{"id":7419,"date":"2025-02-25T17:32:53","date_gmt":"2025-02-25T17:32:53","guid":{"rendered":"https:\/\/scai.kibu.ac.ke\/?p=7419"},"modified":"2025-12-24T01:46:58","modified_gmt":"2025-12-24T01:46:58","slug":"information-security-policy-trend-as-a-foundation-to-protecting-information-resources","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/","title":{"rendered":"Information Security Policy Trend as a Foundation to Protecting Information Resources"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7419\" class=\"elementor elementor-7419\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a08cc8c elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"6a08cc8c\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f0403f4\" data-id=\"2f0403f4\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-375fec04 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"375fec04\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security Policy Trend as a Foundation to Protecting Information Resources<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3a143f97 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"3a143f97\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-967ecf5\" data-id=\"967ecf5\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-45d9e5fa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45d9e5fa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7d0238c3 elementor-invisible\" data-id=\"7d0238c3\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73282ffd elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"73282ffd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2012<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-795b8d4c elementor-invisible\" data-id=\"795b8d4c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64b69ba0 elementor-widget elementor-widget-heading\" data-id=\"64b69ba0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KIBU Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-657c917c elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"657c917c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Wabwoba Franklin<\/p><p>Anselmo Peters<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-45dd2a5f elementor-invisible\" data-id=\"45dd2a5f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71e1b242 elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"71e1b242\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/www.ijcst.org\/Volume3\/Issue4\/p11_3_4.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6d960a99 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d960a99\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-64a9f907 elementor-invisible\" data-id=\"64a9f907\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-713eff06 elementor-widget elementor-widget-heading\" data-id=\"713eff06\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-342fb393 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"342fb393\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Although many institutions have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. An approach that emphasizes on information security policy within the institutions is therefore required to make security part of employees\u2019 daily work routines. In order to develop a successful information security culture within an organization, it is worth understanding both technical and non-technical aspects of information security. The purpose of this paper is to outline the strategies and management processes behind implementing a successful Security Policy. Additionally, the paper gives recommendations for the creation of a Security Awareness Program, whose main objective is to provide staff members with a better, if not much improved understanding of the issues stated in a security policy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2012 KIBU Authors Wabwoba Franklin Anselmo Peters VIEW ON PUBLISHER SITE Abstract Although many institutions have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. An approach that emphasizes on information security policy within the institutions is therefore required to make security part of employees\u2019 daily work routines. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-7419","post","type-post","status-publish","format-standard","hentry","category-research-list"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Policy Trend as a Foundation to Protecting Information Resources - School of Computing &amp; Informatics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy Trend as a Foundation to Protecting Information Resources - School of Computing &amp; Informatics\" \/>\n<meta property=\"og:description\" content=\"2012 KIBU Authors Wabwoba Franklin Anselmo Peters VIEW ON PUBLISHER SITE Abstract Although many institutions have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. An approach that emphasizes on information security policy within the institutions is therefore required to make security part of employees\u2019 daily work routines. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Computing &amp; Informatics\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-25T17:32:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T01:46:58+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\"},\"headline\":\"Information Security Policy Trend as a Foundation to Protecting Information Resources\",\"datePublished\":\"2025-02-25T17:32:53+00:00\",\"dateModified\":\"2025-12-24T01:46:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/\"},\"wordCount\":145,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"articleSection\":[\"Research List\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/\",\"name\":\"Information Security Policy Trend as a Foundation to Protecting Information Resources - School of Computing &amp; Informatics\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\"},\"datePublished\":\"2025-02-25T17:32:53+00:00\",\"dateModified\":\"2025-12-24T01:46:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"School Publications\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/school-publications\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security Policy Trend as a Foundation to Protecting Information Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"name\":\"School of Computing &amp; Informatics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\",\"name\":\"School of Computing &amp; Informatics\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"width\":1024,\"height\":923,\"caption\":\"School of Computing &amp; Informatics\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/scai\"],\"url\":\"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy Trend as a Foundation to Protecting Information Resources - School of Computing &amp; Informatics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Policy Trend as a Foundation to Protecting Information Resources - School of Computing &amp; Informatics","og_description":"2012 KIBU Authors Wabwoba Franklin Anselmo Peters VIEW ON PUBLISHER SITE Abstract Although many institutions have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. An approach that emphasizes on information security policy within the institutions is therefore required to make security part of employees\u2019 daily work routines. [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/","og_site_name":"School of Computing &amp; Informatics","article_published_time":"2025-02-25T17:32:53+00:00","article_modified_time":"2025-12-24T01:46:58+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d"},"headline":"Information Security Policy Trend as a Foundation to Protecting Information Resources","datePublished":"2025-02-25T17:32:53+00:00","dateModified":"2025-12-24T01:46:58+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/"},"wordCount":145,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"articleSection":["Research List"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/","url":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/","name":"Information Security Policy Trend as a Foundation to Protecting Information Resources - School of Computing &amp; Informatics","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/#website"},"datePublished":"2025-02-25T17:32:53+00:00","dateModified":"2025-12-24T01:46:58+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/scai\/information-security-policy-trend-as-a-foundation-to-protecting-information-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/scai\/"},{"@type":"ListItem","position":2,"name":"School Publications","item":"https:\/\/kibu.ac.ke\/scai\/school-publications\/"},{"@type":"ListItem","position":3,"name":"Information Security Policy Trend as a Foundation to Protecting Information Resources"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/scai\/#website","url":"https:\/\/kibu.ac.ke\/scai\/","name":"School of Computing &amp; Informatics","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/scai\/#organization","name":"School of Computing &amp; Informatics","url":"https:\/\/kibu.ac.ke\/scai\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","contentUrl":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","width":1024,"height":923,"caption":"School of Computing &amp; Informatics"},"image":{"@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/scai"],"url":"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/7419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/comments?post=7419"}],"version-history":[{"count":3,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/7419\/revisions"}],"predecessor-version":[{"id":11294,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/7419\/revisions\/11294"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/media?parent=7419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/categories?post=7419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/tags?post=7419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}