<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Faculty of Science &amp; Technology (FST)</title>
<link href="http://erepository.uonbi.ac.ke/handle/11295/14111" rel="alternate"/>
<subtitle/>
<id>http://erepository.uonbi.ac.ke/handle/11295/14111</id>
<updated>2026-05-18T20:44:15Z</updated>
<dc:date>2026-05-18T20:44:15Z</dc:date>
<entry>
<title>A Cybersecurity Assessment of the Remote Working Environment During Covid-19. A Case Study of Financial Regulators in Kenya</title>
<link href="http://erepository.uonbi.ac.ke/handle/11295/161788" rel="alternate"/>
<author>
<name>Ngere, Douglas M</name>
</author>
<id>http://erepository.uonbi.ac.ke/handle/11295/161788</id>
<updated>2022-11-18T07:56:34Z</updated>
<published>2022-01-01T00:00:00Z</published>
<summary type="text">A Cybersecurity Assessment of the Remote Working Environment During Covid-19. A Case Study of Financial Regulators in Kenya
Ngere, Douglas M
The Covid-19 pandemic abruptly transformed the way businesses and organizations operate, with governments around the world implementing measures to protect people in order to slow the spread of the virus. This included strict lockdowns and social distancing measures that caused entire workforces to adopt remote working. Organizations therefore had to devise ways support the new arrangement with no time to prepare their ICTs, put in place necessary security mechanisms and develop appropriate policies to guide accessibility of resources from remote locations. As a result of this sudden and unplanned shift to work from home and shift operations online, malicious cyberspace activities and emergent threats proliferated to exploit vulnerabilities in ICT’s. Little research exists on how pandemics such as Covid-19 present opportunities for cybercriminals to perpetrate their activities. The study aimed to investigate how different factors such as cybersecurity preparedness, cybersecurity management procedures and cybersecurity threats influenced remote. Literature revealed that there was a significant increase in cyberthreat activities such as malware, ransomware, and phishing attacks which targeted unprotected and unsuspecting victims during remote working. This research study adopted the quantitative research approach where data was collected using self-administered questionnaires where descriptive statistics and regression analysis was conducted. Based on the regression model, the findings demonstrated that where cybersecurity preparedness measures and cybersecurity management procedures were adopted, they had a significant positive effect in aiding the financial regulatory institutions to achieve secure remote working. However, with the proliferation of cybersecurity threats, and where these were encountered in some form, this impacted negatively to the remote working environment which became vulnerable. In the same way, adoption of cybersecurity frameworks led to a more secure remote working environment. This research proposed and validated a model that explains how these different aspects interplay to affect cybersecurity of the remote working environment. However, development of a model that can be used to mitigate cybersecurity risks for secure remote working is recommended during the remote working period. This study is expected to generate interest among ICT stakeholders in both public and private organizations about the emergent cybersecurity to securing their information assets and the remote worker during the Covid-19 pandemic and beyond.
</summary>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Framework for Effective Management of Cyber Security on E-learning Platforms in Public Universities in Kenya</title>
<link href="http://erepository.uonbi.ac.ke/handle/11295/161726" rel="alternate"/>
<author>
<name>Cyoy, Ronald B</name>
</author>
<id>http://erepository.uonbi.ac.ke/handle/11295/161726</id>
<updated>2022-11-17T06:05:06Z</updated>
<published>2022-01-01T00:00:00Z</published>
<summary type="text">Framework for Effective Management of Cyber Security on E-learning Platforms in Public Universities in Kenya
Cyoy, Ronald B
Many institutions of higher learning in Kenya are adopting e-learning platforms and like other&#13;
popular online platforms e-learning allows for extensive exchange of information via the internet&#13;
and therefore provides fertile grounds for cybercrime. Some e-learning systems supporting&#13;
online collaborative learning do not sufficiently meet essential security requirements where&#13;
students can falsify course assessments, present a convincing false identity to others, alter dat e&#13;
stamps on submitted work among other cybersecurity issues. This calls for an effective way to&#13;
manage cybersecurity on e-learning platforms. The review of various scholarly sources identified&#13;
an existing gap, which pointed to a deficiency of a framework to manage cybersecurity on elearning&#13;
systems. This study sought to fill the knowledge gap by adopting features borrowed&#13;
from K-12 Cyber protection Framework. To address the identified problem, the research was&#13;
carried out at the three selected public chartered universities in Kenya with focus on in-depth&#13;
understanding the management of cybersecurity on e-learning platforms. Questionnaires&#13;
composed of Likert scale were used to collect data where 90 participants were conducted during&#13;
the study. The data was analyzed using descriptive and regression analysis where the results and&#13;
findings highlighted that identity, protection, detection, response, user skills and compliance had&#13;
significant influence on effective management of cybersecurity on e-learning platforms. The&#13;
research recommended sensitization programs for users and the compliance on regulations&#13;
established to reduce vulnerabilities.
</summary>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>An Assessment of the Adoption of Robotic Process Automation in Kenyan Insurance Companies</title>
<link href="http://erepository.uonbi.ac.ke/handle/11295/161684" rel="alternate"/>
<author>
<name>Mbiu, Ruth W</name>
</author>
<id>http://erepository.uonbi.ac.ke/handle/11295/161684</id>
<updated>2022-11-15T06:17:36Z</updated>
<published>2022-01-01T00:00:00Z</published>
<summary type="text">An Assessment of the Adoption of Robotic Process Automation in Kenyan Insurance Companies
Mbiu, Ruth W
Among the technologies perceived as providing great opportunities to scale and transform traditional work paradigms in the digital age is Robotic Process Automation (RPA). Iinsurers are looking at ways of increasing their operational digital footprint and optimizing their business process automation. Insurers handle a high volume of processes manually which creates delays and affects customer satisfaction and profitability. Insurance can take advantage of RPA to handle the high volume, structured and repetitive processes. Although RPA provides numerous benefits, it has not yet achieved conventional adoption. Organizations are still gathering information and creating a business case for RPA implementation. The adoption of RPA has not progressed hence the need to investigate the factors relevant to insurers when making technology adoption decisions. As RPA-related innovations are one of the recent disruptive forces, there is interest for businesses to understand what drives such decisions to facilitate the uptake of RPA technology. The study sought to assess the adoption of RPA in insurance companies in Kenya, identify the opportunities for RPA adoption, establish the factors to be taken into account to stimulate the uptake of RPA, and validate a suitable model for RPA adoption. The Technological, Organizational, and Environmental (TOE) framework was used as the conceptual parameter. A descriptive survey was used where quantitative data was collected using questionnaires. Data was collected from twenty-six life insurance companies licensed by Insurance Regulatory Authority (IRA) and statistically analyzed using SPSS. Nearly all the respondents agreed they perform manual and repetitive tasks in their daily operations. The technical capabilities of the RPA are seen to improve operational efficiency and improve the quality of work produced. The study revealed that many insurers in Kenya are still at the stage of deciding to adopt RPA. This research found clear links between the three elements of the TOE framework and RPA adoption decisions. The model analysis validated the relationship between Technological factors, Organization Factors, and Environmental factors significantly influencing the respondent’s intention to adopt RPA. The findings show that relative advantage, compatibility, top management support, competitive pressure, and legal &amp; regulatory requirements are positively related to the intention to adopt RPA with a negative relationship established between perceived costs and intention to adopt RPA.
</summary>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>On Decomposition of Operators in Hilbert Spaces</title>
<link href="http://erepository.uonbi.ac.ke/handle/11295/161601" rel="alternate"/>
<author>
<name>Mwangi, William</name>
</author>
<id>http://erepository.uonbi.ac.ke/handle/11295/161601</id>
<updated>2022-11-02T07:45:12Z</updated>
<published>2022-01-01T00:00:00Z</published>
<summary type="text">On Decomposition of Operators in Hilbert Spaces
Mwangi, William
In this project, we investigate the direct sum decomposition of some classes of operators in Hilbert&#13;
spaces with the aim of de ning properties of the direct summands of these&#13;
operators.&#13;
We show that an arbitrary operator T decomposes into a normal and a completely nonnormal&#13;
parts. The properties for which an operator T has nontrivial normal and direct summands are&#13;
given. In addition, we study this decomposition of operators in some equivalence classes (similar,&#13;
unitarily equivalent, quasisimilar and almost-similar) of operators.&#13;
We also investigate the properties of the direct decomposition of a contraction into a unitary and&#13;
a completely nonunitary parts. We show that an arbitrary operator T decomposes this way upon&#13;
dividing the operator by its norm (re-normalization).
</summary>
<dc:date>2022-01-01T00:00:00Z</dc:date>
</entry>
</feed>
