Mogaka, Elvis Mosoti(United States International University-Africa, 2025)
Small-scale clean cooking projects often struggle to access carbon markets due to the high costs and operational complexity of monitoring systems required to quantify carbon emission reductions. This study addresses this ...
Omondi, Leonard Ochieng(United States International University-Africa, 2025)
The rapid growth of the FinTech sector in Nairobi has significantly expanded financial inclusion through innovations such as mobile money, digital lending platforms, and blockchain-based solutions. However, this growth ...
Mureithi, Muriuki(United States International University-Africa, 2025)
Reliable internet connectivity remains a persistent challenge in rural and remote regions of Kenya, particularly for nomadic communities whose mobility patterns and dispersed settlement structures make conventional ...
Omyonga, Kevin Nyende(United States International University-Africa, 2025)
The rapid expansion of ride-hailing services in Kenya has significantly transformed urban mobility; however, structural challenges such as high commission rates between 15% and 25%, a lack of pricing transparency, and ...
Midigo, Benard Odhiambo(United States International University-Africa, 2025)
This study examined how media framing and public sentiment interacted within Kenya’s healthcare policy communication landscape, focusing on the Social Health Insurance Act 2023. Using YouTube as a platform for media ...
Muta, Moses Nderitu(United States International University-Africa, 2025)
The growing complexity of supply chains demands coherent, data-driven decision-making across all organizational layers. Yet, misalignments across all decision-making layers, often caused by fragmented communication and ...
Aijuka, Arnold(United States International University-Africa, 2025)
WhatsApp phishing, a rising cyber threat exploiting social engineering, posed significant risks to smartphone users in Kenya, where mobile money services like M-Pesa are integral to daily life. Conventional detection ...
Mataara, Moses Shiyuka(United States International University-Africa, 2025)
The recent increased use of Artificial Intelligence (AI) tools by students in Higher Learning Institutions (HLIs) comes with both unprecedented benefits in productivity and significant ethical challenges, including data ...
Kibebe, Winnie(United States International University-Africa, 2025)
One of today's broad cybersecurity risks is ransomware due to its sophistication and the constant evolution of methods that seek to bypass IDS systems. Polymorphic malware, encrypted command-and-control (C2) channels, and ...
Kipyegon, Victor(United States International University-Africa, 2025)
Social engineering attacks (SEAs) continue to pose significant risks to higher education institutions by exploiting human vulnerabilities rather than technical weaknesses. In Kenya, universities face increased exposure due ...
Mutwiwa, Kelvin Muendo(United States International University-Africa, 2025)
IoT has become one of the core building blocks of today's modern technology infrastructure, where it connects billions of devices across the world. Most IoT devices, though, especially on low-power platforms like Raspberry ...
Jordan, Bujiriri Mulumeoderhwa(United States International University-Africa, 2025)
The rapid proliferation of Internet of Things (IoT) technologies has transformed access control systems, yet smart locks remain vulnerable to a spectrum of cyber and physical threats due to weak firmware integrity, insecure ...
Mutie, Stephen Muindu(United States International University-Africa, 2025)
Cybersecurity threats are constantly evolving, becoming more sophisticated and targeted. Traditional security approaches often prove inadequate against these advanced attacks, highlighting the need for proactive and ...
Kariuki, George(United States International University-Africa, 2025)
The increasing frequency and sophistication of cyber threats targeting higher education institutions highlight the urgent need for structured and standards-based Information Security Management Systems (ISMS). This study ...
Kaputi, Michael Solonka(United States International University-Africa, 2025)
Enterprise Resource Planning (ERP) systems generate large volumes of operational logs that contain critical indicators of security threats and workflow irregularities. However, traditional rule-based and statistical anomaly ...
Gichuhi, Annfrida Njeri(United States International University-Africa, 2025)
The increasing sophistication of AI-generated phishing emails presents a significant challenge to existing cybersecurity measures. Traditional phishing detection systems, which rely on rule-based heuristics and static ...
Cherono, Mercy(United States International University-Africa, 2025)
Cloud computing environments continue to face growing threats that exploit weaknesses in traditional authentication methods, including credential compromise, identity spoofing, and unauthorized access. While passwordless ...
Ogutu, Daniel Kenneth(United States International University-Africa, 2025)
Intrusion Detection Systems (IDS) are essential for securing digital infrastructures against evolving cyber threats. Although Artificial Intelligence (AI)–driven IDS improve detection accuracy, their opaque “black box’’ ...
Gitau, Cynthia Watiri(United States International University-Africa, 2025)
This study addressed Multi-factor Authentication (MFA) fatigue in university environments, where repeated authentication demands diminish security effectiveness through reduced user vigilance and compliance. The research ...
Mutsunga, Dalton(United States International University-Africa, 2025)
Memory-corruption vulnerabilities remain a dominant root cause of high-severity software security flaws, enabling outcomes such as unauthorized information disclosure and denial-of-service risks that are especially ...