Mitigating Cybersecurity Risks in E-Waste: A Study on Secure Disposal Practices in Tanzania’s Public Institutions

  • Athuman Mustapha Nelson Mandela African Institution of Science and Technology, Tanzania, United Republic of
  • Bonny S Mgawe Nelson Mandela African Institution of Science and Technology, Tanzania, United Republic of
  • Jaha Mvulla Electronic Government Authority, Tanzania, United Republic of
  • Anael Sam Nelson Mandela African Institution of Science and Technology, Tanzania, United Republic of
Keywords: cybersecurity, e-waste disposal, Routine Activity Theory (RAT), data leakage, institutional guardianship, Tanzania.

Abstract

The growing volume of electronic waste (e-waste) in Tanzanian public institutions poses serious cybersecurity risks, as discarded devices often contain sensitive data vulnerable to unauthorized access. This study examines these risks across 11 public institutions, involving IT staff, e-waste handlers, policymakers, and environmental officers. It applies Routine Activity Theory, a framework that explains risks as arising when cybercriminals exploit unsecured e-waste due to weak regulations. Through interviews and focus group discussions, the research identifies key vulnerabilities: data leakage from improper sanitization, regulatory gaps, and risks from informal disposal methods like auctions. These findings highlight the need for stronger oversight to prevent data breaches. The study proposes a framework that categorizes devices by risk level and integrates secure sanitization protocols, such as data wiping or destruction. Policymakers and institutions must urgently adopt these protocols to protect sensitive data and promote sustainable e-waste management in Tanzania’s public sector.

Downloads

Download data is not yet available.

References

ITU-D, Towards the harmonization of data collection: A baseline study for e-waste in East Africa. 2023.

T. Maes and F. Preston-Whyte, “E-waste it wisely: lessons from Africa,” SN Appl. Sci., vol. 4, no. 3, p. 72, 2022, doi: 10.1007/s42452-022-04962-9.

V. Forti, C. P. Balde, R. Kuehr, and G. Bel, "The Global E-waste Monitor 2020: Quantities, flows and the circular economy potential," 2020.

P. Roychowdhury, J. M. Alghazo, B. Debnath, S. Chatterjee, and O. K. M. Ouda, "Security threat analysis and prevention techniques in electronic waste," in Waste Management and Resource Efficiency: Proceedings of 6th IconSWM 2016, Singapore: Springer Singapore, 2018, pp. 853-866.

K. Kusters et al., "The impact of ignorance and bias on information security protection motivation: a case of e-waste handling," Frontiers in Psychology, vol. 1, no. 1, pp. 1021–1072, Jun. 2023, doi: 10.3390/land9040128.

N. Ameen Tarhini A., M. H. Shah Madichie N., and J. Paul Choudrie J., "Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce," Computers in Human Behavior, vol. 114, 2021, doi: 10.1016/j.chb.2020.106531.

L. Forgor, W. Brown-Acquaye, J. K. Arthur, and S. Owoo, "Security of data on e-waste equipment in Africa: The case of Ghana," in 2019 International Conference on Communications, Signal Processing and Networks (ICCSPN), IEEE, 2019, pp. 1–5, doi: 10.1109/ICCSPN46366.2019.9150166.

M. Felson and R. V. Clarke, Introduction to Crime Science, SAGE Publications Ltd., 2010.

J. Alghazo, O. K. M. Ouda, and A. El Hassan, "E-waste environmental and information security threat: GCC countries vulnerabilities," Euro-Mediterranean Journal of Environmental Integration, vol. 3, no. 1, Nov. 2018, doi: 10.1007/s41207-018-0050-4.

R. K. C. P. Baldé, T. Yamamoto, R. McDonald, E. D’Angelo, S. Althaf, G. Bel, O. Deubzer, E. Fernandez-Cubillo, V. Forti, V. Gray, S. Herat, S. Honda, G. Iattoni, D. S. Khetriwal, V. L. di Cortemiglia, Y. Lobuntsova, I. Nnorom, N. Pralat, and M. Wagner, The Global E-Waste Monitor 2024 Report, International Telecommunication Union (ITU) and United Nations Institute for Training and Research (UNITAR), Geneva/Bonn, 2024.

A. Kumar, M. Holuszko, and D. C. R. Espinosa, "E-waste: An overview on generation, collection, legislation and recycling practices," Resources, Conservation and Recycling, vol. 122, pp. 32–42, 2017, doi: 10.1016/j.resconrec.2017.01.018.

Magashi, A., and M. Schluep, "E-waste assessment Tanzania," Cleaner Production Centre of Tanzania & Empa Switzerland, 2011.

M. N. Bimir, "Revisiting e-waste management practices in selected African countries," Journal of the Air & Waste Management Association, vol. 70, no. 7, pp. 659–669, 2020, doi: 10.1080/10962247.2020.1769769.

K. Daum, J. Stoler, and R. Grant, "Toward a More Sustainable Trajectory for E-Waste Policy: A Review of a Decade of E-Waste Research in Accra, Ghana," International Journal of Environmental Research and Public Health, vol. 14, no. 2, p. 135, Jan. 2017, doi: 10.3390/ijerph14020135.

N. Kapoor, P. Sulke, and A. Badiye, "E-waste forensics: An overview," Forensic Science International: Animals and Environment, vol. 1, p. 100034, 2021, doi: 10.1016/j.fsiae.2021.100034.

P. Szewczyk, K. Sansurooah, and P. A. H. Williams, "An Australian longitudinal study into remnant data recovered from second-hand memory cards," International Journal of Information Security and Privacy, vol. 12, no. 4, pp. 82–97, Oct. 2018, doi: 10.4018/IJISP.2018100106.

R. Adams et al., "POPIA Code of Conduct for Research (with corrigendum)," South African Journal of Science, vol. 117, no. 5/6, May 2021, doi: 10.17159/sajs.2021/10933.

R. Ichikowitz and T. Hattingh, "Consumer e-waste recycling in South Africa," South African Journal of Industrial Engineering, vol. 31, no. 3, Nov. 2020, doi: 10.7166/31-3-2416.

L. Godfrey and S. Oelofse, "Historical review of waste management and recycling in South Africa," Resources, vol. 6, no. 4, p. 57, Oct. 2017, doi: 10.3390/resources6040057.

M. Eslahi, M. V. Naseri, H. Hashim, N. M. Tahir, and E. H. M. Saad, "BYOD: Current state and security challenges," in 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), IEEE, Apr. 2014, pp. 189–192, doi: 10.1109/ISCAIE.2014.7010235.

M. Alqahtani and R. Braun, "Reviewing influence of UTAUT2 factors on cyber security compliance: A literature review," Journal of Information Assurance and Cybersecurity, vol. 2021, pp. 1–15, May 2021, doi: 10.5171/2021.666987.

T. Escobar-Rodríguez and E. Carvajal-Trujillo, "Online purchasing tickets for low cost carriers: An application of the unified theory of acceptance and use of technology (UTAUT) model," Tourism Management, vol. 43, pp. 70–88, Aug. 2014, doi: 10.1016/j.tourman.2014.01.017.

M. T. Whitty, "419 – It’s just a game: Pathways to cyber-fraud criminality emanating from West Africa," 2018, doi: 10.5281/ZENODO.1467848.

Y. S. Lincoln, S. A. Lynham, and E. G. Guba, Paradigmatic Controversies, Contradictions, and Emerging Confluences Revisited, N. K. Denzin & Y. S. Lincoln, Eds., 4th ed., Sage, 2011.

C. Andrade, "The inconvenient truth about convenience and purposive samples," Indian Journal of Psychological Medicine, vol. 43, no. 1, pp. 86–88, Jan. 2021, doi: 10.1177/0253717620977000.

S. K. Sharma, S. K. Mudgal, R. Gaur, J. Chaturvedi, S. Rulaniya, and P. Sharma, "Navigating sample size estimation for qualitative research," Journal of Medical Evidence, vol. 5, no. 2, pp. 133–139, Apr. 2024, doi: 10.4103/JME.JME_59_24.

D. Byrne, "A worked example of Braun and Clarke’s approach to reflexive thematic analysis," Quality & Quantity, vol. 56, no. 3, pp. 1391–1412, Jun. 2022, doi: 10.1007/s11135-021-01182-y.

T. Maes and F. Preston-Whyte, "E-waste it wisely: Lessons from Africa," SN Applied Sciences, vol. 4, no. 3, Mar. 2022, doi: 10.1007/s42452-022-04962-9.

J. Alghazo and O. K. Ouda, "Electronic waste management and security in GCC countries: A growing challenge," in Proceedings of the ICIEM International Conference, Sousse, Tunisia, Oct. 2016, pp. 27-30.

Published
2025-06-25
Abstract views: 103 times
Download PDF: 48 times
How to Cite
Mustapha, A., Mgawe, B., Mvulla, J., & Sam, A. (2025). Mitigating Cybersecurity Risks in E-Waste: A Study on Secure Disposal Practices in Tanzania’s Public Institutions. Journal of Information Systems and Informatics, 7(2), 1354-1375. https://doi.org/10.51519/journalisi.v7i2.1100
Section
Articles