Sunday, July 13, 2014


From the Oral Tradition to the Information Era: The Case of Tanzania
S
AFARI
M
AFU Sokoine University, Tanzania
Internet use is spreading among Tanzanians, as government institutions use it for the dissemination of information, as universities set up projects for distance learning and, as cybercafés become a commonplace in major towns and cities. However, it is necessary to remember that the phenomenon only touches a minority of the community. In a situation where the electricity grid does not cover the whole country, where the service providers are still experiencing difficulties and where there is a large group with no surplus revenue whatsoever, not only unable to afford to purchase the necessary hardware but also without the means to afford the comparatively modest charges of the cybercafé, Internet use will remain a minority and elite activity. This limitation is underscored by the language of the Internet. With few sites in Kiswahili, those Tanzanians who surf the WWW mostly do so in English. The Internet thus is one more domain where English has become the language of the Tanzanian elite. I
n the span of just less than a century and a half, Tanzania has witnessed a rapid transition from oral means of gathering and disseminating information and knowledge to transmission through the printed word to electronic means of information collection, storage and retrieval. This rapid development of means of transmission has also meant a change in the medium of transmission, with both beneficial and detrimental effects for the mass of Tanzanians. This evolution from an oral tradition to the literacy practices of the Internet has been neither culturally nor linguistically neutral, and one aim of this paper will be to comment on the language effect of recent changes. I base my analysis on the findings of the B@bel MOST project for which I was the Tanzanian researcher and on further research I carried out to understand the setting for these findings. As in the other papers in this collection, one of the issues I wanted to address was the question of whether the English language is spreading in tandem with the adoption of information technology and, in particular, with increased use of the Internet.
International Journal on Multicultural Societies (IJMS), Vol. 6, No. 1, 2004: 53 - 78 ISSN 1564-4901, www.unesco.org/shs/ijms © UNESCO

54 Safari Mafu
1. The Oral Tradition
Before the arrival of Europeans in sub-Saharan Africa, literacy and written culture were to be found in very few centres.1 (See also 2 below). In African society, knowledge and values were transmitted from one generation to the next through the oral tradition. Folklore was used to entertain and educate. The knowledge necessary for agriculture and crafts was also transmitted orally as the younger generation served apprenticeship with older members of the group. For these farming and the pastoralist communities, learning took place with practice. The work was generally divided by gender and young boys would work side by side with older men cultivating and tending the crops. Young girls would work side by side with their mothers or elder sisters doing household chores. In pastoralist communities, the young boys (and sometimes girls) would look after calves around the homesteads, while older boys and elders took the animals farther afield to graze.
One important feature of the education of young people from the pastoralist and agro-pastoralist communities, such as the Maasai and the Iraqws, was their training in skills for warfare. War games were organised and managed by older boys to ensure that the mock fighting did not result in serious injury.2
Tribal values and traditions were transmitted formally during initiation and circumcision ceremonies. For example, among the Maasai, the Iraqw and the Wayao3, young boys and girls at puberty were taken into the custody of same sex elders to be trained for the responsibilities of parenthood. In the case of the Iraqws, girls used to stay indoors with the elderly ladies for up to two or more years. During the entire period of initiation they were not supposed to be seen by other people, particularly men.
In each clan, designated individuals specialised in healing. The role was often assigned to the blacksmith, goldsmith etc. Rulers and chiefs were entrusted with the welfare of the society in general. These dignitaries handed the knowledge and skills involved in their role to the next generation, often in secret rituals. Certain clans were held to be endowed with supernatural powers and here too the transmission of the knowledge needed to exercise these powers was always by face-to-face communication. The secrets were not written down.
Entertainment, education, initiation, government, welfare and religion were thus carried out through personal contact and in the language of the group. As in all face to face communication, the language of the exchanges was always parole, the dialect particular to the small group. There was no concept of standard language, except in the few places in contact with the Muslim world where the classical
1 For example along the East African coastal towns of Bagamoyo, Kilwa Kisiwani, Malindi and Mombasa where Arabs had settled as early as 950 AD and where literacy was acquired for religious purposes. 2 See, for example, Camara Laye’s The African Child, or Ole Kulet’s Is it Possible? 3 As an example. Many other groups did the same.

From the Oral Tradition to the Information Era: The Case of Tanzania 55
Arabic of the Koran might be known. Language was an important variable in group identity and, by their language usage, groups could define themselves as different from speakers further along the dialect continuum or from different language phyla.
2. Education and the Literate Society
In the territory of present day Tanzania, the inhabitants began to have contact with the outside world from around 950AD when the Arabs from Oman settled on Kilwa Kisiwani Island. The Arabs introduced Islam and educated young men in madrassa schools, which taught Islamic religion and culture.4 Madrassa students had to learn Arabic script, usually through rote learning in order to read the Koran. It is important to remember that Arabic influence was of limited effect and confined to the coastal strip and the islands. Later on however, as the slave trade gained momentum, Arabs slave traders began to travel into the hinterland and established centres such as Morogoro, Dodoma, Tabora and Kigoma. Some traders settled in these stations and introduced madrassa and the Islamic religion.
In the 16th century, the Portuguese arrived and settled along the coast in towns such as Kilwa, Zanzibar and Mombasa, where they established ports of call. The traffic along the spice route to the Indian sub-continent and the Indonesian archipelago was regular and sometimes moderately heavy. The Portuguese, how- ever, had very little impact on the local communities as far as literacy was concerned. Nevertheless, although the Arabs later drove the Portuguese from these towns, the Europeans were in the area long enough to contribute to the lexical elaboration of Kiswahili, the indigenous language of the coastal plain. Kiswahili borrowed extensively from both Arabic and Portuguese (and subsequently of course from many other foreign languages such as Hindi and English). The early Arabic influence and Koranic study meant that, when Kiswahili was first written down, Arabic was the script.
Formal education and literacy for the interior and for a wider social group came after the arrival of European missionaries and colonial governments. The Germans were the first colonial empire in the area, from 1884. After the German defeat in the First Word War, the British took over the administration of Tanganyika.
The missionaries came from a variety of different European countries and Christian denominations and had distinct spheres of influence. The Roman Catholics especially Missionaries of the Order of Saint Benedictine from Germany had mission stations in southern Tanzania – from Nyangao and Ndanda in Lindi/ Mtwara Regions to Peramiho in Ruvuma Region. Irish Catholic orders had major mission centres at Kipalapala in Tabora, and Kilema in Moshi. Lutherans (mainly from Norway) occupied the northern zone; the Moravian Church occupied the
4 These continue to the present day.

56 Safari Mafu
Southern Highlands and the Anglican Church the Central zone and Zanzibar. Of course, no particular denomination dominated a particular area entirely.
In all these centres, formal education organised by Christian sects gradually replaced the indigenous traditions for educating and training young people. The missionaries, and later the state in the form of the colonial government, dislocated traditional education. This was sometimes overt as in the prohibition or discourage- ment of some traditional practices thought to be wrong, such as the practice of witchcraft and circumcision of girls. The dislocation was not total, however, as in some cases, the Christian church incorporated initiations and circumcisions into the church rituals, although the convergence was largely unacknowledged.
One change that was very noticeable was the spread of the printed word within the region. The advent of the printing press to the area had the profound effects that Benedict Anderson (1983) noted within Western societies. It encouraged the standardisation of the languages adopted for use as the medium of local administration and education, and added another tier to the hierarchy of imperial and indigenous languages. Standardisation of local languages came about principally as various Christian denominations attempted to translate their scriptures into the local languages. The missionaries were among the first to write Kiswahili grammar books Bishop Steere of the Anglican Church wrote a Kiswahili grammar book in (1870) while Krapf compiled a dictionary of Kiswahili in 1882.5 The Lutherans were particularly energetic translators, and in addition to the Christian sacred books also recorded local folklore in the language of the respective group – for example much folklore of the Iraqw was written in Iraqw. The preservation of culture from the African oral tradition was, however, quite a rare event and there was much that was not written down.
Among the first printing presses in the country to meet the demand for books and materials for schools and for religious literature for the church were the Vuga Printing Press in Lushoto, Ndanda Mission Press in Masasi, Peramiho Mission Press in Songea, and Tabora Mission Press in Tabora. The existence of the printing press within Tanzania greatly improved the spread of literacy since written books made practice available to those who had received a basic education. Both the Missionaries and the colonial government established more schools for the indi- genous people in different parts of the country. Sometimes, young men and girls were taken by force to attend such schools.6
5 Ludwig Krapf, and Johannes Rebmann were the first Europeans to see snow-capped Mt. Kilimanjaro in 1848. Krapf compiled A Dictionary of Suahili, which was originally published in 1882. It was reprinted in 1969 by Negro Universities Press, New York, ISBN 8371-1276-1 6 The author of this paper is a case in point. He was forcefully taken to school by the colonial government in 1958. The author’s parents were threatened with prison should they fail to make sure that their son attend school regularly.

From the Oral Tradition to the Information Era: The Case of Tanzania 57
The introduction of Western education was of course a threat to the training methods of the indigenous societies. One of the greatest effects was the language shift that it caused. Emphasis on the knowledge of the book and information transmitted by the written word meant that those who were educated mostly acquired Kiswahili. Religious institutions used it as the medium for primary education. This was true both of the Christians and the mission schools and the Moslems and their madrassa classes. As the missionaries and the imams converted indigenous people into Christianity and Islam respectively, they were instrumental in spreading literacy and Kiswahili. There were some exceptions to this as some of the other indigenous vernaculars were employed in church services and parts of the Bible were translated into these languages. For example, languages of the Sukuma7, Nyakyusa, Makua, Haya and the Chagga tribes were employed. However, this practice has not survived to the present day and Kiswahili is used throughout the Christian community for church service. This, as we shall see, followed the general spread of Kiswahili in a number of domains, to the detriment of other indigenous languages.
2.1 Languages of the Colonial Administration
The lingua franca for administrative purpose was Kiswahili. Only official govern- ment documents were in German (during German rule) and English (under British rule). During German rule, the medium of education for the indigenous population was Kiswahili. During British rule, a tripartite education system was introduced, differentiating provision for the three races that made up the population resident in Tanzania: the Africans, the Europeans and the Asians. Kiswahili was used as the medium of instruction in African schools while English was taught as a subject. English was the medium of the European and Asian schools.8
Kiswahili was used throughout the colonial administration to allow contact between ruler and ruled. This role, together with its use in education and religion, meant that the language was beginning to attain the status of lingua franca in Tanzania by the mid 20th century. Thus, when TANU (the Tanganyika African National Union) began to fight for Tanganyika’s independence in 1954, Kiswahili was adopted as the language of political association. If Tanzania was to keep the borders designated by the colonial treaties (and this is what the Organisation of African Unity (OAU) Charter had decided in 19639), there was a need for a language, which allowed communication among the many linguistically disparate groups in Tanzania.
7 The Sukuma are more than 5m people today – hence the largest ethnic group in Tanzania 8 Tripartite education system was abolished on 1.1.1962 just after attaining independence. 9 OAU was established on 25th May 1963 at a meeting of 24 Head of Independent African States at that time who signed the OAU Charter. Today all African states are independent and OAU has been renamed the African Unity (AU) as of July 2002.

58 Safari Mafu
Kiswahili was thought to be a more unifying language than English, the language of the colonial masters. Nyerere called it the ‘language of Africa’, because of the lingua franca role that it had already played among the populations of the east coast. After independence it was an important tool in nation building and promoting national cohesion. Two social processes aided the language shift to Kiswahili. In Nyerere’s social experiment, the Ujamaa policy of 1967, rural people were moved to settle in Ujamaa villages to collectivise agricultural production. Tanzania’s urban population also grew as people came to the towns in search of work in the limited industrialisation that was also then taking place. Both these phenomena brought about contact among linguistic groups that then had a need for a communal language. Language shift was also promoted since the government was actively discouraging the use of indigenous languages in education and administration, to promote national cohesion. It was generally hoped that they would wither and die a natural death. Likewise, regionalism in Tanzania was discouraged. Today, Tanzanian central government continues to be unenthusiastic about promoting indigenous languages (which amount to about 130 altogether).
After independence national education in the national language was seen as the key to the success of the Tanzanian state. A number of policies were elaborated and introduced to make the language of education Kiswahili. This was only partially successful. Kiswahili was the language of the primary sector, as it had been for most of the population even before independence. Secondary education, however, was in English, and has remained so despite a number of attempts to change the medium to Kiswahili. The reasons for this are numerous, and there is not space here to discuss the failure of the policies. 10 However, among them was the availability of English language medium texts for secondary and higher education, which was of immense importance. Tanzania’s financial priorities in the 1960s and 1970s and financial difficulties in the 1980s and 1990s meant that the funding for translation of work into Kiswahili was not always available.
Before ending this section, it is important to point out here the difficulties of storage of the printed word in the tropics. The life span of books in the libraries and schools of Tanzania is seriously affected by hot humid weather, insect infestation and vermin. This is a common problem for centres of learning in such climates. In the hundred years or so of the printed word that Tanzania has experienced, no easy and cheap solution to this problem has been developed. If, as seems probable, there is a withering reading culture among Tanzanians, we should perhaps look to this reason as contributory alongside the more usual reasons that are given, such as the growth of audio-visual media and the decline of the idealism of the liberation period.
10 But see Mafu 2000 for discussion of the issues.

From the Oral Tradition to the Information Era: The Case of Tanzania 59
3. From Books to Electronic Media
Recent changes in how communication and information flow take place are now causing the same kind of seismic shift that occurred in the early colonial period. Information technology in general and the Internet in particular are causing great change in scholarship, literacy practices and communication. The very language of exchange has once again shifted. This third section to the paper, which presents the research I undertook in Tanzania in 2002 and 2003, will address the issue of language and information technologies policy, new patterns of research and interaction caused by new technologies, the barriers to the general extension of practices to the general public, the ideological framework of the new practice and end with an assessment of the undoubted benefits that these technologies have brought to Tanzania.
3.1 Tanzanian policies on Information and Communication Technology
Tanzania’s Information and Communication Technology (ICT) policy is still at the draft stage as I write. This is understandable. For a poor country like Tanzania there must be a hierarchy of needs. Basic needs must be satisfied before computers can be procured to give access to the Internet to all students at institutions of higher learning, let alone pupils at primary and secondary school.
The Tanzanian authorities have been working with international organisations to bring information technologies and in particular the Internet to as many centres as it can. The International Telecommunication Union (ITU) has been developing multipurpose community telecentre (MCT) projects to bring telephone, fax, Internet, photo-copying, computers, Internet (both WWW and e-mail) and, in some cases, distance learning and telemedicine to remote villages around the world since 1998. Tanzania is one of the five ‘least developed’ African countries in this project.11 The Tanzanian centre in Sengerema, Mwanza, was officially inaugurated in April 2003. MCTs aim to provide communication and information facilities for a wide range of community uses, including the improvement of governance and public services. The Tanzanian project is supported by a number of donor agencies, among them UNESCO, whose theme is to promote telematics and learning without frontiers programmes world-wide. Other agencies include DANIDA, International Development Research Centre (IDRC) and ITU. Other partners include the British Council and international agencies such as the FAO, UNDP and WHO. The NGOs are also the source of some of the information technology hardware that has recently been installed in the universities and I shall discuss this further below.
Apart from the need to plan to acquire hardware, there is also a need to create the technical infrastructure. This has been slow in coming and existing telecommunication policies and the state Telco monopoly are both undermining the development of the Internet in Tanzania. There is an urgent need for the
11 Other African countries are Benin, Mali, Mozambique and Uganda.

60 Safari Mafu
government of Tanzania to create a framework for compatible services. The lack of ICT policy means that there is no appropriate legal and regulatory environment to stimulate ICT development. Thus there are obstacles to Tanzanians fostering regional co-operation to harmonize regulation and rationalize usage of scarce bandwidth to the better good.
3.1.1 Use of the Internet in the Ministries
Despite the evident problems (of which more below) there has been a modest move towards use of the Internet in government offices. The development is very recent. For example, on 31 March 2003, the Ministry of Transport and Communication advised civil servants to visit the Internet to get information and news from different parts of the world to improve their competence and efficiency by applying recent knowledge, information and innovation. On 8 April 2003, the Zanzibar Government12 announced that it had received funds from donors to install Internet services in its offices to the same end. Similarly, the African Medical Research Fund (AMREF), which incorporates several African countries, recently encouraged nurses to visit its web site to find out about development in a number of nursing domains, including handling HIV/AIDS patients in their respective countries. In another example, Tanzanian midwives are also being exhorted to acquire IT skills.13 These modest moves are, however, hampered not only by all the technical problems inherent in Internet use in Tanzania, but also by the fact that most of this information is in major European languages, such as English, French, and German. Kiswahili, the national language of Tanzania, though spoken in other countries in eastern, central and southern Africa is not yet common on the Internet. The Internet user has to be someone who is literate in English.
There has been a modest move by the United Republic of Tanzania to promote use of Kiswahili. The government website is in both English and Kiswahili for external and internal use respectively. This is in accordance with Tanzanian commitment to the symbolic use of Kiswahili as national language in all situations possible. Alongside this is the recognition of the need to make information on the country available in the most widely used lingua franca at the current time and thus there has been an acceptance of the need to publish in English. Curiously, however, the Tanzanian High Commission and embassies abroad have web sites solely in English and this neglect of Kiswahili in its symbolic role is somewhat surprising.
The Tanzanian government has always produced clearly articulated language policy. In the aftermath of independence the aim was to promote the national language and in the decades since independence this policy direction has remained constant (even though the implementation has not always been successful – as in
12 Zanzibar government forms part of the Union government of the United Republic of Tanzania. 13 The advice came from an official of the Africa Midwives Research Network (AMRN) and was
reported in the Tanzania Sunday Observer April 6, 2003

From the Oral Tradition to the Information Era: The Case of Tanzania 61
the attempt to move to Kiswahili in secondary education). However, up to the time of writing there has been no measure to promote the use of Kiswahili on the Internet. There is policy to promote Internet use but the medium is not mentioned. Currently, therefore, English is the main language used for accessing information since there is no systematic translation of sources into Kiswahili.
3.1.2 Use of the Internet in the Universities
Prior to 1996, computers were mainly used for word processing in Tanzania. Even in the institutions of higher learning, the most the computers could be used for was data analysis using specific software. Those who were familiar with such programmes were regarded as computer wizards. Computers were not linked to networks. Thus, in order to make our learning institutions part of the electronic era, the universities galvanised themselves. The Council of Sokoine University of Agriculture (my home institution) directed in July 1997 that by December 2001 the University should have an ICT policy in place. The Computer Centre (CC) has been established and an ICT Policy now exissts. Since the establishment of the centre, the number of individual users (staff and students) and volume of electronic information circulating within SUA and to the outside has increased tremendously, enabled by a LAN (Local Area Network) connection. The main goal is to promote ICT in the implementation of the University mission.14 Currently 300 PCs are connected to a LAN at SUA.15
This number of computers however, is too small compared to the total student population of over 2500 and over 250 members of academic staff. Thus, the demand for computers to access the Internet is so great that today University computing centres at SUA, UDSM and Mzumbe cannot meet demand of their users (students and staff) to use the facility for academic literature search, entertainment and/or sending email. This fact makes the need for Internet cafés more pressing in major towns such as Dar es Salaam and Morogoro.
3.1.3 Recent IT initiatives
Currently the University of Dar es Salaam (UDSM) is undertaking an Institutional Transformation Programme (ITP) to integrate Information Communication Technology (ICT) into all its main activities. This will include teaching and learning as well as research and community services in order to enhance the quality of education delivery and also to expand enrolment through distance learning. On 9
14 SUA Information and Communication Technology Policy and Guidelines 2002:iii 15 LAN at SUA was made possible through generous support of NORAD and VLIR. Most of the computers at SUA were acquired through donor funding agencies such as NORAD, DANIDA, British Council (ODA), VLIR, USAID, Ford Foundation and similar agencies, without which SUA would not have been of the electronic age as it is now. The case is also true of the other institutions of higher learning in Tanzania

62 Safari Mafu
June 200316, its Faculty of Education, the main institution that trains graduate teachers in the country, announced that it would convert some of its programmes for delivery through e-learning. This is because the conventional system to increase intake of students cannot match the demand for secondary school teachers. It was this need that had decided UDSM to go on-line. When faculties convert their programmes for e-delivery the venture will revolutionise teaching in the institutions of higher learning in Tanzania.
The University has already installed a Very Small Aperture Terminal (VSAT) satellite which links UDSM to the computer centres of the Southern African Region (Kenya, Uganda, and Mauritius) and the rest of the world. The Faculty of Education collaborates with the eDegree Company of South Africa to implement its e-learning project. It is expected that the Faculty of will get support from other institutions such as the Virtual African University (AVU) and the Tanzania Global Development Learning Centre (TGDLC).
The challenges for this e-education project are many. They include the poor infrastructure and the lack of ICT facilities that I will discuss below. And not least among the challenges is the fact that, because of the nature of the programme and collaborating agencies, the language of interaction/instruction of the on-line programme will be English.17
Initiatives in other sectors include a computer studies sponsorship programme for secondary school leavers. The sponsorship programme run by the New Horizons Computer Learning Centres (NHCLC) in Dar es Salaam aims to accelerate Tanzania’s human resource capacity building in computer education. The pro- gramme is run in partnership with the head office of New Horizons in the United States. The move will help students to study computer through sponsorship programme to achieve greater efficiency and competitive advantage in their respective jobs, careers and professions. The language of interaction/instruction will be English.
It is also encouraging to report here that, through assistance from the World Bank Institute in Washington DC, Tanzania has established a Global Development Learning Centre (TGDLC) in Dar es Salaam. Among other things, the Centre has a teleconferencing facility linked to several African countries such as Ghana, Uganda, and Ethiopia and the World Bank Institute in Washington DC. The Centre has its own web site and is in English. Currently some World Bank meetings involving the African Zone can be carried out without travelling to Washington DC – thus reducing heavy costs in foreign exchange that are incurred to send public servants abroad for meetings, training and conferences. The Centre offers training
16 As reported in the Guardian Newspaper (Tanzania) and a follow-up made to interview some of the
Faculty members in Dar es Salaam. 17 English is the medium of higher education in Tanzania, and it is one hurdle in the expansion of the
sector.

Saturday, July 12, 2014


THE SECURITY OF ELECTRONIC BANKING

ABSTRACT
The Internet has played a key role in changing how we interact with other people and how we do business today. As a result of the Internet, electronic commerce has emerged, allowing businesses to more effectively interact with their customers and other corporations inside and outside their industries.
One industry that is using this new communication channel to reach its customers is the banking industry. The electronic banking system addresses several emerging trends: customers’ demand for anytime, anywhere service, product time to market imperatives and increasingly complex back office integration challenges. The challenges that oppose electronic banking are the concerns of security and privacy of information.
The current focus of security of information transfer is on the session layer protocols and the flaws in end-to-end computing. A secure end-to-end transaction requires a secure protocol to communicate over untrusted channels and a trusted code at both endpoints. The solution addresses the use of secure protocols because trusted channels don’t really exist in most of the environment, especially since we are dealing with linking to the average consumers.
The solutions to the security issues require the use of software based systems or hardware based systems or a hybrid of the two. These software based solutions involve the use of encryption algorithms, private and public keys, and digital signatures to form software packets known as Secure Electronic Transaction used by MasterCard and Pretty Good Privacy. Hardware based solutions such as the Smartcard and the Me Chip provide better protection for the confidentiality of personal information.
Software based solutions have the advantage over hardware based solutions in that they are easy to distribute and are generally less expensive.

ABBREVIATIONS

ATMs        Automated Teller Machine/Asynchronous Transfer Mode
B2B            business-to-business
B2C        business-to-consumer
B2G        business-to-government
C2C        consumer-to-consumer   
CA         certification authority
CEO        Chief Executive Officer
ESD        Electrostatic Discharge
ICT        Information Communication Technology
IT        Information Technology
ISP         Internet Service Provider
PCs        Personal Computers
PGP        Pretty Good Privacy
RSA    Right Shift Algorithm           
SMEs        Small and Medium Enterprises   
SET        Secure Electronic Transaction
SSL        Secure Socket Layer
WTO        World Trade Organisation
WWW        World Wide Web
  1. INTRODUCTION
This paper highlights and cover the background of electronic banking, with the motivations and ventures in Electronic Banking, statement of the problem, objective, research question and justification of the study followed by scope and limitation of the study. Further, the discussion concerns about Electronic Banking from various perspectives, the security issue, with solutions in both software-based and hardware-based systems. Lastly, paper will be concluded with some final thoughts like conclusion and recommendation.
1.1 Background of the study
Internet and World Wide Web (www) in the developing countries has greatly changed the business environments of today’s world. In the developing countries consumers are now focusing into other substitute’s channels like electronic commerce for shopping which are offering them more and more choices of products and services in order to help in cost savings and its ease. Rapid growth of online shopping stuff and changing fashion of consumer behavior is attracting more and more companies to join the activity. Electronic commerce is not a new incident in the developing countries however dispersion of electronic commerce is very low in the country like Tanzania.
Information and Communication technology is helping to reduce the transaction cost of the business firms by providing cards and business services. Banking sector is very ideal for the successful development of electronic commerce. Electronic banking would help financial institutions to lower cost which is very crucial for the long term survival of the banks. It has been expected that those banks who are not responding to need electronic banking would more likely lose their customers. Financial institutions are now focusing on new delivery channels include virtual public and private networks, dial up connections, personal computers and ATMs. Electronic banking provides a reduced amount of time as compared with traditional banking but in order to get benefits from these services, readiness of consumers to aim and accept new technologies must be issue because consumers demands much more from financial institutions. Worldwide economic sectors are intensely reliant on the technologies, government policy and officially authorized frameworks which run the business very efficiently and transparently.
1.1.1. Electronic Commerce
The term electronic commerce refers to process of performing various business activities for products and services in which two parties interact with each other by electronic means, instead of interacting or having physical contact. Electronic commerce has the following major type’s business-to-business (B2B), business-to-consumer (B2C), business-to-government (B2G), consumer-to-consumer (C2C). So technology can consider as the major force to ensure the growth of e-commerce. This helps in providing more efficient, faster and much easier way of communication. Having online access anywhere is one of the main advantages of electronic commerce. The banking sector can be considered as the ideal platform for successful implementation of electronic commerce. Internet banking is the form of representing electronic channel for distributing and delivering the financial services at the virtual level.
1.1.2. Current Banking situation in Tanzania
The banking system in under developing countries is quite different from the banks operating in Europe. In Tanzania customers still face a lot of problems when they visit banks. In Tanzania, payment of utility bills by online means is not popular and even some banks are not offering the services. The utility bills are received by every home every month and these are water, telephone and electricity bill. But the problem is that these bills are send to homes at the different dates of months so people need to visit banks in order to pay utility bills. So the problem that mostly people face is that they have to stand and wait in the long queues for their turn so that they can be able to pay utility bills. The cash tradition is still ubiquitous in the banks of Tanzania. The most important reasons are lack of trust, non-availability of infrastructure, security and service charges. Consumer trust can play a vital role for the e electronic readiness among the people to use electronic banking services.
1.1.3. Motivations of electronic banking
The Internet is growing at an exponential rate. According to a survey, the Internet has doubled its size from 6.6 million hosts in the mid 1995 to 12.8 million host in mid 1996. As a consequence of the popularity of the Internet, hundreds of thousands of Internet users are trying electronic banking. Internet continues to expand the convenience associated with electronic banking will attract more Customers. One expectation of electronic banking is that it will replace the need for writing checks. In today’s market, “According to preliminary data from the latest Federal Reserve survey of patterns of consumer spending, almost four-fifths of consumer expenditures are handled by checks, directly or indirectly.” This means that electronic banking has a very large potential for use since many people expect that electronic checks will substitute paper checks. Moreover, for consumers, electronic money (electronic cash and electronic checks) means greater efficiency than using coins, paper bills, and traditional banks.
The electronic banking system brings the convenience of 24-hour, seven days a week, banking by offering home personal computers (PCs) tied directly to a bank’s computers. In addition, electronic money also offers greater security than a paper and coin system. Users are able to make a backup copy of their funds and if the electronic money is stolen, the users can invalidate the serial number just as they now stop payment on a paper check.
1.1.4 Ventures in electronic banking
1.1.4.1. Domestic
In order for this industry (electronic banking) to expand further, secure transactions with the trust of the consumers are necessary. Many banks are advertising secure on line service, allowing their customers a wide range of activities that they can do. Security First Network Bank is the first federally approved on line bank that is certified by the Office of Thrift Supervision, the federal regulatory body for the saving bank industry. With the support of the federal agencies, Security First Network Bank can give their customers more than just their assurance, but the assurance of the government, which gives consumers a large incentive to try electronic banking.
For a truly convenient system, banks need to connect to customers as well as to other financial institutions. Creating a common link between multiple banks so that banks can better and more safely communicate amongst themselves is becoming more of a reality. Fifteen of North America’s leading banks and IBM are working together to form an integrated network called Integrion Financial Network. The banks will be able to offer their customers access to their services through the public Internet and parallel private network access, with security and privacy.
1.1.4.2. International
In Europe, the Inter-bank Standards Association Belgium has established the Belgium’s electronic banking system to connect Belgium’s three largest banks together to develop uniform standards for electronic payments in Belgium. This system, developed by Utimaco uses electronic signatures according to the RSA method to guarantee accountability and security against the forging of electronic transaction.
Internationally, GENDEX Bank International is trying to connect the banking systems of various nations, states, independent principalities, and sovereign individuals to form an international banking system. This integration of electronic banking communities will promote the standardization of this industry. However, the primary concern today is the security issue.
It is prudent before proceeding with further discussion of this paper to provide the meaning of some of the key terms or concepts that the work keeps referring to them occasionally.
Electronic Banking; The use of a computer to retrieve and process banking data (statements, transaction details) and to initiate transactions (payments, transfers, requests for services) directly with a bank or other financial services providers remotely via a telecommunications network.
Electronic Commerce; The use of an information infrastructure through which businesses can speed the exchange of information, improve customer service, reduce operating costs, and increase global competitiveness
Internet; A worldwide system of computer networks, Networks connected through the Internet use a particular set of communication standards, known as TCP or IP, to communicate.
Encryption; the scrambling, or encoding, of information to prevent anyone other than the intended recipient from reading the information, there are many types of encryption, and they are the basis of network security.
Public-key security; Also known as asymmetric-key security or public-key encryption technology, this is a security mechanism for securely distributing encryption keys that are used to “lock” and ”unlock” data across an unsecured path. Public-key security is based on encryption key pairs, in contrast to private-key security, which is based on having a single, shared key.
Private-key security; Also known as symmetric-key security, this is a security mechanism based on both parties have the same encryption key, as in secret-key cryptography. The client and server share a key to encrypt and decrypt information on a network. A common implementation of private-key security is the Kerberos distributed security system.
Secure Socket Layer (SSL); a security protocol developed by the Netscape Communications Corporation to encrypt sensitive data and verify server authenticity

1.2 Statement of the problem
The security of electronic banking radically undermines the relationship between legally significant phenomena and physical location. The rise of the global computer network is destroying the link between geographical location and the power of the local government to assert control over online behavior, the effect of the online behavior on individual or things, the legitimacy of the effort of a local sovereign to in force rules applicable to global phenomena and the ability of physical location to give notice of which sets of rules to apply.
Internet banking is the latest development that has added a new dimension to banking transactions by making it more convenient, which has eliminated the long wearisome waiting-lines. But, there are some serious problems that you may encounter while banking through the Internet, due to which many still prefer to go directly to the banks instead of availing this facility.
Internet Banking Issues for carrying out Internet banking properly, a basic knowledge of computers and the Internet is required, which limits the number of people willing to avail this facility. Many people, who are not comfortable with computers and the Internet, often find it difficult to use this service. Therefore, for beginners, it is really time-consuming. In addition to this, people also find a difficulty in trusting a completely mechanized system like Internet banking, in case of financial matters. In many instances, a simple mistake, like clicking a wrong button, may create a big problem. And so, many individuals often keep wondering if they have properly executed the transaction. However, this uneasiness can be avoided by printing the transaction receipt and keeping it with oneself, until the bank statement is received.
While banking through the Internet, you have to be careful about the security of your Internet bank account. The security of your Internet bank account depends to a great extent on the security of your computer, password and pin number. Any leakage of information regarding your password or pin number and banking transactions can allow computer hackers to gain access to your bank account, which is the most common online banking problem. This can lead to unauthorized and criminal transactions being conducted without your knowledge. By the time you get your bank statement and detect such transactions, it may be too late.
In this, you have to make sure that the banking session is secure, as in many instances you may encounter proxy websites. These proxy websites can easily access your bank account, if they can crack your user name, password or pin number. Sometimes, it can be time-consuming and tedious, as many websites take quite a long time to get started. Besides this, your Internet bank account may also take considerable time to get started. You may also encounter technical difficulties and connectivity problems while conducting banking transactions. Of course, there is a customer care department in almost every bank to look into such matters, but often you may not be able to get the necessary assistance due to the congestion in the computer and telephone network. On the other hand, in normal banking, you can simply converse with the bank officials to sort out any problem.
However, with the advances in technology, many banks have taken the adequate measures to ward off any problems related to the security of Internet banking. Customers can also follow some simple precautionary measures, like not disclosing the password and pin number to anyone, changing the password at regular intervals and installing antivirus software to ensure security and safety of their banking transactions. Online banking tutorials are also provided by many banks to help familiarize people with this service. So, you can avail this facility to use Internet effectively, for making your day-to-day financial transactions.
Authorities attempt to control these situations, but the inadequacy of laws and continued advancements in technology present real impediments to properly dealing with these crimes happen to electronic banking. There is a need of law to provide guidelines to investigator and public prosecutors on how to collect this new type of evidence and prosecution of the offenders.

    1. Literature review
E-commerce literature has studied the phenomenon of e-banking from different perspectives. Some research has analyzed the adoption and growth of e-banking, whilst others describe the challenges and benefits to be gained from e-banking services.
It is conceived that e-commerce is a phenomenon of developed country and new technology generally put challenges for developing countries that lack the requisite capabilities, as well as the economic and financial resources to cope with the developed countries. Especially internet presents both opportunities for economic and social development, and a threat to further increasing the gap between developed and developing countries.
The experience of most developed countries shows that price and availability of the telecommunications infrastructure are clearly associated with competition and market access. Tanzanian Government has withdrawn import duties from computers and computer related peripherals. Due to the withdrawal of duties prices of computers and related products have become affordable to general communities. This to some extent has increased the use of computer for general purpose though effective applications of computers are still underutilized due to particularly government policy. However, it is revealed form recent survey that nearly 90% of the computers are Dar es Salaam based and there is little scope for decentralization of these PCs to different regions of Tanzania.
Very few standard IT institutions are providing high quality IT Education in Tanzania, but the costs are very high and consequently remain beyond the reach of general people. Some IT related private institutions opened and started to offer it courses but again they are centered on big cities such as Dar es Salaam, Mwanza and Arusha. These institutions suffer from lack of coordination and quality course materials, and inadequate technical facilities. In course of time, eventually situations have been improved as the government withdrew duties on Computers. Different patterns have been found in studies about the extent to which firms in developing countries embrace the internet..
In Brazil, telecommunication infrastructure is not considered a barrier for e-commerce, and financial services sectors have widely adopted the internet approach.
In Nigeria, e-mail was the prime aspect of the internet system and business people used email mostly for the purpose of communication. Low level of IT education was recognized as the underutilization of internet system in many developing countries.
In Hong Kong low e-shopping compatibility, e-shopping inconvenience, e-transaction insecurity, and low internet privacy, together with orientation toward social interaction and poor awareness on the part of the consumers, translate into supply-side hurdles.
It is found from various studies that in developing countries e-commerce have hindrances in the arena of cultural habit and business and technology infrastructures as well.
Various studies identified a number of factors that facilitate or limit internet-based businesses. The enablers are availability of information, access to price information, accessibility, and convenience. These are the factors that would benefit the online business. On the other hand, the limiters which inhibit the escalation of internet business include lack of trial, lack of interpersonal trust, lack of instant gratification, high shipping and handling costs, customer service issues, loss of privacy and security, lack of a stable customer base, and poor logistics..

    1. Hypothesis
An assessment, using interviews with IT professionals of banks was performed and with the help and review of available studies in this field we conclude that effective factors for implementation and development of e-banking can be divided into two broad groups including soft and hard factors. Soft factors can be; culture, awareness, job and human relations, trust, resistance, coordination, and decision making. Hard factors include supporting soft factors with suitable technological and economic infrastructures, finance of network development and the preparation of software and hardware required of e-banking. Therefore, from all related factors we conclude that the barriers and challenges of electronic banking in Tanzania can be categorized into six main groups, including infrastructural barriers, knowledge barriers, legal and security issues, socio-cultural barriers, economic factors, management and banking issues.

    1. Objective of the study
From the customer’s point of view, electronic banking is providing convenient and valuable source to deal with funding because it provides convenience to access account. For business consumer electronic banking is providing refined money management with the help of electronic banking which gives all the information within seconds.
Electronic banking is available in some bank while some of the banks are functioning to provide electronic banking solutions. Digital certificates accessibility and security concerns are impediment for the start of projects and interfering of the political parties in important plans of the bank to make decisions. Commerce plays a vital role to boost the economy of the country and there is a high level of risk involved in this industry. “In many industries such as banking and telecommunications, it is virtually impossible for an organization to compete unless its customers are given the level of service that is only possible with high technology systems”.
Awareness, information, customer protection, response time, reliability, security, technology readiness all are considered to be an important elements for electronic banking. Nowadays employees are facing a lot of problems while facilitating the customers for doing transactions electronically. The banks have appointed customer relation officers for providing solutions of problems but customers are still reluctant to do online banking transactions.
The study aims to identify governmental, individual and financial institutions perspective of the electronic banking in Commercial banks of Tanzania and how to provide with customers enough knowledge so that they can start using electronic banking transactions.
The objective of the study is to find out why customer is reluctant to use electronic banking facility and to give answers to the question.
1.5.1 Study question
What are the hindrance and facilitators for the security of electronic banking in Tanzania? Why customer is reluctant to use electronic banking?
    1. Justification of study
The term “e-” (electronic) is pretty used worldwide. They are very buzzing words, but electronic commerce is still in its immaturity stage in the economic sector especially in banks of emerging countries like Tanzania. The boom of internet has transformed societies. Distance is not more reality. Just clicking of mouse can connect people from all over the world which has resulted businesses to come up with the new idea of taking the advantage to internet by running business online that is commerce, and banking. Competition and limitation of resources placed banks under pressure to lower cost and improve their services and maintain quality of service. Hi-tech advances in bank industry modernize people to deal with their finance. Introduction of online banking facilitate people by gaining access to accounts anywhere at any time round the clock.
With the introduction of online banking in 1995, it allows people to get benefits of online stuff by having every kind of information. It provides benefits for customers and banks as well. Banks have lowered their transactions costs and advertising services with the help of websites while the customers can enjoy online banking by accessing internet which is very relaxing, time saving and cost reducing. Electronic banking provides reimbursement to customers including 24 hours access to their account and transferring of funds by just clicking of mouse seven days a week.
Banks are facing demands within the banking sector and particularly from the non-banking economic services area because they are moving towards multi-channel banking services which provide innovative products and services with lower costs to their customers. Online banking is very attractive to banks and to consumers who now have higher approval of new technologies and progressively more understanding of complex products. Banks are using their product names with large consumer base and highly market shares of firm financial products to remain their existing clients and to attract new ones.

    1. Study Methodology
The study methodology followed to complete the study is on the basis of primary and secondary data. Secondary data were collected from relevant papers, daily newspaper, and IT magazines published in paper form and electronic form as well. Primary data were collected from three stakeholder groups namely, vendors (merchants), financial institutions, IT institutions and the consumers (mostly Small and Medium Enterprises (SMEs)). A critical analysis was done to determine the barriers that hinder the effective security of e-commerce in Tanzania.
    1. Scope of the study
The scope of the research is to observe and analyze the electronic and online banking experiences of customers of the banks. There are different aspects of electronic banking which can be viewed from different views like; banks perspective and customer’s perspective.

       1.9. Limitation of the study
While conducting the study it comes up with some limitations. The generalization of the study may be affected because it is not possible to conduct interviews from every customer. Changing the customer’s attitude towards using the electronic banking is very difficult. Customers have more faith in using the conventional internet banking system rather than using the internet banking. Also, Customers may vary from bank to bank and it is very difficult to target the customers from all the bank branches of Tanzania.

  1. CONCERNS ABOUT ELECTRONIC BANKING
Since Electronic Banking is a new technology that has many capabilities and also many potential problems, users are hesitant to use the system. The use of Electronic Banking has brought many concerns from different perspectives: government, businesses, banks, individuals and technology.
2.1 Government
From a government point of view, the Electronic Banking system poses a threat to the antitrust laws. Electronic Banking also arouse concerns about the reserve requirements of banks, deposit insurance and the consumer protection laws associated with electronic transfer of money. The US government is concerned with the use of high quality of encryption algorithms because encryption algorithms are a controlled military technology.
2.2 Businesses
Businesses also raise concerns about this new media of interaction. Since most large transfer of money is done by businesses, these businesses are concern about the security of their money. At the same time, these businesses also consider the potential savings in time and financial charges (making cash deposits and withdrawals which some banks charge money for these processes) associated with this system. Another businesses concern is connected to the customer. Businesses ponder the thought that there are enough potential customers who would not make a purchase because the business did not offer a particular payment system (example; electronic cash and electronic check). This would result in a loss of sales. On the other side of the coin, if this system becomes wide spread, this would allow more buying power to the consumer which puts pressure on businesses to allow consumers to use electronic transfer of money.
2.3 Banks
Banks are pressured from other financial institutions to provide a wide range of financial services to their customers. Banks also profit from handling financial transactions, both by charging fees to one or more participants in a transaction and by investing the funds they hold between the time of deposit and the time of withdrawal, also known as the “spread”. With more financial transactions being processed by their central computer systems, banks are also concern about the security of their system.
2.4 Individuals
Individuals are mainly concern with the security of the system, in particular with the unwarranted access to their accounts. In addition, individuals are also concern with the secrecy of their personal information. 82% of American poled expressed concern over privacy of computerized data. As more and more people are exposed to the information superhighway, privacy of information and the security that goes hand and hand with this information is crucial to the growth of electronic transactions.
2.5 Technology
In order to provide effective and secure banking transactions, there are four technology issues needed to be resolved. The key areas are: security, anonymity (privacy) technology, authentication, and Divisibility.
      1. Security issue
Security of the transactions is the primary concern of the Internet-based industries. The lack of security may result in serious damages. The examples of potential hazards of the electronic banking system are during on-line transactions, transferring funds, and minting electric currency.
Dr. David Chaum, Chief Executive Officer (CEO) of DigiCash said that “Security is simply the protection of interests. People want to protect their own money and bank their own exposure. The role of government is to maintain the integrity of and confidence in the whole system. With electronic cash, just as with paper cash today, it will be the responsibility of government to protect against systemic risk. This is a serious role that cannot be left to the micro-economic interests of commercial organizations.”
The security of information may be one of the biggest concerns to the Internet users. For electronic banking users who most likely connect to the Internet via dial-up modem, is faced with a smaller risk of someone breaking into their computers. Only organizations such as banks with dedicated Internet connections face the risk of someone from the Internet gaining unauthorized access to their computer or network. However, the electronic banking system users still face the security risks with unauthorized access into their banking accounts. Moreover, the electronic banking system users also concern about non-repudiability which requires a reliable identification of both the sender and the receiver of on-line transactions. Non-secure electronic transaction can be altered to change the apparent sender. Therefore, it is extremely important to build in non-repudiability which means that the identity of both the sender and the receiver can be attested to by a trusted third party who holds the identity certificates.
      1. Anonymity (privacy) technology
Generally speaking, the privacy issue is a subset of the security issue and by strengthening the privacy technology; this will ensure the secrecy of sender’s personal information and further enhance the security of the transactions. The examples of the private information relating to the banking industry are; the amount of the transaction, the date and time of the transaction, and the name of the merchant where the transaction is taking place.
Privacy technology can be used to assure that consumers, merchant’s, and the transactions themselves remain confidential. For instance, companies sending important, secret information about their marketing strategy to one of its partners would like to keep that information private and out of the hands of its competitors. This technology will keep all information secure and can be applied to electronic cash, also known as “e-cash”. The privacy technology provides a fully digital bearer instrument that assigns a special code to money, just like a bank note. The security of e-cash is superior to paper cash because even if it is stolen, it cannot be used. However, e-cash has its share of disadvantages because it lacks the privacy of use. “This system is secure, but it has no privacy.” This would make it possible to create spending profiles on consumers and threaten their privacy. Furthermore, records based on digital signatures are more vulnerable to abuse than conventional files. Not only are they self-authenticating, but they also permit a person who has a particular kind of information to prove its existence without either giving the information away or revealing its source.
Whereas the security of digital signatures is dependent on the difficulty of particular computations, the anonymity of blinded notes is limited only by the unpredictability of the user’s random numbers. The blinded electronic bank notes protect an individual’s privacy, but because each note is simply a number, it can be copied easily. To prevent double spending, each note must be checked on-line against a central list when it is spent which makes this verification procedure unacceptable for many applications, especially for minor purchases. Thus, this technology currently, is only applicable for large sums of money.
      1. Authentication
Encryption may help make the transactions more secure, but there is also a need to guarantee that no one alters the data at either end of the transaction. There are two possible ways to verify the integrity of the message. One form of verification is the secure Hash algorithm which is “a check that protects data against most modification.”  The sender transmits the Hash algorithm generated data. The recipient performs the same calculation and compares the two to make sure everything arrived correctly. If the two results are different, a change has occurred in the message. The other form of verification is through a third party called Certification Authority (CA) with the trust of both the sender and the receiver to verify that the electronic currency or the digital signature that they received is real.
      1. Divisibility
Electronic money may be divisible into different units of currency, similar to real money. For Example, electronic money needs to account for pennies and nickels.

  1. SOLUTIONS

    1. Software-based systems
In software-based security systems, the coding and decoding of information is done using specialized security software. Due to the easy portability and ease of distribution through networks, software-based systems are more abundant in the market. Encryption is the main method used in these Software-based security systems. Encryption is a process that modifies information in a way that makes it unreadable until the exact same process is reversed. In general, there are two types of encryption.
The first one is the conventional encryption schemes, one key is used by two parties to both encrypt and decrypt the information. Once the secret key is entered, the information looks like a meaningless jumble of random characters. The file can only be viewed once it has been decrypted using the exact same key.
The second type of encryption is known as public key encryption. In this method, there are two different keys held by the user: a public key and a private key. These two keys are not interchangeable but they are complementary to each other, meaning that they exist in pairs. Therefore, the public keys can be made public knowledge, and posted in a database somewhere. Anyone who wants to send a message to a person can encrypt the message with the recipient public key and this message can only be decrypted with the complementary private key. Thus, nobody but the intended receiver can decrypt the message. The private key remains on one’s personal computer and cannot be transferred via the Internet. This key is encrypted to protect it from hackers breaking into the personal computer. There are four examples of current encryption technology presented below: Digital Signature, Secure Electronic Transaction, Pretty Good Privacy, and Kerberos;
      1. Digital Signature
Digital Signature is a coded message added to a document or data that guarantees the identity of the sender. Digital Signature was first proposed in 1976 by Whitfield Duffie, at Stanford University. A digital signature transforms the message that is signed so that anyone who reads it can know who sent it. The use of digital signatures employs a secret key (private key) used to sign messages and a public key to verify them. The message encrypted by the private key can only be verified by the public key. It would be impossible for any one but the sender to have created the signature, since he or she is the only person with the access to the private key necessary to create the signature. In addition, it is possible to apply a digital signature to a message without encrypting it. This is usually done when the information in the message is not critical. In addition, this allows people to know who compose the message. Because of the signature contains information so called “one way hash”, it is impossible to forge a signature by copying the signature block to another message. Therefore, it is guaranteed that the signature is original.
      1. Secure Electronic Transaction (SET)
Secure Electronic Transaction (SET) software system, the global standard for secure card payments on the Internet, which is defined by various international companies such as Visa MasterCard, IBM, Microsoft, Netscape Communications Corp., GTE, SAIC, Terisa Systems and VeriSign. SET promises to secure bank-card transactions online. Lockhart, CEO of MasterCard said, “We are glad to work with Visa and all of the technology partners to craft SET. This action means that consumers will be able to use their bank cards to conduct transactions in cyberspace as securely and easily as they use cards in retail stores today.” SET adopts RSA public key encryption to ensure message confidentiality. Moreover, this system uses a unique public or private key pair to create the digital signature. The main concerns for the transaction include not only ensuring the privacy of data in transit, but also proving the authenticity which both the sender and the receiver are the ones they claim to be. Digital signature is used to achieve the authenticity. This ensures that the message was actually from the appropriate person. Besides uniquely identifying the sender, the digital signature also ensures that the original message was not tampered with in transit. The processes in SET are not specific to card transactions; they are generic to authentication, certification, and encryption and so on.”
      1. Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP), created by Philip Zimmermann, is a “hybrid cryptosystem that combines a public key (asymmetric) algorithm, with a conventional private key (symmetric) algorithm to give encryption combining the speed of conventional cryptography with the considerable advantages of public key cryptography.” The advantage of PGP is that it does not require a trusted channel of transmitting the encryption key to the intended recipient of your message. Furthermore, it has the ability to sign the messages by encrypting them with sender’s private key which cannot be replaced by any other key. Once the receiver received the message, he or she can then decrypt the message with the sender’s public key which cannot be forged and represents the true identity of the sender.
      1. Kerberos
Kerberos uses private key security. Kerberos is named after the three-headed watchdog of Greek mythology and it is one of the best known private-key encryption technologies. Kerberos creates an encrypted data packet, called a ticket, which securely identifies the user. To make a transaction, one generates the ticket during a series of coded messages by making exchanges with a Kerberos server, which sits between the two computer systems. The two systems share a private key with the Kerberos server to protect information from hackers and to assure that the data has not been altered during the transmission. Example of this encryption is NetCheque that uses Kerberos to authenticate signatures on electronic checks that Internet users have registered with an accounting server.
    1. Hardware-based systems
Hardware-based systems offer a more secure way to protect information, but, it is less portable and more expensive than software-based systems. The hardware-based security system creates a secure, closed channel where the confidential identification data is absolutely safe from unauthorized users. There are two hardware-based systems discussed in this section: Smartcard system and MeCHIP.
      1. Smartcard System
Smartcard System is a mechanical device which has information encoded on a small chip on the card and identification is accomplished by algorithms based on asymmetric sequences. Each chip on the Smartcard is unique and is registered to one particular user, which makes it impossible for a virus to penetrate the chip and access the confidential data. However, practical limitations in the Smartcard system prevent it from broad acceptance for major applications such as home banking or on-line distribution. One draw-back for the Smartcard is that it cannot handle large amounts of information which need to be decoded. Furthermore, the Smartcard only protects the user’s private identification and it does not secure the transfer of information. The Smartcard is one hardware-based system that offers confidential identification.
      1. MeCHIP
MeCHIP which developed by ESD is connected directly to the PC’s keyboard using a patented connection. All information which needs to be secured is sent directly to the MeCHIP, circumventing the client’s vulnerable PC microprocessor. Then the information is signed and transmitted to the bank in secure coded form. A closed, secure channel from the client to the bank is assumed in this case. All information which is transmitted and received is logged and verified to ensure that it has not been tampered with. If there are any deviations, the session is immediately terminated. This hardware-based solution offers the necessary security at the personal computer to transfer confidential information.
Therefore; the findings of the studies have a significant inference for the study and financial institutions contributing to offer electronic banking services and for those banks that are setting up their minds to start electronic banking services. Giving high-quality of customer services by convincing the clients concerning the comparison of credit and debit cards with notes will incline the adoption of electronic banking in Tanzania. Findings of the studies give opening view in favor of Human Resource approach of the banks which necessitate adjustment of Information Technology strategies within it. Staff of the bank can endorse an efficient power to the trade and marketing of the electronic banking artifact which can be perceived only by the help of valuable electronic banking for the routines of the actions which can benefit both the banks and consumers.     

  1. CONCLUSION
Despite a few stumbles, the future is bright for e-commerce. The 20th Century, shaped by the Industrial Revolution, became the age of the automobile and the television. The 21st Century, shaped by the Technological Revolution, is the age of globalization. The Internet massively impacts all aspects of business. In the 21st century, e-business is no longer an option for businesses it is a necessity.
Today, e-commerce is an ever expanding consumer industry. For an e-commerce site to succeed it must understand its customers’ mindset. Although price is always an issue, it is rarely the primary motivator for buying a product online. Customers are looking for convenience, and or products they can’t find elsewhere. Vendors should not wait until the removal of the current obstacles in the online business environment. The effort is to be exerted towards the development of appropriate e-commerce model that is suitable for the products being marketed. The business model has to encompass the three major factors: attracting potential customers, timely delivery, and comfortable payment methods.
The e-commerce innovation programme will build capacities in Tanzania to small and medium ICT enterprises to make a business with ICT utilizations. E-commerce innovation aims to encourage the growth of Tanzanian ICT industries and SMEs, particularly in selected regions, Dar-es salaam, Arusha, Mwanza, Morogoro and southern regions through three main actions: Strengthening and improving security models for ecommerce in Tanzania in banking systems, fostering SMEs groups use of ICT and supporting innovative local applications that is websites sustainability and Single government institution managed portals development.
In order to reduce the potential vulnerabilities regarding to the security, many vendors have developed various solutions in both software-based and hardware-based systems. Generally speaking, software-based solutions are more common because they are easier to distribute and are less expensive. In order for electronic banking to continue to grow, the security and the privacy aspects need to be improved. With the security and privacy issues resolved, the future of electronic banking can be very prosperous. The future of electronic banking will be a system where users are able to interact with their banks “worry-free” and banks are operated under one common standard.

  1. RECOMMENDATIONS
Since Tanzania is developing country and private organizations are not organized enough to provide with IT infrastructure, Government should initiate programs to reduce the barriers in the security of electronic banking.  
Establishing a task force at the government level to coordinate the activities related to ICT of different stakeholders. As a long-term investment government should invest in basic and higher education to reap the real benefits of ICT especially in the concerned matter, which is security of electronic banking. One of the main bottlenecks of e-commerce in Tanzania is e-payment system operation, which suffers from lack of convertibility of e-currency. The balance in any e-cash account is not convertible like cash without the help of any intermediating third party, which it attracts special hardware arrangement. Hence, banks also need to adopt legal frameworks for the successful transformation of electronic business in Tanzania.
Government policies can play a vital role to successfully implement the policies for the banks regarding secure payments, low cost and regulatory frameworks for the implementation of electronic banking.
Financial institutions should provide powerful methods for security issues, risk management, technological enhancement and attract the consumers by developing their trust. Autonomy of the judiciary is supposed to be re-established to get better supremacy and to stop the political intervention. The financial institutions should provide modern electronic banking mediums that can eradicate the troubles that include distrust on technology, unreliable transactions, slow response time and security. Financial institution needs to establish a link with the customers to determine their requirements that can lead to successful electronic banking solutions. Electronic banking can abolish the problems of processing notes, cheque, theft and waiting in the queues for hours.
Website and the outlook of the bank plays an important role to attract the customer‘s if the detailed information provided is understandable and brief. Demo provides help to use the electronic banking. Customer complaint management system can boost customer constancy and trust on the electronic banking. Bank can develop an attractive website to provide handiness for the consumer’s.
Proper awareness can produce more results by creating awareness to all the people to use the electronic banking facility. These actions might aid to attract the customers to use electronic banking which can result in considerable amount of profits and low transaction costs. Example educating consumers about the ease and benefits of online shopping Information of online banking is very necessary for the customer, because it helps the customer to know about the electronic banking.
Substantially enhancing transaction security and product quality, showing the customers that the company cares and shares about buyers’ well-being is instrumental to enhancing customer loyalty and to help them understand that virtual shops are safe and legitimate. Also, Building effective distribution channels namely postal service, direct delivery, third party delivery, and alliances with other established companies.
Adopting and implementing the WTO Information Technology agreement on financial services and the WTO agreement on basic Telecommunications are essential for international business relating to e-commerce (Worldwide Coalition Calls for WTO Policy Agenda to Enhance Growth of E-Commerce)
Removing any obstacles that hinder the effective methods of both online and offline payment systems. Security and privacy are the major elements of electronic banking because the security and privacy issues are very important for the customer if the customer is satisfied with the security and privacy of the bank the customer will then used electronic banking service.
Quality of internet is also important because the internet is not good in Tanzania and electronic banking needs good internet connection to perform complete transaction. Perceived usefulness and Perceived usage are also important elements of the electronic banking which is related to the enjoyment and satisfaction of the customer.
Trust plays an important role to build the confidence on the technology provided by the banks to its customers. Quality of services can be only provided by good infrastructure with the adoption of latest technology.
The reason behind using of this recommendations is to analyze the customer acceptance of using the online banking service and at the same time having better knowledge of the government policies, infrastructure problems and lacking behind of technology that hinders the electronic banking. So the Customer acceptance and electronic banking are two main concepts that hinder or facilitate the use of internet banking in commercial banks of Tanzania.

BIBLIOGRAPHY
BOOKS
Ahmed, A, “Policies & Regulations for Expanding e-banking to the Poor”, The First
        Microfinance Bank Ltd, 2006
Andam, Z.R. “e-Commerce and e-Business”, e-ASEAN Task force UNDP-APDIP, 2003
Armstrong, Gary and Phillip Kotler Marketing: An Introduction New Jersey: Prentice Hall, (6th
        ed.) 2002
Bwana, A. J., Electronic Banking and Law in Tanzania: Approaches to its Regulation. Tanzania
        Lawyer, 2003
Burnham, B. “The Internet’s Impact on Retail Banking”, Booz-Allen Hamilton, (1996)
Cheung, Michael T. and Ziqi Liao “Supply-Side Hurdles in Internet B2C E-Commerce”, IEEE
        Transactions on Engineering Management, 2003
Edwards and Waelde, Law and the Internet, North America: 3rd Edition, Hart Publishing, 2009
Furuholt, Bjørn “A Rural-urban digital divide? Regional aspects of Internet use.” Proceedings of the 9th International Conference on Social Implications of Computers in Developing Countries, São Paulo, Brazil, May 2007.
Information Technology Law, 6Th Edition, United States: Oxford University Press, 2011
Kothari, C.R., Research Methodology- Methods and Techniques, New Delhi, Wiley Eastern
        Limited, 1985 Lloyd, J. I
Mambi, J. A., ICT Law Book: A Source Book for Information & Communication Technologies
        and Cyber Law, Tanzania: Mkuki na Nyota Publishers LTD, 2010.
Mollel, L. A, & Lukumay, N. Z., Electronic Transactions and the Law of Evidence in Tanzania,
        Iringa University College, 2007
Paulo B. Tigre, “E-Commerce Readiness and Diffusion: The Case of Brazil”, I-WAYS, Digest
        of Electronic Commerce Policy and Regulation, 2003
Pfleeger, Charles P. Security in Computing. Prentice Hall, 1997
Reiser, S.J, “The Information highway and Electronic Commerce: What does it mean: Current
        Issues, 1997
Sachs, J. D., Readiness for the networked world: A guide for developing countries. Cambridge,
        MA: Center for International Development, Harvard University 2000.
Shahzada, A.M. Country report of Pakistan on initiatives of information society by Pakistan
        Telecommunication Authority, 2006
Tigre, Paulo Bastos, “Brazil in the Age of Electronic Commerce”, The Information Society, 2003



STATUTES
Electronic Communications Act, 2000 (U.K)
The Tanzanian Communications Regulatory Authority Act of 2003
Uniform Electronic Evidence Act of 1999 (Canada)
United Kingdom Electronic Communications Act




JOURNALS

Applegate, L.M. et al. (1996), “Electronic commerce: Building blocks of new business opportunity”, Journal of Organizational Computing and Electronic commerce, 6 (1)
Dilruba Khanam, Mohiuddin Ahmed, Sohrab Husain Khan, “E-Banking: An Emerging Issue of Developing Country Like Bangladesh”, Journal of Social Sciences, Grace Publication, 3 (3).
Karadaras, D., & Papathanassiou, E. (2001), “The development of B2C e-commerce in Greece: current situation and future potential”, International Journal of Information Manage, Vol. 23
Karjaluoto, H., Mattila, M. and Pento, T. (2002), “Factors underlying attitude formation towards online banking”, International Journal of Bank Marketing, ISSN 0265-2323, Vol.20
Kundi, G.M. & Shah, B, “IT, Threats & Opportunities for e-business”, The Electronic Journal on Information Systems in Developing Countries, 2009
Linus Osuagwu, “Internet Appreciation in Nigerian Business Organizations”, Journal of Internet Commerce, 2 (1), 29-47, 2003
Lucking-Reiley, D. and Spulber, D.F. (2001), "Business-to-Business Electronic Commerce", Journal of Economic Perspectives, 15 (1)
Oinus, Paivi (2002), “Towards Understanding Network Relationships in Online Retailing”, International Review of Retail, Distribution, and Consumer Research, 12 (3)
Orr, B. (1999), “At Last, Internet Banking Takes off”, ABA Banking Journal, Vol. 91
Srinivasan, Srini S., Rolph Anderson, and Kishore Ponnavolu, “Customer Loyaltyin E-commerce: An Exploration of Its Antecedents and Consequences”, Journal of Retailing, 78 (1), 41-50. 2002
Yu, Jun”B2C Barriers and Strategies: A Case Study of Top B2C Companies in China”, Journal of Internet Commerce, 2006.


RESEARCH PAPERS
Ally Abdallah, The Impact of ICT Revolution in Tanzania Legal System; A critical Analysis of Cyber crime and Computer Forensic Evidence, Master of Law (LLM) Thesis, Open University, 2011
Bakari, J. K., A Holistic Approach for Managing ICT Security in Non Commercial Organisation, Doctoral Thesis, Stockholm University Sweden, 2007
Pikkarainen, T., Pikkarainen, K. Karjaluoto, H. and Pahnila, S. (2004), “Consumer acceptance of online banking: an extension of the technology acceptance model”, Internet Research, Vol. 14 No. 3, ISSN 1066-2243.

ONLINE SOURCES
Law Reform Commission of Tanzania, “Position Paper on E-commerce”, accessed at http://www.http:lrct.tz 27 May 2012
Security Comes First With Online Banking at Security First Network Bank. Http://www.hp.com/ibpprogs/gsy/advantage/june96/custspot.html
Solving the Puzzel of Secure Electronic Commerce Http://www.rsa.com/set/bankset.htm
How PGP works. Http://rschp2.anu.edu.au:8080/howpgp.html

CYBERCRIME LAW IN TANZANIA

CYBERCRIME LAW IN TANZANIA

Translate

RECENTLY POSTS

Total Pageviews

LIKE MY PAGE

TELL ME ABOUT BUSINESS

TELL ME ABOUT BUSINESS

My Blog List

what is crime?