• English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
  • New user? Click here to register. Have you forgotten your password?
    Research Collection
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
  • New user? Click here to register. Have you forgotten your password?
NM-AIST Repository
  1. Home
  2. Browse by Author

Browsing by Author "Mustapha,Athuman"

Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    Data Protection and Cybersecurity in E - Waste Disposal: Evidence from Tanzania’s Public Institutions
    (DRPM - UBD, 2025-06-02) Mustapha,Athuman; Mgawe,Bonny; Mvula,Jaha; Sam,Anael
    The growing volume of electronic waste (e-waste) in Tanzanian public institutions poses serious cybersecurity risks, as discarded devices often contain sensitive data vulnerable to unauthorized access. This study examines these risks across 11 public institutions, involving IT staff, e-waste handlers, policymakers, and environmental officers. It applies Routine Activity Theory, a framework that explains risks as arising when cybercriminals exploit unsecured e-waste due to weak regulations. Through interviews and focus group discussions, the research identifies key vulnerabilities: data leakage from improper sanitization,regulatory gaps, and risks from informal disposal methods like auctions. These findings highlight the need for stronger oversight to prevent data breaches. The study proposes a framework that categorizes devices by risk level and integrates secure sanitization protocols, such as data wiping or destruction. Policymakers and institutions must urgently adopt these protocols to protect sensitive data and promote sustainable e-waste management in Tanzania’s public sector
Other Links
  • Tanzania Research Repository
  • CERN Document Server
  • Confederation of Open Access Repositories
  • Directory of Open Access Books (DOAB)
  • Directory of Open Access Journals (DOAJ)
useful resources
  • Emerald Database
  • Taylor & Francis
  • EBSCO Host
  • Research4Life
  • Elsevier Journal
Contact us
  • library@nm-aist.ac.tz
  • The Nelson Mandela African institution of science and Technology, 404 Nganana, 2331 Kikwe, Arumeru P.O.BOX 447, Arusha

Nelson Mandela - AIST | Copyright © 2025

  • Privacy policy
  • End User Agreement
  • Send Feedback