{"id":6886,"date":"2025-02-23T18:16:11","date_gmt":"2025-02-23T18:16:11","guid":{"rendered":"https:\/\/scai.kibu.ac.ke\/?p=6886"},"modified":"2025-12-24T03:33:00","modified_gmt":"2025-12-24T03:33:00","slug":"evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/","title":{"rendered":"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6886\" class=\"elementor elementor-6886\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-147e81a5 elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"147e81a5\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e87f27b\" data-id=\"e87f27b\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34a9a623 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"34a9a623\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f460ba8 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"2f460ba8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6836dd5c\" data-id=\"6836dd5c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-45089be3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45089be3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4aa84a94 elementor-invisible\" data-id=\"4aa84a94\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb02e55 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"bb02e55\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2024<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3d34bc36 elementor-invisible\" data-id=\"3d34bc36\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31c495a2 elementor-widget elementor-widget-heading\" data-id=\"31c495a2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KIBU Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-753250c8 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"753250c8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Margaret Afwande<\/p><p>Samuel Barasa<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2b212768 elementor-invisible\" data-id=\"2b212768\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d4f8864 elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"d4f8864\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/www.ijset.in\/evaluating-effectiveness-blockchain-technology-mitigating-cybersecurity-crimes-electronic-health-management-systems-within-public-hospitals-kenya\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-43cff977 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"43cff977\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2d974ed8 elementor-invisible\" data-id=\"2d974ed8\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-108c7900 elementor-widget elementor-widget-heading\" data-id=\"108c7900\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52d9f62e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"52d9f62e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The digital transformation of healthcare fundamentally enhanced the management and accessibility of patient data through the implementation of Electronic Health Management Systems (EHMS). In Kenya, public hospitals increasingly integrated EHMS to optimize healthcare service delivery and improve patient care outcomes. However, this transition introduced significant cybersecurity vulnerabilities, including data breaches and unauthorized access, jeopardizing the confidentiality and integrity of sensitive patient information. This study evaluated the effectiveness of blockchain technology in mitigating these cybersecurity threats within EHMS in public hospitals in Kenya. The research identified that 78% of IT specialists reported data breaches as the most prevalent cyber threat and 64% cited frequent incidents of unauthorized access. Furthermore, 82% of respondents indicated that existing cybersecurity strategies were insufficient to address emerging threats. Despite the recognized limitations of current security measures, 87% of experts expressed confidence in blockchain\u2019s ability to enhance EHMS security. The decentralized and immutable nature of blockchain was perceived to significantly mitigate unauthorized access and data tampering, with 90% of respondents agreeing that it could reduce the risks of data manipulation. The qualitative interviews with healthcare professionals revealed concerns about privacy violations and mistrust in the current EHMS. The findings underscored the urgent need for innovative cybersecurity measures, with blockchain emerging as a promising solution. This study contributed valuable insights into the potential advantages and limitations of blockchain technology, establishing a framework for enhancing the security of EHMS in Kenya and informing the development of more secure healthcare information systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2024 KIBU Authors Margaret Afwande Samuel Barasa VIEW ON PUBLISHER SITE Abstract The digital transformation of healthcare fundamentally enhanced the management and accessibility of patient data through the implementation of Electronic Health Management Systems (EHMS). In Kenya, public hospitals increasingly integrated EHMS to optimize healthcare service delivery and improve patient care outcomes. However, this transition [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-6886","post","type-post","status-publish","format-standard","hentry","category-research-list"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya - School of Computing &amp; Informatics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya - School of Computing &amp; Informatics\" \/>\n<meta property=\"og:description\" content=\"2024 KIBU Authors Margaret Afwande Samuel Barasa VIEW ON PUBLISHER SITE Abstract The digital transformation of healthcare fundamentally enhanced the management and accessibility of patient data through the implementation of Electronic Health Management Systems (EHMS). In Kenya, public hospitals increasingly integrated EHMS to optimize healthcare service delivery and improve patient care outcomes. However, this transition [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Computing &amp; Informatics\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-23T18:16:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T03:33:00+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\"},\"headline\":\"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya\",\"datePublished\":\"2025-02-23T18:16:11+00:00\",\"dateModified\":\"2025-12-24T03:33:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/\"},\"wordCount\":269,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"articleSection\":[\"Research List\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/\",\"name\":\"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya - School of Computing &amp; Informatics\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\"},\"datePublished\":\"2025-02-23T18:16:11+00:00\",\"dateModified\":\"2025-12-24T03:33:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"School Publications\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/school-publications\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"name\":\"School of Computing &amp; Informatics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\",\"name\":\"School of Computing &amp; Informatics\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"width\":1024,\"height\":923,\"caption\":\"School of Computing &amp; Informatics\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/scai\"],\"url\":\"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya - School of Computing &amp; Informatics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/","og_locale":"en_US","og_type":"article","og_title":"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya - School of Computing &amp; Informatics","og_description":"2024 KIBU Authors Margaret Afwande Samuel Barasa VIEW ON PUBLISHER SITE Abstract The digital transformation of healthcare fundamentally enhanced the management and accessibility of patient data through the implementation of Electronic Health Management Systems (EHMS). In Kenya, public hospitals increasingly integrated EHMS to optimize healthcare service delivery and improve patient care outcomes. However, this transition [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/","og_site_name":"School of Computing &amp; Informatics","article_published_time":"2025-02-23T18:16:11+00:00","article_modified_time":"2025-12-24T03:33:00+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d"},"headline":"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya","datePublished":"2025-02-23T18:16:11+00:00","dateModified":"2025-12-24T03:33:00+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/"},"wordCount":269,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"articleSection":["Research List"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/","url":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/","name":"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya - School of Computing &amp; Informatics","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/#website"},"datePublished":"2025-02-23T18:16:11+00:00","dateModified":"2025-12-24T03:33:00+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/scai\/evaluating-the-effectiveness-of-blockchain-technology-in-mitigating-cybersecurity-crimes-in-electronic-health-management-systems-within-public-hospitals-in-kenya\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/scai\/"},{"@type":"ListItem","position":2,"name":"School Publications","item":"https:\/\/kibu.ac.ke\/scai\/school-publications\/"},{"@type":"ListItem","position":3,"name":"Evaluating the Effectiveness of Blockchain Technology in Mitigating Cybersecurity Crimes in Electronic Health Management Systems within Public Hospitals in Kenya"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/scai\/#website","url":"https:\/\/kibu.ac.ke\/scai\/","name":"School of Computing &amp; Informatics","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/scai\/#organization","name":"School of Computing &amp; Informatics","url":"https:\/\/kibu.ac.ke\/scai\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","contentUrl":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","width":1024,"height":923,"caption":"School of Computing &amp; Informatics"},"image":{"@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/scai"],"url":"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/6886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/comments?post=6886"}],"version-history":[{"count":3,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/6886\/revisions"}],"predecessor-version":[{"id":11690,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/6886\/revisions\/11690"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/media?parent=6886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/categories?post=6886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/tags?post=6886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}