edda Tandi; Sanga, Camilius; Kazwala, RR; Mganilwa, ZM
  • No Thumbnail Available
    Item
    Using Free and Open Source Software for E-Learning System (FOSES) in Tanzania
    (College of Business Education) Lwoga, Edda Tandi; Sanga, Camilius; Kazwala, RR; Mganilwa, ZM
  • No Thumbnail Available
    Item
    Using soft systems methodology and activity theory to exploit security of web applications against heartbleed vulnerability
    (International Journal of Computing and ICT Research,) Mshangi, Maduhu; Nfuka, Edephonce Ngemera; Sanga, Camilius
  • No Thumbnail Available
    Item
    Vendors’ Willingness Drivers for Participation in Public Electronic Procurement System, Ilala District, Tanzania
    (Springer International Publishing) Siwandeti, Meshack; Sanga, Camilius; Mfanga, Abswaidi; Panga, Faustine
  • «
  • 1 (current)
  • 2
  • »

Commission for Science and Technology | Copyright © 2025

  • Privacy policy
  • End User Agreement
  • Send Feedback