Jurnal Transformative
Full Lenght Article
The Effectiveness of Performance of E-Office System in Tanzania's Public Institutions
Abstract
The main objective of this study was to examine the effectiveness of the performance of the e-office system in Tanzania's Public Institutions at the President's Office of Public Service Management and Good Governance (POPSMGG). Specifically, the study determined the extent to which the e-office system is used at PO PSMGG, assessed the impact of using the e-office system at PO PSMGG, and examined the challenges faced in using the e-office system at PO PSMGG. The study adopted a cross-sectional research design. A total of 132 participants participated in this study, equal to an 86.8% response rate. The Resource-Based View theory guided the study. The study employed questionnaires and interview methods to collect data. The findings revealed that the majority of respondents, 58%, said they use e-office daily. The study results indicated that most respondents, 90%, agreed that the e-office system improves customer service. The findings revealed that most of the respondents, 71% disagreed with the statement that the lack of adequate ICT infrastructure affects the POPSMGG to use the e-office system. Also, the study revealed that most of the respondents, 59% disagreed with the statement that the most significant barrier to using the e-office system is a lack of willingness to use the system. Generally, the overall results regarding the challenges experienced when using the e-office system showed that most respondents indicated issues such as unreliable power supply, security concerns, and technology dependency. The study recommends that the government integrate the e-office system with other government systems to facilitate data and information sharing.
Keywords
Declarations
Publisher's Note
Faculty of Social and Political Science Universitas Brawijaya remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
Alloghani, M., Baker, T., Al-Jumeily, D., Hussain, A., Mustafina, J., & Aljaaf, A. J. (2020). A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems. In Handbook of Computer Networks and Cyber Security (pp. 585–608). Springer.
Avast, & Macfee. (2018). Internet security threat report 2018.
Burk, J. A., & Prince, G. (2019). Mobile Electronic Devices In The Workplace: A Strategy to Manage the Risk. Professional Safety, 64(4), 40–41.
Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211.
Das, A., & Khan, H. U. (2016). Security behaviors of smartphone users. Information and Computer Security, 24(1), 116–134. https://doi.org/10.1108/ICS-04-2015-0018
Delcker, J., Honal, A., & Ifenthaler, D. (2017). Mobile device usage in university and workplace learning settings. AECT 2017 International Convention (Jacksonville, FL) [Conference Presentation].
Deloitte. (2017). Global mobile consumer trends Mobile continues its global reach into all aspects of consumers' lives (2nd ed.). Delloitte.
Hameed, M. A., & Gamagedara Arachchilage, N. A. (2019). On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations. ArXiv, 4, 9–21. https://doi.org/10.5815/ijcnis.2019.04.02
Hatfield, M. (2018). Cybersecurity and tax reform. Indiana Law Journal, 93(4), 1161–1209.
Internal Revenue Service. (2018). Data Privacy and Cybersecurity for Tax Professionals. United States Department of the Treasury.
Isaacs, S., Roberts, N., & Spencer-Smith, G. (2019). Learning with mobile devices: A comparison of four mobile learning pilots in Africa. South African Journal of Education, 39(3), 11–37.
Jeong, M., Lee, M., & Nagesvaran, B. (2017). Employees' use of mobile devices and their perceived outcomes in the workplace: A case of luxury hotel. International Journal of Hospitality Management, 57(8), 40–51.
Khera, V. (2018). A Study of Cybersecurity for Telecommunication Services Concerning Smartphone Users in Thailand (Master's dissertation). BIT Central Queensland University.
Koloseni, D. (2015). Security, Privacy Awareness vs. Utilisation of Social Networks and Mobile Apps for Learning: Students' Preparedness. Advances in Computer Science: An International Journal, 4(3), 111–117.
Koohang, A., Floyd, K., Rigole, N., & Paliszkiewicz, J. (2018). Security policy and data protection awareness of mobile devices in relation to employees' trusting beliefs. Online Journal of Applied Knowledge Management, 6(2), 7–22. https://doi.org/10.36965/ojakm.2018.6(2)7-22
Lacey, A., & Luff, D. (2007). Qualitative Data Analysis Authors. University of Nottingham.
Lam, S. P. (2009). Predicting intention to save water: Theory of planned behavior, response efficacy, vulnerability, and perceived efficiency of alternative solutions 1. Journal of Applied Social Psychology, 36(11), 2803–2824.
Lee, Y., & Larsen, K. R. (2009). Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems, 18(2), 177–187.
Li, L., & Lin, T. T. C. (2019). Smartphones at Work: A Qualitative Exploration of Psychological Antecedents and Impacts of Work-Related Smartphone Dependency. International Journal of Qualitative Methods, 18, 1–12. https://doi.org/10.1177/1609406918822240
Liao, R. F., Wen, H., Wu, J., Pan, F., Xu, A., Song, H., & Cao, M. (2019). Security enhancement for mobile edge computing through physical layer authentication. IEEE Access, 7, 116390–116401.
Menard, P., Bott, G. J., & Crossler, R. E. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34(4), 1203–1230.
Miles, B. M., Huberman, M. A., & Saldana, J. (2013). Qualitative data analysis: A methods sourcebook. SAGE.
Mirjafari, S., Masaba, K., Grover, T., Wang, W., Audia, P., Campbell, A. T., & D'Mello, S. K. (2019). Differentiating higher and lower job performers in the workplace using mobile sensing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(2), 1–24.
Moletsane, T., & Tsibolane, P. (2020). Mobile Information Security Awareness among Students in Higher Education : An Exploratory Study. 2020 Conference on Information Communications Technology and Society, ICTAS 2020 - Proceedings, 1–6. https://doi.org/10.1109/ICTAS47918.2020.233978
Morolong, M., Gamundani, A., & Shava, F. B. (2019). Review of sensitive data leakage through Android applications in a bring your own device (BYOD) workplace (IST-Africa) (pp. 1-8). IEEE. 2019 IST-Africa Week Conference.
O'Dea, S. (2020). Global smartphone sales to end users 2007-2021.
Oh, S., Yoo, H., Jeong, D. R., Bui, D. H., & Shin, I. (2017). Mobile plus: Multi-device mobile platform for cross-device functionality sharing. Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, 332–344.
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93–114.
Shaikh, A. (2018). Smartphones Usage at Workplace : Assessing Information Security Risks from Accessibility Perspective. IConference 2020 Proceedings.
Shillair, R. (2020). Protection Motivation Theory. The International Encyclopedia of Media Psychology. Wiley Publishing.
Thompson, N., McGill, T. J., & Wang, X. (2017). Security begins at home: determinants of home computer and mobile device security behaviour. Computers & Security, 70, 376– 391.
Wang, H. W., Kuo, S. Y., & Chen, L. B. (2021). Exploring the Relationship between Internal Information Security, Response Cost, and Security Intention in Container Shipping. Applied Sciences, 11(6), 2609.
Westcott, R., Ronan, K., Bambrick, H., & Taylor, M. (2017). Expanding protection motivation theory: Investigating an application to animal owners and emergency responders in bushfire emergencies. BMC Psychology, 5(1), 1–14. https://doi.org/10.1186/s40359-017-0182-3
Yamane, T. (1967). Elementary sampling theory. Ally and Bacon.
Yoon1, C., Hwang, J.-W., & Rhkim, K. (2012). Exploring Factors That Influence Students' Behaviors in Information Security. Journal of Information Systems Education, 23(4), 407–415. https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1174&context=jise
Zhang, L., & McDowell, W. C. (2009). Am i really at risk? Determinants of online users' intentions to use strong passwords. Journal of Internet Commerce, 8(3–4), 180–197. https://doi.org/10.1080/15332860903467508
Copyright and permissions
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Bibliographic Information
-
Submitted
27 September 2023 -
Revised
15 February 2024 -
Accepted
Not available -
Published
31 March 2024