{"id":6926,"date":"2025-02-23T18:37:27","date_gmt":"2025-02-23T18:37:27","guid":{"rendered":"https:\/\/scai.kibu.ac.ke\/?p=6926"},"modified":"2025-12-24T03:26:54","modified_gmt":"2025-12-24T03:26:54","slug":"assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/","title":{"rendered":"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6926\" class=\"elementor elementor-6926\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3ff27c0f elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"3ff27c0f\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73ecaeea\" data-id=\"73ecaeea\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7141b635 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"7141b635\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-23b19d17 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"23b19d17\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-72bd137\" data-id=\"72bd137\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7ac017d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ac017d2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-298d284f elementor-invisible\" data-id=\"298d284f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29447266 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"29447266\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2024<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-760b060c elementor-invisible\" data-id=\"760b060c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61f8c826 elementor-widget elementor-widget-heading\" data-id=\"61f8c826\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KIBU Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d58f00f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2d58f00f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Dr. Roselida Maroko Ongare<\/p><p>Dr. Patrick Oduor Owoche<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4c6666ff elementor-invisible\" data-id=\"4c6666ff\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f4ade70 elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"3f4ade70\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/ijarcce.com\/papers\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-583f6b91 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"583f6b91\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-69146b7d elementor-invisible\" data-id=\"69146b7d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21c9fef elementor-widget elementor-widget-heading\" data-id=\"21c9fef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16a652cc elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"16a652cc\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The rapid integration of technology in educational institutions has led to the widespread adoption of StudentManagement Information Systems (SMIS) to streamline administrative processes and enhance student experiences.However, these systems are increasingly becoming targets for cyber-attacks due to the sensitive nature of the data theystore, such as personal information, academic records, and financial details. This study evaluates the existingvulnerabilities in university SMIS implementations, focusing on their potential impact on student data security. Througha comprehensive analysis of various university SMIS across different institutions, this research identifies commonsecurity flaws, including inadequate access controls, outdated software, lack of encryption, and improper data handlingpractices. Additionally, the study highlights the implications of these vulnerabilities, such as unauthorized data access,data breaches, identity theft, and potential reputational damage to institutions. By examining these risks, the studyprovides a framework for understanding the critical areas that require immediate attention and offers recommendationsfor enhancing the security posture of university SMIS. The findings aim to guide universities in developing robustsecurity measures to protect student data, ensuring the privacy and integrity of their academic environments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2024 KIBU Authors Dr. Roselida Maroko Ongare Dr. Patrick Oduor Owoche VIEW ON PUBLISHER SITE Abstract The rapid integration of technology in educational institutions has led to the widespread adoption of StudentManagement Information Systems (SMIS) to streamline administrative processes and enhance student experiences.However, these systems are increasingly becoming targets for cyber-attacks due to the sensitive [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-6926","post","type-post","status-publish","format-standard","hentry","category-research-list"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security - School of Computing &amp; Informatics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security - School of Computing &amp; Informatics\" \/>\n<meta property=\"og:description\" content=\"2024 KIBU Authors Dr. Roselida Maroko Ongare Dr. Patrick Oduor Owoche VIEW ON PUBLISHER SITE Abstract The rapid integration of technology in educational institutions has led to the widespread adoption of StudentManagement Information Systems (SMIS) to streamline administrative processes and enhance student experiences.However, these systems are increasingly becoming targets for cyber-attacks due to the sensitive [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Computing &amp; Informatics\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-23T18:37:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T03:26:54+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\"},\"headline\":\"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security\",\"datePublished\":\"2025-02-23T18:37:27+00:00\",\"dateModified\":\"2025-12-24T03:26:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/\"},\"wordCount\":206,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"articleSection\":[\"Research List\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/\",\"name\":\"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security - School of Computing &amp; Informatics\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\"},\"datePublished\":\"2025-02-23T18:37:27+00:00\",\"dateModified\":\"2025-12-24T03:26:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"School Publications\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/school-publications\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"name\":\"School of Computing &amp; Informatics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\",\"name\":\"School of Computing &amp; Informatics\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"width\":1024,\"height\":923,\"caption\":\"School of Computing &amp; Informatics\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/scai\"],\"url\":\"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security - School of Computing &amp; Informatics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security - School of Computing &amp; Informatics","og_description":"2024 KIBU Authors Dr. Roselida Maroko Ongare Dr. Patrick Oduor Owoche VIEW ON PUBLISHER SITE Abstract The rapid integration of technology in educational institutions has led to the widespread adoption of StudentManagement Information Systems (SMIS) to streamline administrative processes and enhance student experiences.However, these systems are increasingly becoming targets for cyber-attacks due to the sensitive [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/","og_site_name":"School of Computing &amp; Informatics","article_published_time":"2025-02-23T18:37:27+00:00","article_modified_time":"2025-12-24T03:26:54+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d"},"headline":"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security","datePublished":"2025-02-23T18:37:27+00:00","dateModified":"2025-12-24T03:26:54+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/"},"wordCount":206,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"articleSection":["Research List"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/","url":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/","name":"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security - School of Computing &amp; Informatics","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/#website"},"datePublished":"2025-02-23T18:37:27+00:00","dateModified":"2025-12-24T03:26:54+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/scai\/assessing-security-vulnerabilities-in-university-student-management-information-systems-smis-and-their-impact-on-student-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/scai\/"},{"@type":"ListItem","position":2,"name":"School Publications","item":"https:\/\/kibu.ac.ke\/scai\/school-publications\/"},{"@type":"ListItem","position":3,"name":"Assessing Security Vulnerabilities in University Student Management Information Systems (SMIS) and Their Impact on Student Data Security"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/scai\/#website","url":"https:\/\/kibu.ac.ke\/scai\/","name":"School of Computing &amp; Informatics","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/scai\/#organization","name":"School of Computing &amp; Informatics","url":"https:\/\/kibu.ac.ke\/scai\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","contentUrl":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","width":1024,"height":923,"caption":"School of Computing &amp; Informatics"},"image":{"@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/scai"],"url":"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/6926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/comments?post=6926"}],"version-history":[{"count":3,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/6926\/revisions"}],"predecessor-version":[{"id":11666,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/6926\/revisions\/11666"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/media?parent=6926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/categories?post=6926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/tags?post=6926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}