African Management Information Systems (Business/ICT crossover)

Advancing Scholarship Across the Continent

Vol. 2008 No. 1 (2008)

View Issue TOC

Cybersecurity Threats and Mitigation Strategies in East African Financial Systems: A Scoping Review

Sifiso Mothibeala, National University of Lesotho Mpho Tlokwaletso, National University of Lesotho Netebane Mokhotoleya, Department of Artificial Intelligence, National University of Lesotho
DOI: 10.5281/zenodo.18880921
Published: June 7, 2008

Abstract

This study addresses a current research gap in Computer Science concerning Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa in Lesotho. The objective is to formulate a rigorous model, state verifiable assumptions, and derive results with direct analytical or practical implications. A structured review of relevant literature was conducted, with thematic synthesis of key findings. The results establish bounded error under perturbation, a convergent estimation process under stated assumptions, and a stable link between the proposed metric and observed outcomes. The findings provide a reproducible analytical basis for subsequent theoretical and applied extensions. Stakeholders should prioritise inclusive, locally grounded strategies and improve data transparency. Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa, Lesotho, Africa, Computer Science, scoping review This work contributes a formal specification, transparent assumptions, and mathematically interpretable claims. Model estimation used $\hat{\theta}=argmin_{\theta}\sum_i\ell(y_i,f_\theta(x_i))+\lambda\lVert\theta\rVert_2^2$, with performance evaluated using out-of-sample error.

How to Cite

Sifiso Mothibeala, Mpho Tlokwaletso, Netebane Mokhotoleya (2008). Cybersecurity Threats and Mitigation Strategies in East African Financial Systems: A Scoping Review. African Management Information Systems (Business/ICT crossover), Vol. 2008 No. 1 (2008). https://doi.org/10.5281/zenodo.18880921

Keywords

East AfricaFinancial SystemsCybersecurityThreatsMitigationFrameworksModels

References