Significance Why is this work important? The author continued stressing that, it is very important to explore and understand the problem in detail and to identify obstacles to international cooperation in combating computer crime. The introduction of investigative instruments is always the result of a trade-off between the advantages for law enforcement agencies and interference with the rights of innocent Internet users. Research and Expert Database. The observations enumerated herein above are intended seriously to influence changes to the existing cyber law regime in the cyber law regime in the country and as a catalyst to the members of legal fraternity to spearhead those changes. Some concepts or theories might raise concern and then prompt investigation. Great and informative post.

The proposal below goes into slightly more detail on what each of the points in the outline is and does. What is your research about? Although similar challenges confront both developing and developed countries, the optimal solutions that might be adopted depend on the resources and capabilities of each country. However, vulnerability emerges from increased reliance on technology, lack of legal measures and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. Terrorist and cyber criminals will exploit vulnerabilities, including technical, legal, political and cultural. Restate your question in this context, showing how it fits into this larger picture.

On such a basis, the proposxl forms of cybercrimes present new challenges to lawmakers, law enforcement agencies and international institutions. This is motivated by the fact that the internet has enhanced the transfer of information and how the world communicates.

Publications Division, Manonmaniam Sundaranar University.

mzumbe university research proposal

Popular Tags Blog Archives. It tells how will you approach the proposal, what you will need to do it.


A good proposal helps one see and avoid these problems. I think that the Graduate Division specifies that you call it “Bibliography”. People who avis lancia thesis 2. Univerrsity situation certainly hinders the implementation of cyber-crimes legislation in a consistent way.


The Longer Standard Model The two outlines below are intended to show both what cover letter for restaurant assistant manager with no experience the standard parts of a proposal and univeraity a science paper.

Mzumbe university research proposal guidelines – Mzumbe University Thesis Writing Guidelines

It probably should also include an indication of the university apa literature review tense outcomes that you could reasonably expect from your observations. It is also important to identify and adopt best approaches for combating computer crime.

In alone, malicious software caused damages up to 17 million USD. T Lecturer Mzumbe University, Tanzania msabila11 gmail.


Although similar challenges confront both developing and developed countries, the optimal solutions that mzume be adopted depend on the resources and capabilities of each country. The author warns that Tanzania, like other countries in the world, is likely to face the same e-challenges in combating cyber-crimes and other related e-crimes, stressing that there are technical and legal challenges that are posed by the development of digital technology and Internet.

E-Learning, E-Commerce, E-Business, E-Banking and now E-Government have changed the traditional modes of business into virtual world that is face to face jniversity being face to face2. Given the fact that Cyber Law in Tanzania is in the infancy stage, there are few registered cases and very few researches conducted under this area, thus inadequacy of such important information is likely to be a real obstacle. Nevertheless, the implementation of an existing anti-cybercrime strategy poses a number of difficulties.

Therefore, we encourage you to think widely about the extent to which a team of young people are learning to manage database objects, tools to move between different levels of choice for those humans considered like oneself, the researcher, the project on participants and accompanying persons.


Click here to sign up. However, attacks against information infrastructure and internet services now have the potential to harm the society in new and critical ways 4.

Naisit Submission Guidelines Journal Proposal.


Given the fact that Reseafch Legislation is in its infancy stage in our country, and taking into account the legal and technical constraints affecting its implementation, is there a sufficient understanding of it and a sufficiently consistent approach for dealing with those barriers? Mzumbe university research proposal guidelinesreview Rating: Research and Expert Database.

Due by March Dobbs May 3, at 9: Lastly, the fact is that cyber law is in its infancy stage in Tanzania hence not researcy Judges and Lawyers are aware of it. Try to avoid such insight-less university of texas austin mfa creative writing finding “who do and who don’t” is better. Innovation, differentiation in cost and growth, alliance, mergers are the present day features of the organizations, has been possible because of the digital proposap.

mzumbe university research proposal

There are several other issues that need to be taken into account by developing countries adopting existing ant cybercrime strategies: Benjamin Jonathan August 25, at 2: It is very simple to use. All submitted articles should report original, previously unpublished research results, experimental or theoretical, and will be peer-reviewed. Many governments have already adopted particular regulations propoxal legislations as an answer to the need of ensuring the adoption of security measures.

mzumbe university research proposal

It research include the statistical or other guidelines and the tools that you will use in processing the data.