PurposeThe purpose of this paper is to analyse the effect of critical success factors (CSFs) on information technology (IT) governance performance in public sector organizations in a developing country such as Tanzania.Design/methodology/approachBased on a previous study and a further literature review, a research model was developed for analysing the relationship between the CSFs found for effective IT governance in this environment and their effect on IT governance performance. A survey research method was applied for data collection and sample data from Tanzanian public sector organizations (this environment) obtained. Subsequently, a second‐generation structural equation modelling technique, namely partial least squares, was applied to test statistically the correlated effect.FindingsThe results indicate significant small to strong positive correlated effects on IT governance performance. The CSF with the most significant correlated effect was “involve and get support of senior management” and the one with the least “consolidate, standardize and manage IT infrastructure and application to optimize costs and information flow across the organization”. Finally, a CSF model for effective IT governance in this environment was proposed.Research limitations/implicationsThe findings imply that decision makers can optimize IT‐related plans and use of scarce resources by concentrating on the CSFs that have a significant effect on IT governance performance that could lead to an improvement of public service delivery. This study is limited to a single developing country but future studies can involve more such countries to broaden the insights into the effect of CSFs on IT governance performance in such environments.Originality/valueBy establishing the correlated effects between these CSFs and the IT governance performance, this study has revealed a significant impact of CSFs on IT governance performance. It also suggests a CSFs model for effective IT governance in this less‐resourced environment in which such studies have not been conducted before, yet which are vital for analysing and improving IT governance.
This paper presents an innovative Soft Design Science Methodology for improving information systems security using multi-layered security approach. The study applied Soft Design Science Methodology to address the problematic situation on how information systems security can be improved. In addition, Soft Design Science Methodology was compounded with mixed research methodology. This holistic approach helped for research methodology triangulation. The study assessed security requirements and developed a framework for improving information systems security. The study carried out maturity level assessment to determine security status quo in the education sector in Tanzania. The study identified security requirements gap (IT security controls, IT security measures) using ISO/IEC 21827: Systems Security Engineering-Capability Maturity Model (SSE-CMM) with a rating scale of 0-5. The results of this study show that maturity level across security domain is 0.44 out of 5. The finding shows that the implementation of IT security controls and security measures for ensuring security goals are lacking or conducted in ad-hoc. Thus, for improving the security of information systems, organisations should implement security controls and security measures in each security domain (multi-layer security). This research provides a framework for enhancing information systems security during capturing, processing, storage and transmission of information. This research has several practical contributions. Firstly, it contributes to the body of knowledge of information systems security by providing a set of security requirements for ensuring information systems security. Secondly, it contributes empirical evidence on how information systems security can be improved. Thirdly, it contributes on the applica-How to cite this paper: Mshangi, M., Nfuka, E.N. and Sanga, C. (2017) An Innovative Soft Design Science Methodology for Improving Development of a Secure Information System in Tanzania Using Multi-Layered Approach.
This chapter focuses on IT governance in the public sector organizations in a developing country like Tanzania. Today in many organizations in the public sector, the use of IT has become crucial in sustaining and extending the organizations’ strategies and objectives. This pervasive use of technology has caused a critical dependency on IT that calls for a specific focus on IT governance. In this chapter, we provide its overview and, based on the analysis of five case studies indicate the current practices, problems, and consequences in the Tanzanian public sector environment. Moreover, we reveal twelve key issues to consider for effective IT governance together with the trends and future research in improving ICT-enabled transformational government in public service delivery in this environment. In this context, the chapter contributes to an understanding of the IT governance practices and related ICT-enabled transformational government issues and complexities involved in the transformational phase for better public service delivery in a developing country like Tanzania.
Today in many organizations in the public sector, the use of IT has become crucial in sustaining and extending the organizations' strategies and objectives. This pervasive use of technology has caused a critical dependency on IT that calls for specific focus on the IT Governance. This paper discusses the current state of IT Governance practices in five public sector organizations from a developing country, like is Tanzania. The results of this research approach are looking into the IT Governance mechanisms in place in terms of structures, processes and relational mechanisms. Moreover the paper includes a discussion on the problems and consequences inherent to inhibitors of effective IT Governance for a further improvement of the public service delivery in this environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.