{"id":8343,"date":"2025-04-15T10:00:50","date_gmt":"2025-04-15T10:00:50","guid":{"rendered":"https:\/\/scai.kibu.ac.ke\/?p=8343"},"modified":"2025-12-23T13:30:28","modified_gmt":"2025-12-23T13:30:28","slug":"emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/","title":{"rendered":"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8343\" class=\"elementor elementor-8343\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f3c96fe elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"2f3c96fe\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d7daa54\" data-id=\"3d7daa54\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4669a9a6 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"4669a9a6\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-459bca53 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"459bca53\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3631971a\" data-id=\"3631971a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-700d74a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"700d74a4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-368196a3 elementor-invisible\" data-id=\"368196a3\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2532bb83 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"2532bb83\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2016<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-61fc6f73 elementor-invisible\" data-id=\"61fc6f73\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53b7ecc7 elementor-widget elementor-widget-heading\" data-id=\"53b7ecc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KIBU Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22fa8ed9 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"22fa8ed9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Wabwoba F.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7487b77a elementor-invisible\" data-id=\"7487b77a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-402cad41 elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"402cad41\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/www.academia.edu\/28845207\/Emerging_Security_Challenges_for_Information_Systems_in_Mobile_Computing_Environment_In_Universities\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-10bb6b9c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10bb6b9c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5b968fde elementor-invisible\" data-id=\"5b968fde\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4327bc3 elementor-widget elementor-widget-heading\" data-id=\"4327bc3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3572f573 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3572f573\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Universities are shifting from partially computerized to fully automated environments and technology is equally shifting from point to point to broadcasting options. These trends are resulting in mobile computing for most university users with systems accumulating enormous amount of public, private as well as confidential data on employee, students and the institution. However, mobile computing systems normally come with security challenges and different vulnerabilities that make users hesitate adopting them despite the many benefits they bring.The purpose of this Paper was to establish the emerging security challenges of information systems in mobile computing environments in universities. The study was undertaken using multi-case method andthrough scrutiny of literature on security challenges in information system. Stratified random sampling and purposeful sampling was used to select respondents from six public and two private universities. It was established that the emerging security challenges in universities in mobile computing to be rising as technology advances.The findings will help the mobile computing implementers and university management determine when there is need for enhancement of existing security approaches to mobile computing and mitigate on the future trends in security for the information systems. Security in information systems is posing challenges to organizations as they adopt new technologies such as mobile computing and as the trends in technology change. According to the government of Hong-Kong (2011) new spectrum of mobile products is emerging that combine a range of computational capabilities into one physical device. This trend encourages mobile computing in most organizations. According to Artjom, (2010) Mobile computing is the most current technology, where mobile phones can do everything a computer could, including web browsing, document processing, and playing games among others.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2016 KIBU Authors Wabwoba F. VIEW ON PUBLISHER SITE Abstract Universities are shifting from partially computerized to fully automated environments and technology is equally shifting from point to point to broadcasting options. These trends are resulting in mobile computing for most university users with systems accumulating enormous amount of public, private as well as confidential [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-8343","post","type-post","status-publish","format-standard","hentry","category-research-list"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities - School of Computing &amp; Informatics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities - School of Computing &amp; Informatics\" \/>\n<meta property=\"og:description\" content=\"2016 KIBU Authors Wabwoba F. VIEW ON PUBLISHER SITE Abstract Universities are shifting from partially computerized to fully automated environments and technology is equally shifting from point to point to broadcasting options. These trends are resulting in mobile computing for most university users with systems accumulating enormous amount of public, private as well as confidential [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Computing &amp; Informatics\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-15T10:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-23T13:30:28+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\"},\"headline\":\"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities\",\"datePublished\":\"2025-04-15T10:00:50+00:00\",\"dateModified\":\"2025-12-23T13:30:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/\"},\"wordCount\":295,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"articleSection\":[\"Research List\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/\",\"name\":\"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities - School of Computing &amp; Informatics\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\"},\"datePublished\":\"2025-04-15T10:00:50+00:00\",\"dateModified\":\"2025-12-23T13:30:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"School Publications\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/school-publications\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"name\":\"School of Computing &amp; Informatics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\",\"name\":\"School of Computing &amp; Informatics\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"width\":1024,\"height\":923,\"caption\":\"School of Computing &amp; Informatics\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/scai\"],\"url\":\"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities - School of Computing &amp; Informatics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities - School of Computing &amp; Informatics","og_description":"2016 KIBU Authors Wabwoba F. VIEW ON PUBLISHER SITE Abstract Universities are shifting from partially computerized to fully automated environments and technology is equally shifting from point to point to broadcasting options. These trends are resulting in mobile computing for most university users with systems accumulating enormous amount of public, private as well as confidential [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/","og_site_name":"School of Computing &amp; Informatics","article_published_time":"2025-04-15T10:00:50+00:00","article_modified_time":"2025-12-23T13:30:28+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d"},"headline":"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities","datePublished":"2025-04-15T10:00:50+00:00","dateModified":"2025-12-23T13:30:28+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/"},"wordCount":295,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"articleSection":["Research List"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/","url":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/","name":"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities - School of Computing &amp; Informatics","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/#website"},"datePublished":"2025-04-15T10:00:50+00:00","dateModified":"2025-12-23T13:30:28+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/scai\/emerging-security-challenges-for-information-systems-in-mobile-computing-environment-in-universities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/scai\/"},{"@type":"ListItem","position":2,"name":"School Publications","item":"https:\/\/kibu.ac.ke\/scai\/school-publications\/"},{"@type":"ListItem","position":3,"name":"Emerging Security Challenges for Information Systems in Mobile Computing Environment In Universities"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/scai\/#website","url":"https:\/\/kibu.ac.ke\/scai\/","name":"School of Computing &amp; Informatics","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/scai\/#organization","name":"School of Computing &amp; Informatics","url":"https:\/\/kibu.ac.ke\/scai\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","contentUrl":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","width":1024,"height":923,"caption":"School of Computing &amp; Informatics"},"image":{"@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/scai"],"url":"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/8343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/comments?post=8343"}],"version-history":[{"count":3,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/8343\/revisions"}],"predecessor-version":[{"id":10447,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/8343\/revisions\/10447"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/media?parent=8343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/categories?post=8343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/tags?post=8343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}