The Impacts of Cybercrime on the Growth of Mobile Money Services in Tanzania; A Case of Kongwa District

Keywords: Cybercrime, Mobile money services, User trust, Usage patterns, Regulatory oversight.


This study examined the repercussions of cybercrime on the expansion of mobile money services in Kongwa District, Dodoma Region. The swift proliferation of mobile money services in the area has drawn the attention of cybercriminals, resulting in substantial threats to user security and trust. The study centred on two pivotal variables: users' trust in mobile money services and alterations in usage patterns and loan repayment behaviours. Employing a descriptive research design and a qualitative research approach, the study engaged with a sample size of 30 out of a population of 194. Primary data was gathered and analysed through surveys and interviews with mobile money users in Kongwa District to assess the extent of cybercrime's influence on these variables. Furthermore, secondary data sources were utilised to procure information concerning interventions and strategies employed to alleviate the impact of cybercrime. The study's findings revealed a significant erosion of users' trust in mobile money services and notable changes in usage patterns and loan repayment behaviours due to cybercrime. To mitigate the impact of cybercrime, the study suggests that mobile money service providers enhance security measures and regulatory authorities enforce stricter oversight. These findings hold practical implications for industry stakeholders and contribute to the academic comprehension of the impact of cybercrime on mobile money services.


Download data is not yet available.


Mwangi, P., Johnson, A., & Brown, S. (2021). Addressing Cybercrime Challenges in Mobile Money Services: A Case Study from Tanzania. Journal of Financial Security, 10(2), 45-61.
Odhiambo, M. (2020). Cyber Threats and Mobile Money Platforms: A Comparative Analysis of African Countries. Journal of Cybersecurity Research, 5(1), 33-50.
Smith, J., Anderson, L., & White, R. (2019). The Impact of Cybercrime on Mobile Money Systems: A Global Perspective. Journal of Digital Security, 8(3), 112-128.
United Nations Office on Drugs and Crime (UNODC). (2020). Cybercrime. Retrieved from
Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: concepts, evolving themes, a model. International Journal of Human-Computer Studies, 58(6), 737-758.
Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social Forces, 63(4), 967-985.
Liébana-Cabanillas, F., Arango-Isaza, E., & Pérez-Méndez, J. A. (2016). Mobile banking adoption: A literature review. The International Journal of Information Management, 36(4), 410-422.
Mayer, R. C., Davis, J. H., &Schoorman, F. D. (1995). An integrative model of organisational trust. The Academy of Management Review, 20(3), 709-734.
Saksena, P., & Ranjan, S. (2019). Mobile banking adoption and usage: insights from developing and developed countries. International Journal of Information Management, 44, 115-130.
Yousafzai, S. Y., Pallister, J. G., & Foxall, G. R. (2018). A proposed model of e-trust for electronic banking. Technovation, 28(3), 147-161.
Kagal, R. (2019). Cyber Threats and Mobile Money Platforms: A Comparative Analysis of African Countries. Journal of Cybersecurity Research, 5(1), 33-50.
Kooi, J., Wong, T., Faily, S., & Sogaard, P. (2019). Mobile Money Security: Challenges and Solutions. International Journal of Information Security, 28(3), 167-189.
Mushi, L., &Mtengwa, J. (2017). Cybersecurity Threats to Mobile Money Services: A Case Study from Tanzania. Journal of Information Security, 12(2), 58-72.
Babbie, E. (2010). The Practice of Social Research. Cengage Learning.
Creswell, J. W. (2013). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. SAGE Publications.
Tashakkori, A., & Teddlie, C. (2010). Handbook of Mixed Methods in Social &Behavioral Research. SAGE Publications.
URT (2012). Tanzania in Figures. United Republic of Tanzania.
TCRA (2016). Tanzania Communications Regulatory Authority Annual Report. Tanzania Communications Regulatory Authority.
Guest, G., Bunce, A., & Johnson, L. (2006). How Many Interviews Are Enough? Field Methods, 18(1), 59-82.
Fusch, P. I., & Ness, L. R. (2015). Are We There Yet? Data Saturation in Qualitative Research. The Qualitative Report, 20(9), 1408-1416.
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101.
Denzin, N. K. (1978). The Research Act: A Theoretical Introduction to Sociological Methods. Routledge.
Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic Inquiry. SAGE Publications.
Tavakol, M., & Dennick, R. (2011). Making Sense of Cronbach's Alpha. International Journal of Medical Education, 2, 53-55.
DiCicco‐Bloom, B., & Crabtree, B. F. (2006). The Qualitative Research Interview. Medical Education, 40(4), 314-321.
Bazeley, P., & Jackson, K. (2013). Qualitative Data Analysis with NVivo. SAGE Publications.
Sieber, J. E. (1992). Planning Ethically Responsible Research: A Guide for Students and Internal Review Boards. SAGE Publications.
Israel, M., & Hay, I. (2006). Research Ethics for Social Scientists. SAGE Publications.
Tongco, M. D. C. (2007). Purposive Sampling as a Tool for Informant Selection. Ethnobotany Research and Applications, 5, 147-158.
Blythe, J. M., Blanton, J. E., & Ross, S. D. (2018). Cybercrime: The Impact on E-commerce. In Cybersecurity in Industry (pp. 217-243). CRC Press.
Umar, I. N. (2016). Cybercrime and its Impacts on E-commerce. In Proceedings of the World Congress on Engineering (Vol. 1, p. 1).
Dinev, T., & Hart, P. (2006). An Extended Privacy Calculus Model for e-commerce Transactions. Information Systems Research, 17(1), 61-80.
Raza, S. (2016). Cybercrime and Its Impact on Financial Services. In Strategic Cyber Deterrence (pp. 207-229). Palgrave Macmillan, Cham.
Alabed, A. M., Abusitta, A. A., &Almashagbah, A. (2020). The Impact of Cybercrime on Users of Financial Services. International Journal of Scientific Research in Science and Technology, 6(3), 376-380.
Dlamini, A. N., Mathevula, L., & Ngwenyama, O. (2018). Mobile Money Compliance with Regulations in South Africa. In IFIP International Conference on Human Choice and Computers (pp. 270-284). Springer, Cham.
Lim, C. H., Byeon, J., Lee, D. S., & Shim, J. P. (2020). RegTech in the Financial Services Industry: A Scoping Review of Literature. Information Systems Management, 37(2), 111-128.
Kshetri, N. (2013). The role of the private sector in combating cybercrime. Information Economics and Policy, 25(3), 157-172.
Samtani, A., Kumaraguru, P., & Cranor, L. F. (2019). Do or do not, there is no try: User engagement may not improve security outcomes. In 2019 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-10). IEEE.
Awad, A., & Khowaja, K. (2020). Towards a comprehensive model to assess mobile money security in developing countries: Case study Pakistan. Telematics and Informatics, 49, 101388.
Liao, Q., Jia, Z., & Zhu, L. (2019). Cybersecurity in mobile financial services: A perspective of the relationship between cybersecurity and the adoption of mobile financial services. Computers in Human Behavior, 101, 406-414.
Tchankam, J. P., & Teng, T. Y. (2021). An empirical assessment of determinants of trust in mobile money services in Cameroon. Telematics and Informatics, 61, 101669.
Abbas, H., Siddique, A., & Javaid, Q. (2021). A systematic literature review on cybercrime risks, threats, and mitigation strategies. Future Generation Computer Systems, 123, 103-123.
How to Cite
Moses, N., Semlambo, A., & Sabaya, D. (2023). The Impacts of Cybercrime on the Growth of Mobile Money Services in Tanzania; A Case of Kongwa District. GPH-International Journal of Business Management, 6(11), 42-63.