African Management Information Systems (Business/ICT crossover) | 22 October 2016
Analysis of Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa in Kenya: An African Perspective
A, i, m, e, e, G, r, e, e, n, ,, A, m, e, l, i, a, W, a, t, t, s
Abstract
This study addresses a current research gap in Computer Science concerning Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa in Kenya. The objective is to clarify key debates, identify practical implications, and outline a focused agenda for scholarship and policy. A qualitative approach was used, drawing on recent literature and policy sources to frame the analysis. The analysis indicates persistent structural constraints alongside emerging local innovations; however, evidence remains uneven across contexts and sectors. The paper argues for context‑specific approaches and stronger empirical foundations in future research. Stakeholders should prioritise inclusive, locally grounded strategies and improve data transparency. Cybersecurity Threats and Mitigation Strategies for Financial Systems in East Africa, Kenya, Africa, Computer Science, protocol This structured abstract provides a standardised summary to support rapid screening, indexing, and assessment of scholarly contribution.