Assessing Cybersecurity Threats To Tanzania's Government E-Payment Systems And Their Impact On National Security

Authors

  • Adam Semlambo
  • Nasania Stanslaus Shalua Institute of Accountancy Arusha (IAA)

DOI:

https://doi.org/10.59645/tji.v4i1.184

Keywords:

Cyber threats, Government e-payment systems, National security, Cyber literacy, Digital infrastructure

Abstract

This research delves into the cybersecurity ecosystem of Tanzania, concentrating on the threats and vulnerabilities inherent in the government's electronic payment gateway and their ramifications for national security. Utilising a descriptive research methodology, the study surveyed 1,420 officials from different departments within the Tanzania Ministry of Finance and Planning. It narrowed them down to a sample of 200 through purposive and convenience sampling techniques. Data collection was executed via structured questionnaires and in-depth interviews, with analysis conducted using both quantitative (SPSS for inferential statistics) and qualitative (content analysis) methodologies. The findings highlight a pronounced deficiency in cyber literacy among staff, rendering them more vulnerable to cyber-attacks and resulting in significant financial losses. The research identifies critical weaknesses within the government's e-payment systems that pose substantial risks to national security. The study advocates for a multifaceted strategy to address these issues, including incorporating cyber literacy into educational curricula, enhancing national cybercrime management, and reinforcing government cyber networks with advanced security technologies. Furthermore, the study underscores the urgent need for a comprehensive cybersecurity policy. Implementing such a policy is pivotal to ensuring a secure digital environment that supports national security and economic stability, forming the cornerstone of the proposed multifaceted strategy.

References

Aguboshim, F. C., Ezeife, J. E., & Obiokafor, I. N. (2022). Managing organisation information security systems, conflicts, and integrity for sustainable Africa transformation. World Journal of Advanced Research and Reviews. Retrieved from https://api.semanticscholar.org/CorpusID:248728381

Alotaibi, F., Furnell, S., Stengel, I., & Papadaki, M. (2016). A Review of Using Gaming Technology for Cyber-Security Awareness. International Journal for Information Security Research (IJISR), 6(2), 160-166. Retrieved from https://infonomics-society.org/wp- content/uploads/ijisr/published- papers/volume-6-2016/A-Review-of-Using-Gaming- Technology-for-Cyber-Security- Awareness.pdf

Alsowail, R., & Al-Shehari, T. (2021). A Multi-Tiered Framework for Insider Threat Prevention. Electronics, 10. Retrieved from https://api.semanticscholar.org/CorpusID:234919982

Balińska, A. (2020, March 22). Data collection methods in rural tourism in the eyes of respondents. Studia Periegetica, 29(1), 115–126. https://doi.org/10.5604/01.3001.0014.1234

Bellini, R., Lee, K., Brown, M. A., Shaffer, J., Bhalerao, R., & Ristenpart, T. (2023). The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence. USENIX Security Symposium. Retrieved from https://api.semanticscholar.org/CorpusID:260777707

Brenner, W. (2010). Cybercrime: Criminal Threats from Cyber Space. Santa Barbara, California: Greenwood Publishing Group, p. 38.

Bregant, J., & Bregant, R. (2014). Cybercrime and Computer Crime. Law, Computer Science. Retrieved from https://api.semanticscholar.org/CorpusID:152608546

Creswell, J. W. (2012). Educational Research: Planning, Conducting and Evaluating Quantitative and Qualitative Research. Upper Saddle River, NJ: Prentice Hall.

Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed approaches (3rd Ed). London: Sage Publications

Fripp, C. (2014). This is why Africa is a cybercrime target. [Online] Available at: http://www.htxt.co.za/2014/11/12/this-is-why-africa-is-a-cybercrime-target/ [Accessed 30 November 2014].

Goswami, P. K. (2017). Cyber crime: the legislative enactments and the interpretation of the judiciary with special reference to India. The Clarion- International Multidisciplinary Journal, 6, 91-94.

Gordon, S. (1995). Technologically enabled crime: Shifting paradigms for the Year 2000. Comput. Secur, 14, 391-402. Retrieved from https://api.semanticscholar.org/CorpusID:46059284

Griffiths, J.L. (2016). Cyber Security as an Emerging Challenge to South African National Security.

Grasmick, H. G., & Bryjak, G. J. (1980). The Deterrent Effect of Perceived Severity of Punishment. Social Forces, 59, 471-491.

Hobbes T (1651) Leviathan: Or the Matter, Forme and Power of a Commonwealth Ecclasiasticall and Civil. Menston: Scolar Press.

Hussain, W. S., & Ibrahim, N. J. (2019). A Survey of Cybercrimes, Investigations and Penal Laws Imposed on the Criminals. Law. Retrieved from https://api.semanticscholar.org/CorpusID:212607514

Jeandesboz, B. H., Ragazzi, F., Simon, S., & Mitsilegas, V. (2015). The law enforcement challenges of cybercrime: are we really playing catch-up? Law, Computer Science. Retrieved from https://api.semanticscholar.org/CorpusID:167905993

Keinonen, M. (2023). The Concept of Comprehensive Security as a Tool for Cyber Deterrence. European Conference on Cyber Warfare and Security. Retrieved from https://api.semanticscholar.org/CorpusID:259292173

Keller, J. P. (2017, July). Patient safety implications with the rapid adoption of IT-based health technologies. Digital Medicine, 3(3), 115–119. https://doi.org/10.4103/digm.digm_20_17

Kebalepile, M. M., Dzikiti, L. N., & Voyi, K. (2024, February 28). I am using Diverse Data Sources to Impute Missing Air Quality Data Collected in a Resource-Limited Setting. Atmosphere, 15(3), 303. https://doi.org/10.3390/atmos15030303

Kothari, C. K. (2014). Research methodology; methods and techniques, second revised edition. New Delhi: New age International (P) Limited

Kothari, C.R. (2019). Research Methodology: Methods and Techniques. 4th Edition, New Age International Publishers, New Delhi.

Krassowski, K. (2018). A concept of information and education of a human as tool of prevention of cyberspace threats. Journal of Modern Science. Retrieved from https://api.semanticscholar.org/CorpusID:158405180

Kshetri, N. (2017). Global Cybersecurity: Issues and Concerns [Editorial]. Computer Science, Law. Retrieved from https://api.semanticscholar.org/CorpusID:117302682

Lubua, E. W., Semlambo, A. A., & Mkude, C. G. (2022). Factors Affecting the Security of Information Systems in Africa: A Literature Review. University of Dar es Salaam Library Journal, 17(2), 94- 114.

MacAfee. (2014). MacAfee Labs Threats Reports. June 2014.

Mbuthia, P. M. (2023). Implications of increased foreign surveillance technologies on national security in Africa. Scientific Scholer. Retrieved from https://api.semanticscholar.org/CorpusID:261130644

Mohamed, A. Y., & Kamau, S. K. (2023). A Continent-Wide Assessment of Cyber Vulnerability Across Africa. ArXiv, abs/2301.03008. Retrieved from https://api.semanticscholar.org/CorpusID:255546218

Nawalagatti, A. (2022) Analysis of Security and Privacy issues in social networks. International journal of creative research thoughts (IJCRT).

Nayak, S.D.T. (2013). Impact of Cyber Crime: Issues and Challenges. International Journal Of Engineering Sciences & Emerging Technologies, October 2013. ISSN: 22316604 Volume 6, Issue 2, pp: 142-153 ©Ijeset.

Ntigwigwa, A.N. (2019).Factors that Contribute to Cybercrime in Mobile Money Services in Tanzania: A Case of Kibaha Town”

Olayemi Yagoda, B. (2015). "A Short History/ of "Hack"". The New Yorker. Retrieved November 3, 2015.

Olofinbiyi, S. A. (2022). A reassessment of public awareness and legislative framework on cybersecurity in South Africa. ScienceRise: Juridical Science. Retrieved from https://api.semanticscholar.org/CorpusID:250209518

Oruj, Z. (2023, February 24). CYBER SECURITY: CONTEMPORARY CYBER THREATS AND NATIONAL STRATEGIES. Distance Education in Ukraine: Innovative, Normative-Legal, Pedagogical Aspects, 2, 100–116. https://doi.org/10.18372/2786-5495.1.17309

Pallangyo, H. (2022). Cyber Security Challenges, its Emerging Trends on Latest Information and Communication Technology and Cyber Crime in Mobile Money Transaction Services. Tanzania Journal of Engineering and Technology. Retrieved from https://api.semanticscholar.org/CorpusID:251425859

Semboja, H.H., Silla, B. & Musuguri, J.N. (2017). Cyber-security Institutional Framework in Tanzania: A Policy Analysis. Global Scientific Journals. GSJ: Volume 5, issue 6: ISSN2320-9186.

Semlambo, A. A., Lubua, E. W., & Mkude, C. G. (2023). The Quality of Information Systems Security Policies in Addressing Security Challenges in Public Learning Institutions of Tanzania. International Journal of Technology and Management, 8(1), 1-22.

Semlambo, A., Lubua, E. W., & Mkude, C. (2022). Information Systems security policy framework for enhanced ICT governance in public institutions of Tanzania. The Journal of Informatics, 2(1), 54-68.

Setiabudi, W., & Sumadinata. (2023). Cybercrime And Global Security Threats: A Challenge In International Law. Law, Political Science, Computer Science. Retrieved from https://api.semanticscholar.org/CorpusID:259197920

Siahaan, A. P. (2018). Impact of Cybercrime on Technological and Financial Developments. Computer Science, Law, Economics, Business. Retrieved from https://api.semanticscholar.org/CorpusID:239780165

Statista.com. (2023). Cybercrime and the financial industry in the United States - Statistics & Facts. Available at https://www.statista.com/topics/9918/cyber-crime-and-the-financial-industry-in- the-united-states/#topicOverview. Published by Ani Petrosyan, March 28, 2023

Sulieman, D. M., & Salleh, F. (2020). Anti-Money Laundering Risk Posed by Mobile Money Services in Sub-Saharan Africa. Business, Economics, Law. Retrieved from https://api.semanticscholar.org/CorpusID:226434897

Yonazi, J., (2012). Cyber Security in Tanzania; Report on from the Cyber-Security Mini-Conference, Center for ICT Research and Innovations

Downloads

Published

2024-11-25

How to Cite

Semlambo, A., & Stanslaus Shalua, N. . (2024). Assessing Cybersecurity Threats To Tanzania’s Government E-Payment Systems And Their Impact On National Security. The Journal of Informatics, 4(1). https://doi.org/10.59645/tji.v4i1.184