Security Incidents Management in Tanzania Context

The home security system quotes experience various security incidents across the globe. An incident reporting, responding and handling is a cornerstone in managing security incidents by minimizing loss and impact through mitigating or reducing risks to an acceptable level, and quick recovery of IS from disruptive events. It is an increasingly problematic situation; researchers are trying to address. Thus, ensuring the security of IS in cyberspace is debatable due to the rapid growth of security incidents affecting IS. The study employs innovative human sensor web Crowd sourcing security incidents approach to improve the security of IS [1] . Human sensor web (HSW) Crowd sourcing security incidents management is an innovative approach for addressing security incidents using collaborative initiatives efforts outside the boundaries of the given organization, sector or country in solving a problematic situation such as how to improve the security of IS [2] . This involves making a public call to the community crowd by inviting people with diverse skills, experiences to respond to the public call to find out the solution to the problem.

The HSW Crowd sourcing uses the community in solving the problem instead of relying on internal efforts (internal resources). This public call to the community normally is accompanied with a prize to contest. This creates a room for people with diverse skills, knowledge, expertise, and experience to contest in finding the best optimal solution. This can result in getting correct solution, solving the complex problematic situation which could be impossible to solve by only depending on internal efforts (internal resources). HSW Crowd sourcing has been applied in various sectors for addressing various problems. For example, it has been applied in addressing real-world problematic situations such as empowering communities in East Africa in water service provision through information from human sensor webs in Zanzibar [3] ; rabies surveillance system for humans and animals in Kilosa district, Tanzania [4] . This study seeks to extend the application of HSW Crowd sourcing to security incidents management for IS in cyberspace.

HSW Crowd sourcing security incidents management enables interconnected people in the community to act as a sensor for reporting and responding to security incidents over the web or mobile-based platform. The function of responding to security incidents such as cybercrimes attacks in cyberspace is outsourced to people in the cyberspace [5] [6] . HSW enables people to interact with their devices [1] [3] to forward and respond to security incidents stimuli designated to receiving server [7] . The problem of security incidents can be observed and reported by human sensors in real-time basis [8] .

Many uncertainties still exist on reporting, responding and handling of security incidents affecting IS in cyberspace. This has been a long-standing problematic situation which researchers have been trying to address in order to come out with a solution. The approach of Crowd sourcing has been applied in different sectors to address the given problems, but its application to address security concerns such as security incidents managements in real time has been lagging behind. Practical techniques for implementation of HSW for Crowd sourcing platform in knowledge base management learning have not been undertaken into account [7] [9] [10] [11] in information systems security. HSW Crowd sourcing platform in knowledge base management learning for security incidents management integration is lacking or ineffectively implemented in solving real-world problematic situation such as how to improve the security of IS.

The main objective of this research was to develop human sensor web Crowd sourcing security incidents management platform for addressing the problematic situation on how to improve the security of information in IS (during capturing, processing, storage, and transmission), a case study of the education sector in Tanzania.

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *