African Management Information Systems (Business/ICT crossover) | 05 February 2008
Cybersecurity Threats and Mitigation Strategies in East African Financial Systems: A Scoping Review
S, i, f, i, s, o, M, o, t, h, i, b, e, a, l, a, ,, M, p, h, o, T, l, o, k, w, a, l, e, t, s, o, ,, N, e, t, e, b, a, n, e, M, o, k, h, o, t, o, l, e, y, a
Abstract
This study addresses a current research gap in Computer Science concerning Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa in Lesotho. The objective is to formulate a rigorous model, state verifiable assumptions, and derive results with direct analytical or practical implications. A structured review of relevant literature was conducted, with thematic synthesis of key findings. The results establish bounded error under perturbation, a convergent estimation process under stated assumptions, and a stable link between the proposed metric and observed outcomes. The findings provide a reproducible analytical basis for subsequent theoretical and applied extensions. Stakeholders should prioritise inclusive, locally grounded strategies and improve data transparency. Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa, Lesotho, Africa, Computer Science, scoping review This work contributes a formal specification, transparent assumptions, and mathematically interpretable claims. Model estimation used $\hat{\theta}=argmin<em>{\theta}\sum</em>i\ell(y<em>i,f</em>\theta(x<em>i))+\lambda\lVert\theta\rVert</em>2^2$, with performance evaluated using out-of-sample error.