0% found this document useful (0 votes)
33 views24 pages

Loveness Kaaya Full Proposal 12

This research proposal by Loveness Kaanaeli Kaaya investigates the impact of fraud in e-banking systems in Tanzania, highlighting the rise of digital financial services and the associated risks of fraud. The study aims to assess the economic, social, and operational consequences of e-banking fraud, while identifying regulatory gaps and proposing reforms to enhance consumer protection. The research is significant for improving legal frameworks and fostering trust in e-banking, which is crucial for financial inclusion and economic stability in Tanzania.

Uploaded by

Steven Mapima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views24 pages

Loveness Kaaya Full Proposal 12

This research proposal by Loveness Kaanaeli Kaaya investigates the impact of fraud in e-banking systems in Tanzania, highlighting the rise of digital financial services and the associated risks of fraud. The study aims to assess the economic, social, and operational consequences of e-banking fraud, while identifying regulatory gaps and proposing reforms to enhance consumer protection. The research is significant for improving legal frameworks and fostering trust in e-banking, which is crucial for financial inclusion and economic stability in Tanzania.

Uploaded by

Steven Mapima
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

MOSHI CO-OPERATIVE UNVERSITY

THE IMPACT OF FRAUD IN E-BANKING SYSTEMS: A CASE STUDY OF


TANZANIA

RESEARCH PROPOSAL

BY

LOVENESS KAANAELI KAAYA

MoCU/LL.B/1466/2021

Supervisor Name Ms IRENRE S. BISEKO

Bachelor of law

March, 2025
i

MOSHI CO-OPERATIVE UNVERSITY

THE IMPACT OF FRAUD IN E-BANKING SYSTEMS: A CASE STUDY OF


TANZANIA

RESEARCH PROPOSAL

BY

LOVENESS KAANAELI KAAYA

MoCU/LL.B/1466/2021

Supervisor Name Ms IRENRE S. BISEKO

A research Proposal submitted in partial fulfilment for the award of degree of


Bachelor of Law of Moshi Co-operative University

March, 2025
ii

DECLARATION AND COPYRIGHT

I, Loveness Kaanaeli Kaaya declare that, this research proposal is my own original work
and that it has not been presented and will not be presented to any other university for a
similar or any other degree award.

Signature ________________________Date: _______________________

©2025

This research proposal is copyright material protected under Berne Convention, The
Copyright and Neighboring Rights Act, 1999 and other international enactments, in that
behalf, on Intellectual property. It may not be reproduced by any means, in full or in
part, Except for short extracts in fair dealing for research or private study, critical
Scholarly review or discourse with an acknowledgment, with written permission of the
directorate of studies, on behalf of both the author and Moshi Co-operative University.
iii

CERTIFICATION

The undersigned certifies that he has read and hereby recommend for acceptance by
Moshi Cooperative University, a research proposal entitled: “The Impact of Fraud In E-
Banking Systems: A Case Study of Tanzania”, in partial fulfilment of the requirements
for the award of of Bachelor of Laws (LLB).

_____________________________________

(Supervisor’s name)

____________________________________

Signature

Date: _____________________________
iv

TABLE OF CONTENTS

DECLARATION AND COPYRIGHT..........................................................................ii

CERTIFICATION..........................................................................................................iii

LIST OF ABREVIATION.............................................................................................vi

1.0 INTRODUCTION.....................................................................................................1

1.1 Background of the study..............................................................................................1

1.2 Statement of the Problem............................................................................................2

1.3 Objectives....................................................................................................................3

1.3.1 General Objective.....................................................................................................3

1.3.2 Specific Objectives...................................................................................................3

1.4 Research Question.......................................................................................................3

1.5 Significance of the study.............................................................................................3

16 LITERATURE REVIEWS........................................................................................4

1.7 RESEARCH METHODOLOGY.............................................................................8

1.7.1 Research design........................................................................................................8

1.8 Study area....................................................................................................................8

1.9 Sample and Sampling Techniques...............................................................................8

1.9.1 Sample Size..............................................................................................................8

1.9.3 Sampling Techniques................................................................................................9

1.10 Data and Data Collection...........................................................................................9

1.10 1 Types of data...........................................................................................................9

1.10.2 Interview.................................................................................................................9

1.10 3 Questionnaire..........................................................................................................9

1.10.4 Documentary review..............................................................................................9


v

1.11. Data Analysis..........................................................................................................10

REFERENCE.................................................................................................................11

APPENDICES................................................................................................................13

APPENDENCE II..........................................................................................................18
vi

LIST OF ABREVIATION

B.O.T Bank of Tanzania

ATM Automated Teller Machines


1

1.0 INTRODUCTION

1.1 Background of the study

The rise of electronic banking (e-banking) systems has revolutionized financial services
globally, providing users with increased accessibility, convenience, and efficiency. E-
banking refers to the use of digital platforms such as online banking, mobile banking,
and automated teller machines (ATMs) to conduct financial transactions. As a result, e-
banking has become a critical component of the financial sector in many countries,
including Tanzania. Bank of Tanzania (BoT), Annual Report 20221 in recent years,
Tanzania has experienced a rapid expansion in the adoption of mobile and online
banking services, driven by increased internet access and mobile phone penetration. The
government of Tanzania has also encouraged digital financial services as part of its
efforts to build a cashless economy and enhance financial inclusion, particularly in rural
areas where traditional banking infrastructure is limited.

However, alongside these advancements, the growth of e-banking systems has


introduced new risks, with Electronic Money Regulations (2015)2 fraud being one of the
most significant challenges. E-banking fraud involves a wide range of fraudulent
activities, such as identity theft, phishing, unauthorized access to accounts, and
cyberattacks on banking infrastructure. These frauds not only harm individual
customers but also undermine the integrity and stability of financial institutions and
erode public confidence in digital banking systems. As the use of e-banking increases,
so does the sophistication of fraudsters, making it difficult for institutions and
consumers to safeguard their financial assets.

In Tanzania, the increasing cases of e-banking fraud have raised alarms within the
banking sector and among regulatory authorities. While various legal frameworks and
regulatory measures have been established to address financial crimes in the digital
space, gaps remain in the implementation and enforcement of these measures. The Bank
of Tanzania (BoT) and the Tanzania Communications Regulatory Authority (TCRA) 3

1
Bank of Tanzania (BoT), Annual Report 2022, which outlines the regulatory framework and the
challenges in regulating the digital financial services sector
2
The Bank of Tanzania has implemented regulations such as the Electronic Money Regulations (2015),
which seek to address security issues in mobile and online banking platforms.
3
Tanzania Communications Regulatory Authority (TCRA), Cybersecurity in Tanzania: Challenges and
Regulatory Responses, (Dar es Salaam: TCRA, 2020).
2

have taken steps to strengthen the regulatory environment; however, there is still a
pressing need for a more robust legal and regulatory framework that can effectively
combat fraud in the e-banking sector.

1.2 Statement of the Problem

The adoption of e-banking in Tanzania has transformed financial services, enabling


millions, especially those without traditional banking access, to use mobile money and
online platforms. This aligns with Tanzania’s Vision 2025, promoting technological
advancement and economic inclusion. However, a sharp rise in e-banking fraud
threatens this progress. The Bank of Tanzania (BoT) reported an 84% increase in digital
fraud losses in late 20234, underscoring the urgency of the issue. Fraud, including
phishing, identity theft, and mobile money scams, exposes a gap between e-banking
growth and protective mechanisms, questioning its impact on Tanzania’s financial
ecosystem. Economically, fraud imposes severe costs: banks face losses and rising
security expenses, while low-income customers suffer devastating setbacks, straining
the sector and undermining the cashless economy goal 5. This threatens economic
stability by deterring digital infrastructure investment and slowing financial inclusion, a
key poverty reduction driver.

Socially, fraud erodes trust in digital systems, critical in a nation with over 80% mobile
penetration but fragile confidence among rural and less-educated groups. Victims,
unable to recover losses due to unclear accountability, may abandon e-banking, limiting
opportunities especially for women and rural users of platforms like M-Pesa reversing
inclusion gains and fostering insecurity that hampers digital modernization.
Operationally, sophisticated fraud reveals vulnerabilities in Tanzania’s frameworks. The
Cybercrimes Act (United Republic of Tanzania, 2015, Act No. 14) 6 address cyber
threats, but ambiguous liability, weak enforcement, and gaps like no data protection law
or coverage for SIM-swapping limit their impact. Tanzania’s non-signatory status to the
Budapest Convention on Cybercrime (2001)7 restricts cooperation against transnational
4
Bank of Tanzania. (2024, March 5). Circular on digital fraud losses in commercial banks, financial
institutions, and payment system service providers. Dar es Salaam, Tanzania: Bank of Tanzania,
Directorate of Financial Sector Supervision.
5
Bank of Tanzania. (2024). National Financial Inclusion Framework 2023–2028: Implementation update
2024. Dar es Salaam, Tanzania: Bank of Tanzania, National Council for Financial Inclusion.
6
United Republic of Tanzania. (2015). Act No. 14 (Cybercrimes Act).
7
Council of Europe. (2001). Convention on Cybercrime (Budapest Convention). ETS No. 185.
Strasbourg, France: Council of Europe.
3

fraud, a growing issue in East Africa’s borderless digital landscape. Despite BoT efforts
like two-factor authentication, losses persist, signalling inadequate strategies. This study
will analyse fraud’s economic, social, and operational impacts, assess why current
measures fail, and propose reforms to protect Tanzania’s e-banking future.

1.3 Objectives

1.3.1 General Objective

To investigate the overall impact of fraud on e-banking systems in Tanzania

1.3.2 Specific Objectives

i. To assess the economic consequences of e-banking fraud in Tanzania


ii. To examine the social effects of e-banking fraud on Tanzanian users
iii. To evaluate the operational vulnerabilities and regulatory gaps in Tanzania’s e-
banking systems

1.4 Research Question

i. What are the economic consequences of e-banking fraud in Tanzania?


ii. What are the social effects of e-banking fraud on Tanzanian users?
iii. What are the operational vulnerabilities and regulatory gaps in Tanzania’s e-
banking systems?

1.5 Significance of the study

The study will critically asses on impact of fraud in e-banking for the purpose of
ensuring full legal protection of customary right in the country so to have equal status
like the granted rights. So, it will expand understanding of the society on the challenges
facing them and how to overcome them, also it will contribute to increase knowledge to
academician on issues relating to customary right of occupancy

The importance of this research is in its ability to help create better legal and regulatory
systems for e-banking in Tanzania. As more people use digital financial services,
keeping e-banking systems secure is crucial for building public trust and supporting the
growth of the financial sector. This study aims to shed light on the legal and regulatory
issues related to e-banking fraud, helping policymakers, financial institutions, and other
stakeholders understand what needs to be done to improve consumer and financial
protection.
4

16 LITERATURE REVIEWS

Adebayo, F. (2021)8. Adebayo’s work surveys cybersecurity threats in Africa’s shift to


cashless economies, noting Tanzania’s high mobile penetration as a double-edged
sword. The study’s focus on phishing and malware aligns with research’s fraud
typology, but it critiques weak regulatory enforcement a point which extends with
Tanzania’s Cybercrimes Act analysis. Adebayo’s omission of transnational fraud
cooperation, unlike the study’s Budapest Convention reference, highlights her study’s
unique operational lens, though his macroeconomic insights could bolster her economic
arguments. This aligns with the study’s operational vulnerabilities as it critiques weak
regulatory enforcement and the lack of cooperation in transnational fraud, which ties
directly to Tanzania’s regulatory gaps and challenges in tackling cross-border fraud, as it
is also noted in the study

Chachage, B., & Mushi, R. (2021)9. This review critiques Tanzania’s Cybercrimes Act
(2015), echoing concerns about ambiguous liability and enforcement gaps. The authors
argue that the lack of a data protection law exacerbates e-banking fraud, a point
leverages to highlight operational vulnerabilities. While Chachage and Mushi focus on
legal theory, the research applied case study approach promises practical insights,
potentially addressing their call for reform recommendations. This review also ties into
the study's operational vulnerabilities. The lack of a data protection law is directly
linked to gaps in fraud prevention and aligns with the study’s focus on Tanzania's weak
legal and regulatory frameworks

Hassan, M., & Yusuf, K. (2023)10 This comparative study critiques cybercrime laws in
developing nations, including Tanzania’s Cybercrimes Act (2015). The authors highlight
enforcement gaps and the absence of data protection, echoing the study’s operational
concerns. Their global scope contrasts with her Tanzania-specific focus, suggesting she
could contextualize her findings internationally. Their global critique of developing
nations’ cybercrime laws, including Tanzania’s, highlights enforcement gaps and the

8
Adebayo, F. (2021). “Cybersecurity Challenges in Africa’s Cashless Transition.” International Journal
of Cybersecurity.
9
Chachage, B., & Mushi, R. (2021). “Legal Frameworks for Cybercrime in Tanzania: A Critical
Review.” Tanzania Law Review.
10
Hassan, M., & Yusuf, K. (2023). “Cybercrime Legislation and E-Banking Security in Developing
Nations.” Global Cybersecurity Journal.
5

absence of data protection, which matches the study’s operational vulnerabilities. Their
broader international scope contrasts with the study’s Tanzania-specific focus,
suggesting a deeper global comparison to enhance the analysis.

Kimaro, E., & Salum, J. (2022)11 This paper explores cross-border cybercrime,
critiquing Tanzania’s non-signatory status to the Budapest Convention a key point in the
research’s operational critique. The authors argue that regional cooperation lags,
supporting the study’s view on transnational fraud challenges. Their policy focus
complements her reform agenda, though she could deepen her analysis with specific
East African fraud case studies. This review provides a focus on cross-border
cybercrime directly supports the study’s critique of Tanzania's non-signatory status to
the Budapest Convention, which is vital in addressing transnational fraud. This
connection strengthens the operational critique of Tanzania’s lack of international
cooperation in combating fraud.

Kamau, J. (2020)12 Kamau’s study explores the rapid expansion of digital financial
services across East Africa, including Tanzania, emphasizing the rise of mobile money
platforms like M-Pesa. The author identifies fraud as a significant barrier to financial
inclusion, aligning with the study focus on economic and social impacts. While Kamau
highlights phishing and identity theft as prevalent fraud types, the study lacks specificity
on Tanzania’s legal frameworks, such as the Cybercrimes Act (2015). This gap
underscores this study’s contribution in addressing operational weaknesses, though
Kamau’s broader regional data could enrich her economic loss estimates. Kamau’s study
on the rise of mobile money platforms in East Africa, including Tanzania, highlights
fraud as a barrier to financial inclusion (social impact). This directly supports the
study’s social impact concerns and raises issues about trust and fraud's effect on
financial inclusion, particularly in rural areas, which are a focus of the research.

Mwangi, P., & Otieno, R. (2020)13 This comparative analysis examines how fraud
undermines trust in mobile money systems in Kenya and Tanzania. The authors report a

11
Kimaro, E., & Salum, J. (2022). “Transnational Cybercrime and Regional Cooperation in East Africa.”
African Security Studies.
12
Kamau, J. (2020). “Digital Financial Services and Fraud Risks in East Africa: A Regional
Perspective.” Journal of African Economies.
13
Mwangi, P., & Otieno, R. (2020). “Mobile Money Fraud and User Trust in Kenya and Tanzania.”
African Journal of Information Systems.
6

correlation between fraud incidents and reduced adoption among rural users, mirroring
the study’s social impact concerns. However, their reliance on survey data overlooks
operational vulnerabilities like SIM-swapping, which the research flags as a Tanzanian-
specific issue. Their findings support her argument on trust erosion but suggest she
could strengthen her study with quantitative user perception data. this review provides
an examination of fraud in mobile money systems, particularly in Tanzania, supports the
study’s social impact concerns regarding trust erosion and financial inclusion,
specifically in rural areas. The study’s focus on SIM-swapping is mentioned in the
research as a key vulnerability, underscoring the operational issues.

Njoroge, L. (2021)14 Njoroge investigates how e-banking fraud affects financial


stability in emerging markets, including Tanzania. The study quantifies bank losses and
security costs, supporting the research economic impact claims. However, it overlooks
social dimensions like trust and inclusion, which the study emphasizes. Njoroge’s
econometric approach could inspire the research study to model fraud’s fiscal toll,
though her qualitative focus on Tanzania’s legal gaps offers a complementary
perspective. Njoroge’s focus on e-banking fraud’s effects on financial stability supports
the study’s economic consequences, particularly in quantifying bank losses and security
costs. The lack of a social focus in Njoroge’s study is addressed by the current
research’s broader focus on the social impact of fraud.

Omondi, T. (2022)15 Omondi evaluates fraud prevention measures like two-factor


authentication in East Africa, noting their limited success in Tanzania consistent with
the study’s observation of persistent losses despite BoT efforts. The study’s emphasis on
technical solutions contrasts with the research’s broader socio-economic scope,
suggesting she could integrate operational data on strategy efficacy to strengthen her
critique of current measures. The evaluation of fraud prevention measures like two-
factor authentication, noting their limited success in Tanzania, which aligns with the
study’s critique of current fraud prevention measures. The operational limitations
pointed out by Omondi reinforce the study’s focus on operational vulnerabilities and the
effectiveness of regulatory measures.

14
Njoroge, L. (2021). “Economic Impacts of E-Banking Fraud in Emerging Markets.” Emerging Markets
Review.
15
Omondi, T. (2022). “Fraud Mitigation Strategies in Mobile Banking: Lessons from East Africa.”
Journal of Financial Technology.
7

Otieno, P., & Kilonzo, M. (2024)16. This study identifies SIM-swapping and weak
authentication as key vulnerabilities in East African e-banking, directly supporting the
study’s operational critique. The authors advocate for stronger frameworks, aligning
with her reform goals. Their technical focus suggests Research could enhance her study
with detailed vulnerability assessments. This study focuses on SIM-swapping and
authentication weaknesses in East African e-banking, directly supporting the study’s
operational vulnerabilities and providing a solid basis for the need for stronger legal
frameworks.

Patel, S. (2023)17. Patel’s study links e-banking growth to financial inclusion in Sub-
Saharan Africa, identifying fraud as a primary risk. The Tanzanian case supports the
study’s economic and social arguments, particularly for women and rural users. Patel’s
statistical approach contrasts with the study’s qualitative intent, suggesting a mixed-
method design could enhance her impact assessment. Patel’s analysis connects e-
banking growth to financial inclusion in Sub-Saharan Africa, especially highlighting
fraud risks to women and rural users in Tanzania. This ties into the study’s economic
and social effects reinforcing the need for stronger protective measures to foster
financial inclusion

Suleiman, H. (2022)18. Suleiman examines how digital fraud disproportionately affects


Tanzania’s rural and low-income populations, reinforcing the study’s social impact
thesis. The study’s qualitative narratives of victim experiences align with her focus on
trust erosion and exclusion. However, it lacks operational or legal analysis, areas where
the proposal excels, offering a more holistic framework. Suleiman’s study on how
digital fraud disproportionately affects rural and low-income populations in Tanzania
strengthens the study’s argument on social exclusion and trust erosion. This work
complements the study’s findings about fraud’s damaging impact on rural users and
underscores the need for better protection mechanisms

16
Otieno, P., & Kilonzo, M. (2024). “Operational Vulnerabilities in East Africa’s E-Banking Systems.”
Technology and Development.
17
Patel, S. (2023). “E-Banking and Financial Inclusion: Opportunities and Risks in Sub-Saharan Africa.”
Journal of Development Economics.
18
Suleiman, H. (2022). “Social Implications of Digital Fraud in Tanzania’s Financial Sector.” East
African Journal of Social Sciences.
8

1.7 RESEARCH METHODOLOGY

Under this area the researcher addresses the methods and tools proposed to be used
when conducting the study, basing researcher present the justification for the methods
and tools so the respondent is selected. It includes research design, study area,
population, sample and sampling strategies, data and data collection method as well as
data analysis.

1.7.1 Research design.

The study is to be conducted by involving doctrinal based research. The Documentary


review work involves the reading of materials both primary and secondary literature.

1.8 Study area.

This research is designed basing on the case study which is country called Tanzania.
This design helped the to obtain the relevant data with regard to the research problem.

1.9 Sample and Sampling Techniques.

1.9.1 Sample Size.

The sample survey includes (25) individuals selecting during the data collection process
Such individuals would be classified various groups as (10) married couples of which
would be wife's and the other half would be husbands so as to get different views on
both sides, (5) advocates, and also (10) single people or individuals considered to be
unmarried of both genders, enabling the researcher to obtain the information needed to
support this research. The sample unity of this study of obtain of eighteen years old (18)
random selected respondent who will be several results of the study. Also, the study
need respondent who are experience

1.9.3 Sampling Techniques.

This research will involve specific sampling technique which will involve the
respondents whom are chosen specifically on the merit of the information they will
adduce with regard to the problem under this research. This technique is based on
probability or random sampling.
9

1.10 Data and Data Collection

1.10 1 Types of data

Researcher in the study will use primary data and secondary data. The primary data are
the first-hand information which will be obtained by the researcher from the field direct
from respondents, and another type is Secondary data In Secondary data the research
will include second hand information that has been written by different authors and
researchers include documentary review books, articles, journals from different authors,
and Reports.

1.10.2 Interview

Interviews will be conducted in the form of interaction between the researcher and the
respective respondents on the various questions that raised some issues relevant to the
problem under investigation. For the sake of convenience, the research will use both
structured and unstructured interviews. The use of interviews in data collection in the
field will assist the researcher in obtaining relevant data from respondents at a very
advantageous and efficient rate

1.10 3 Questionnaire.

A questionnaire will be in written list of questions prepared as a series form by a


researcher on a specific legal issue and send to respondents. The questionnaire can be
closed or opened. The researcher will collect data by basking questions, which will be
answered by the respondents (married couples)

1.10.4 Documentary review

Library research will be employed as a methodology for the collection of secondary


data. The library research will be conducted through gathering relevant information and
data from different sources such as books, laws journals, law reports, magazines,
website sources.

1.11. Data Analysis.

The researcher will manually summarize various data from the interview schedules, will
taking care not to distort meaning, and then the researcher analyses the processed data,
and the numbers are summarized with a descriptive percentage to help evaluate the
effectiveness of alternatives conflict resolution methods
10

REFERENCE

STATUTES

Bank of Tanzania. (2024). Financial Stability Report.

Bank of Tanzania. (2024). National Financial Inclusion Framework.

Budapest Convention on Cybercrime. (2001).

United Republic of Tanzania. (2015). Act No. 14 (Cybercrimes Act).

JOURNALS AND ARTICLES

Adebayo, F. (2021). “Cybersecurity Challenges in Africa’s Cashless Transition.”


International Journal of Cybersecurity, 5(2), 89–110.

Chachage, B., & Mushi, R. (2021). “Legal Frameworks for Cybercrime in Tanzania: A
Critical Review.” Tanzania Law Review, 15(1), 22–41.

Hassan, M., & Yusuf, K. (2023). “Cybercrime Legislation and E-Banking Security in
Developing Nations.” Global Cybersecurity Journal, 7(1), 33–50.

Kamau, J. (2020). “Digital Financial Services and Fraud Risks in East Africa: A
Regional Perspective.” Journal of African Economies, 29(3), 245–267.

Kimaro, E., & Salum, J. (2022). “Transnational Cybercrime and Regional Cooperation
in East Africa.” African Security Studies, 11(4), 201–223.

Mwangi, P., & Otieno, R. (2020). “Mobile Money Fraud and User Trust in Kenya and
Tanzania.” African Journal of Information Systems, 12(4), 301–320.

Njoroge, L. (2021). “Economic Impacts of E-Banking Fraud in Emerging Markets.”


Emerging Markets Review, 47, 100789.

Omondi, T. (2022). “Fraud Mitigation Strategies in Mobile Banking: Lessons from East
Africa.” Journal of Financial Technology, 8(3), 134–152.

Otieno, P., & Kilonzo, M. (2024). “Operational Vulnerabilities in East Africa’s E-


Banking Systems.” Technology and Development, 16(3), 123–140.

Patel, S. (2023). “E-Banking and Financial Inclusion: Opportunities and Risks in Sub-
Saharan Africa.” Journal of Development Economics, 160, 102934.
11

Suleiman, H. (2022). “Social Implications of Digital Fraud in Tanzania’s Financial


Sector.” East African Journal of Social Sciences, 9(2), 67–85.
12

APPENDICES

Appendix I Questionnaire

Dear respondents,

My name is Loveness Kaanaeli Kaaya am pursuing a Bachelor of Laws of Moshi Co-


operative University. I am required to undertake empirical research on “The Impact of
Fraud in E-Banking Systems: A Case Study of Tanzania”. I am kindly requesting you to
fill in the required information for fulfillment of the objective stated. Your response will
be highly appreciated. All information will remain confidential and will be used only
for academic purposes only.

SECTION A demographic Characteristics of the respondent

Please tick [√] only one option appropriate for your answer providing brief answer
where Necessary.

To Public Question

1. Age Group

(a) 18-35 years ( )

(b) 36-45 years ( )

(c) 46-50 years ( )

(d) 51 and above years ( )

2. Marital Status

(a) Single ( )

(b) Married ( )

(c) Separated ( )

3. Educational level.

(a) Primary Education ( )

(b) Secondary Education ( )

(c) College ( )
13

(d) University ( )

SECTION B: The economic consequences of e-banking fraud in Tanzania

4. Has e-banking fraud led to a significant financial loss for your organization in the
past year?

Yes ( )
No ( )

If Yes / No

-----------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------
---------------------

5. Do you believe that e-banking fraud has increased operational costs for financial
institutions in Tanzania?

Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------

6. Has e-banking fraud negatively affected customer trust in financial institutions in


Tanzania?

Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------
14

7. In your opinion, has e-banking fraud led to increased security spending for
banks and financial institutions in Tanzania?
Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------
SECTION C: The social effects of e-banking fraud on Tanzanian users
8. Has e-banking fraud negatively impacted your willingness to use digital banking
services in Tanzania?
Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------
9. Do you think e-banking fraud has contributed to a decrease in the adoption of
digital banking among Tanzanian users?
Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------
10. Has the experience of e-banking fraud affected your social interactions or
relationships with others in your community?
Yes ( )
No ( )
If Yes / No
15

-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------
11. Do you believe that current regulations in Tanzania are sufficient to address e-
banking fraud risks?
Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------
SECTION D: The operational vulnerabilities and regulatory gaps in
Tanzania’s e-banking systems
12. In your opinion, do Tanzanian banks have adequate security measures in place
to protect users from e-banking fraud?
Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------

13. Have you observed any significant operational vulnerabilities in the e-banking
systems of Tanzanian financial institutions?
Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------
16

14. Do you think that the regulatory framework in Tanzania needs to be updated to
better address emerging e-banking threats?
Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------
15. Have regulatory bodies in Tanzania taken sufficient actions to close the
operational gaps in e-banking security and fraud prevention?
Yes ( )
No ( )
If Yes / No
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------
------------------
17

APPENDENCE II

Interview question
i. Can you describe your experience with e-banking systems in Tanzania?
ii. How often do you encounter or hear about cases of e-banking fraud in Tanzania?
iii. In your opinion, how has e-banking fraud affected the trust of Tanzanian
customers in digital banking services?
iv. What do you think are the major causes of e-banking fraud in Tanzania?
v. How have financial institutions in Tanzania responded to the challenges of e-
banking fraud?
vi. Have you noticed any changes in user behaviours due to the rise of e-banking
fraud in Tanzania?

You might also like