Semlambo, Adam Aloyce
(2025)
Safeguarding the Security of Information Systems through ICT Policies in Public Higher Learning Institutions in Tanzania.
Doctoral thesis, The Open University of Tanzania.
Abstract
The increasing digitalisation of academic and administrative operations in Tanzania’s public higher learning institutions (PHLIs) has heightened their vulnerability to cyber threats, underscoring the critical need for effective Information and Communication Technology (ICT) policies. Despite the government's provision of a general security framework through the e-Government Authority (eGA), existing policies lack specificity for the unique environment of PHLIs. This study addresses that gap by evaluating the effectiveness of current ICT policies in securing information systems and proposes a tailored security policy framework. Using a mixed-methods approach, the research examined a population of 2,727 respondents, with a stratified sample of 436 drawn from eight PHLIs, including administrators, IT staff, and system users. Data were analysed using descriptive statistics, Automatic Linear Modeling (ALM), and Partial Least Squares Structural Equation Modeling (PLS-SEM). Key findings revealed that demographic factors like age and education significantly influence compliance, while work experience does not. Moreover, compliance is strongly supported by a positive work environment (i.e., leadership support and resource availability) and effective policy management practices such as frequent training, regular audits, and user engagement. The study culminates in the development of a new, context-specific information systems security policy framework, and recommends that institutions review and update their ICT security policies every four years. These findings have vital implications for policymakers, institutional managers, and ICT professionals, offering a roadmap to strengthen the security posture of Tanzania's public higher education sector.
Keywords: Digitalization, operations, Tanzania’s PHLIs, cyber threats, ICT policies
Actions (login required)
 |
View Item |