African Forced Displacement Studies (Broader than Conflict Portal -

Advancing Scholarship Across the Continent

Vol. 2000 No. 1 (2000)

View Issue TOC

Cybersecurity Architectures for Financial Systems in East Africa: A Replication Study

Kamau Mutua, International Centre of Insect Physiology and Ecology (ICIPE), Nairobi Mwihaki Kinyanjui, Department of Artificial Intelligence, Maseno University Karururu Cheru, Department of Data Science, Technical University of Kenya Ochieng Okoth, Department of Software Engineering, Moi University
DOI: 10.5281/zenodo.18718839
Published: January 15, 2000

Abstract

This study addresses a current research gap in Computer Science concerning Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa in Kenya. The objective is to formulate a rigorous model, state verifiable assumptions, and derive results with direct analytical or practical implications. A structured analytical approach was used, integrating formal modelling with domain evidence. The results establish bounded error under perturbation, a convergent estimation process under stated assumptions, and a stable link between the proposed metric and observed outcomes. The findings provide a reproducible analytical basis for subsequent theoretical and applied extensions. Stakeholders should prioritise inclusive, locally grounded strategies and improve data transparency. Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa, Kenya, Africa, Computer Science, replication study This work contributes a formal specification, transparent assumptions, and mathematically interpretable claims. Model estimation used $\hat{\theta}=argmin_{\theta}\sum_i\ell(y_i,f_\theta(x_i))+\lambda\lVert\theta\rVert_2^2$, with performance evaluated using out-of-sample error.

How to Cite

Kamau Mutua, Mwihaki Kinyanjui, Karururu Cheru, Ochieng Okoth (2000). Cybersecurity Architectures for Financial Systems in East Africa: A Replication Study. African Forced Displacement Studies (Broader than Conflict Portal -, Vol. 2000 No. 1 (2000). https://doi.org/10.5281/zenodo.18718839

Keywords

AfricanGeographicalNetworkSecurityProtocolThreatVulnerability

References