https://journals.iaa.ac.tz/index.php/tji/issue/feed The Journal of Informatics 2025-11-21T09:27:27+03:00 Prof. Edison Wazoel Lubua edison.lubua@iaa.ac.tz Open Journal Systems <p><em>The Journal of Informatics</em> (TJI) is a high stature scholarly research journal in information and communication technologies (ICT). The focus of <em>The Journal of Informatics</em> is to acquaint a broad audience of readers with the innovation and development of ICT solutions and other relevant normative, empirical, and theoretical concerns of ICT development, implementation, strategy, management and policy that are distinctive to East Africa. This journal is managed by a team of researchers and practitioners interested in promoting ICT research and practices. The following are the key areas of <em>The Journal of Informatics – Programming, Databases and data warehousing, Computer security, Artificial Intelligence, Computational Mathematics, Operating Systems, Networking, ICT Systems Management, ICT4Dev, Library Science and Records Management.</em></p> https://journals.iaa.ac.tz/index.php/tji/article/view/709 Exploring Demographic Determinants of Information Systems Security Policy Compliance in Tanzanian Public Higher Learning Institution 2025-11-21T09:27:27+03:00 Adam Semlambo semlambo@gmail.com <p>Information Systems Security Policies (ISSPs) are critical for safeguarding digital infrastructures in higher education institutions. However, compliance remains inconsistent, particularly in developing contexts where demographic diversity may influence user behavior. While prior research has addressed general security challenges, limited empirical evidence exists on how specific demographic factors shape ISSP compliance in Tanzanian public universities. This study addressed that gap by examining the effects of age, education level, and work experience on compliance behavior. Guided by the Theory of Planned Behavior (TPB), a quantitative cross-sectional design was adopted, targeting a population of 2,727 employees across eight public higher learning institutions. A stratified random sample of 436 respondents was drawn, and data were analyzed using SPSS v26 through descriptive statistics, Chi-Square tests, and Automatic Linear Modeling (ALM). Results indicated that age and education were significant predictors of compliance behavior, particularly among mid-aged and higher-educated respondents, while work experience had no statistically significant effect. These findings underscore the need to tailor cybersecurity policies and training to demographic realities, emphasizing that compliance is better fostered through targeted awareness and professional development rather than institutional tenure alone. The study recommends that policymakers and institutional leaders adopt demographic-sensitive and behaviorally informed strategies to improve compliance and reduce institutional risk.</p> 2025-12-27T00:00:00+03:00 Copyright (c) 2025 The Journal of Informatics https://journals.iaa.ac.tz/index.php/tji/article/view/702 Association Between Artificial Intelligence and Academic Integrity in Higher Education in Tanzania 2025-10-10T16:43:07+03:00 Wiljames Mmari jamesdaniel0755@gmail.com <p>The study assessed the association between artificial intelligence (AI) use and academic integrity among higher education students in Tanzania by specifically examining the relationship between the frequency of AI use, the purpose of AI use, and the perceived usefulness of AI with students’ adherence to academic integrity. Data were collected from 154 bachelor's degree students from the University of Dar es Salaam and the Institute of Finance Management using a structured questionnaire and analysed using descriptive statistics and multiple regression analysis. The findings reveal that the purpose of AI use, frequency of use, and perceived usefulness are all significantly associated with academic integrity, with the purpose of use showing the strongest influence. Therefore, responsible AI use can enhance learning efficiency, while misuse may undermine integrity. It recommends that higher education institutions develop clear policies, ethical guidelines, AI literacy programmes, and faculty training to ensure AI supports learning while maintaining academic standards.</p> 2025-12-27T00:00:00+03:00 Copyright (c) 2025 The Journal of Informatics https://journals.iaa.ac.tz/index.php/tji/article/view/689 User-Centred Design and Usability of Visual Analytic Interface Media: An Empirical Study of PhD Students of Federal University of Technology, Minna, Nigeria. 2025-10-14T16:55:55+03:00 Muhammad Murtala Ibrahim murtalaibrahim@mau.edu.ng Abdulkarim Abdullahi abuaishatufarida@gmail.com Adamu Rilwanu abuaishatufarida@gmail.com <p>This paper studies the user-cantered design principles and usability of VAIs among PhD students in Nigeria. A mixed-methods approach was used to evaluate students' interactions with an existing visual analytics system (www.odvas.com), identifying the usability of the visual analytics interface and exploring the essential features of a user-centred visual analytics interface among students. Data were collected from 45 PhD students in the Department of Library and Information Science at the Federal University of Technology, Minna, in Nigeria, using questionnaires, system usability testing, and interviews. Participants expressed a desire for improved data presentation, customizable dashboards, and better interactive features, and the findings also indicated a positive correlation between Ease of Use vs. User Satisfaction: - r = 0.79, which indicates a strong positive relationship, meaning that as students find the system easier to use, their satisfaction with the system increases. The higher the perceived ease of use, the happier the users are likely to be. - p &lt; 0.01: indicates that the result is statistically significant and the likelihood of this correlation happening by chance is less than 1%. On Interactivity vs. Efficiency: - r = 0.72 indicates a positive correlation between interactivity and efficiency, as the system becomes more interactive, users' task efficiency improves. However, usability challenges such as a steep learning curve, inconsistent design, and limited customisation options were identified. Developers and designers are recommended to develop more user-friendly and efficient VAIs. LIS educators should include VAIs training to meet the needs of LIS students.</p> 2025-12-30T00:00:00+03:00 Copyright (c) 2025 The Journal of Informatics https://journals.iaa.ac.tz/index.php/tji/article/view/674 Development of an Adaptive Traffic Light Signals Control Model Based on Long Short-Term Memory (LSTM) Network and Deep Q-Network: A Case of Mwenge Intersection, Dar es Salaam City, Tanzania 2025-08-15T07:15:48+03:00 Isakwisa Gaddy Tende isakwisag@gmail.com Jimmy Godlove Mafie mafiejimmy@gmail.com Estha Frederick Kazinja esta@gmail.com <p>Urban traffic congestion is a major challenge in cities like Dar es Salaam. Traditional fixed-time traffic light systems fail to respond to real-time traffic changes, causing long waits, fuel wastage, and pollution. This study proposes a hybrid traffic light control model for Mwenge intersection using Long Short-Term Memory (LSTM) and Deep Q-Network (DQN) models. The LSTM predicts short-term traffic volumes, which regulate vehicle flow in the SIMULATION OF URBAN MOBILITY (SUMO) simulation environment. At the same time, the Deep Q-Network (DQN) adaptively adjusts signal phases based on real-time traffic states. Traffic data collected over 240 hours was used for model training and simulation. The LSTM achieved an average Test Mean Absolute Error (MAE) of 3 vehicles/min across all directions, indicating accurate traffic prediction. The Deep Q-Network (DQN) improved intersection performance with Average Wait Time (21.6s), Queue Length (9.2 vehicles), and Throughput (888 vehicles), outperforming the traditional model (38.4s, 17.1 vehicles, and 712 vehicles, respectively). Overall, the hybrid LSTM-DQN model reduced wait times by 43.8%, queue lengths by 46.2%, and increased throughput by 25%. The proposed approach offers an adaptive, cost-effective solution for optimising traffic signals in resource-constrained cities like Dar es Salaam, supporting smarter, more sustainable urban mobility. Policymakers are encouraged to adopt this model for busy intersections in Tanzania.</p> 2025-12-30T00:00:00+03:00 Copyright (c) 2025 The Journal of Informatics https://journals.iaa.ac.tz/index.php/tji/article/view/657 Assessment of Data Security Interventions Among Tour Operating Firms in Tanzania 2025-10-14T16:41:02+03:00 Maximillian Mgina mgina.mgina2014@gmail.com Kaanael Mbise kmbise@gmail.com <p>This study assesses the effectiveness of data security measures among tour operating firms in Arusha City, Tanzania, using a quantitative, cross-sectional survey research design. The targeted population included approximately 400 registered tour companies, from which a sample of 50 firms that experienced cyber-attacks or data breaches in the past five years was selected through simple random sampling. Data were analysed using descriptive statistics and inferential tests, including the Chi-square test, and presented through plots, charts, and graphs. Findings reveal high awareness (94%) of security measures such as firewalls, antivirus software, encryption techniques, and secure passwords. Significant associations were found between the effectiveness of practical interventions and factors such as data encryption methods, data backups, and the presence of dedicated security teams. In contrast, access controls and risk assessments showed no significant correlation. Challenges identified include resource constraints, technological complexity, employee training gaps, and regulatory compliance, underscoring the human and organisational aspects of cybersecurity. The study highlights the need for dynamic educational programs, continuous research, industry-specific studies, and interdisciplinary collaboration to enhance data security in the tourism sector. Implications suggest that adopting adaptive, holistic security strategies and fostering a culture of compliance can improve resilience against emerging cyber threats in tour operating firms in Arusha and similar contexts.</p> 2025-12-30T00:00:00+03:00 Copyright (c) 2025 The Journal of Informatics