{"id":9959,"date":"2025-12-10T08:29:14","date_gmt":"2025-12-10T08:29:14","guid":{"rendered":"https:\/\/kibu.ac.ke\/sgs\/?p=9959"},"modified":"2025-12-10T08:30:32","modified_gmt":"2025-12-10T08:30:32","slug":"evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/","title":{"rendered":"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9959\" class=\"elementor elementor-9959\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-783a5b0c elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"783a5b0c\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c17303e\" data-id=\"2c17303e\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7edd218e elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"7edd218e\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52614665 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"52614665\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-174f0c35\" data-id=\"174f0c35\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2c55acc0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c55acc0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-65dd662a elementor-invisible\" data-id=\"65dd662a\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-425b7dc7 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"425b7dc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2025<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-38b8d6e6 elementor-invisible\" data-id=\"38b8d6e6\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11412ef3 elementor-widget elementor-widget-heading\" data-id=\"11412ef3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42f9b419 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"42f9b419\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Joshua Okemwa<br \/>Samuel Mbuguah<br \/>Patrick Owoche<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-36c4372f elementor-invisible\" data-id=\"36c4372f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9627c02 elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"9627c02\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/journalwjaets.com\/content\/evaluating-impact-security-techniques-semantic-interoperability-kenyas-distributed-health\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5771d623 elementor-widget elementor-widget-heading\" data-id=\"5771d623\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-608112d2 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"608112d2\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The rise of distributed health information systems in Kenya has brought significant opportunities for enhancing clinical efficiency and patient outcomes through electronic data exchange. However, semantic interoperability, the ability of systems to exchange data with shared, unambiguous meaning, remains severely constrained by inconsistent adoption of security techniques such as access control and encryption. Weak security measures not only compromise data integrity and confidentiality but also hinder healthcare professionals&#8217; trust and willingness to engage in interoperable data exchange. This study aimed to evaluate the impact of security techniques on semantic interoperability in Kenya\u2019s distributed healthcare systems. The central research question guiding this inquiry was: What is the impact of security techniques on semantic interoperability in healthcare data exchange? The target population consisted of healthcare professionals, system administrators, developers, and records officers in four Level 5 hospitals across Kenya: Kisii, Nyeri, Nakuru, and Coast General Teaching and Referral Hospital. A sample of 301 respondents was determined using Yamane\u2019s formula, with participants selected through purposive and stratified random sampling techniques. Data collection employed structured questionnaires, complemented by interviews and focus group discussions for triangulation. Descriptive statistics (frequencies, percentages, means) were used to summarize respondent characteristics and perceptions. Inferential analysis included Spearman\u2019s correlation, Mann-Whitney U test, and bootstrapped mediation analysis, conducted using SPSS to explore the relationship between security techniques and semantic interoperability, as well as the mediating role of system usability. Ethical approval was obtained from the National Commission for Science, Technology and Innovation (NACOSTI) and respective hospital boards. Informed consent was secured from all participants, and data confidentiality was strictly maintained. Findings revealed a significant but weak positive correlation between security techniques and semantic interoperability (\u03c1 = .053, p = .002). Descriptively, institutions that reported higher levels of access control and encryption practices showed increased semantic data exchange effectiveness. The Mann-Whitney U test confirmed statistically significant differences in semantic interoperability scores between institutions with robust and weak security practices (U = 7425, p = .005). Moreover, system usability was found to significantly mediate the relationship between security techniques and semantic interoperability (\u03b2 = .400, p &lt; .001), underscoring the importance of user-centered design in leveraging security for interoperability gains. The study concludes that while security techniques positively influence semantic interoperability, their impact is contingent upon the usability of health information systems. It recommends the national enforcement of security protocols such as role-based access control (RBAC) and encryption standards, alongside targeted training programs to enhance system usability among healthcare staff. Strengthening both technical safeguards and human-centered design will be critical in advancing trustworthy and interoperable healthcare data exchange in Kenya\u2019s distributed environments.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2025 Authors Joshua OkemwaSamuel MbuguahPatrick Owoche VIEW ON PUBLISHER SITE Abstract The rise of distributed health information systems in Kenya has brought significant opportunities for enhancing clinical efficiency and patient outcomes through electronic data exchange. However, semantic interoperability, the ability of systems to exchange data with shared, unambiguous meaning, remains severely constrained by inconsistent adoption [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-9959","post","type-post","status-publish","format-standard","hentry","category-publications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems - School of Graduate Studies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems - School of Graduate Studies\" \/>\n<meta property=\"og:description\" content=\"2025 Authors Joshua OkemwaSamuel MbuguahPatrick Owoche VIEW ON PUBLISHER SITE Abstract The rise of distributed health information systems in Kenya has brought significant opportunities for enhancing clinical efficiency and patient outcomes through electronic data exchange. However, semantic interoperability, the ability of systems to exchange data with shared, unambiguous meaning, remains severely constrained by inconsistent adoption [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Graduate Studies\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-10T08:29:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T08:30:32+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\"},\"headline\":\"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems\",\"datePublished\":\"2025-12-10T08:29:14+00:00\",\"dateModified\":\"2025-12-10T08:30:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/\"},\"wordCount\":444,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"articleSection\":[\"Publications\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/\",\"name\":\"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems - School of Graduate Studies\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\"},\"datePublished\":\"2025-12-10T08:29:14+00:00\",\"dateModified\":\"2025-12-10T08:30:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/sgs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"name\":\"School of Graduate Studies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#organization\",\"name\":\"School of Graduate Studies\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png\",\"width\":1220,\"height\":1100,\"caption\":\"School of Graduate Studies\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/sgs\"],\"url\":\"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems - School of Graduate Studies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/","og_locale":"en_US","og_type":"article","og_title":"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems - School of Graduate Studies","og_description":"2025 Authors Joshua OkemwaSamuel MbuguahPatrick Owoche VIEW ON PUBLISHER SITE Abstract The rise of distributed health information systems in Kenya has brought significant opportunities for enhancing clinical efficiency and patient outcomes through electronic data exchange. However, semantic interoperability, the ability of systems to exchange data with shared, unambiguous meaning, remains severely constrained by inconsistent adoption [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/","og_site_name":"School of Graduate Studies","article_published_time":"2025-12-10T08:29:14+00:00","article_modified_time":"2025-12-10T08:30:32+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8"},"headline":"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems","datePublished":"2025-12-10T08:29:14+00:00","dateModified":"2025-12-10T08:30:32+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/"},"wordCount":444,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"articleSection":["Publications"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/","url":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/","name":"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems - School of Graduate Studies","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#website"},"datePublished":"2025-12-10T08:29:14+00:00","dateModified":"2025-12-10T08:30:32+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/sgs\/evaluating-the-impact-of-security-techniques-on-semantic-interoperability-in-kenyas-distributed-health-information-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/sgs\/"},{"@type":"ListItem","position":2,"name":"Evaluating the impact of security techniques on semantic interoperability in Kenya\u2019s Distributed Health Information Systems"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/sgs\/#website","url":"https:\/\/kibu.ac.ke\/sgs\/","name":"School of Graduate Studies","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/sgs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/sgs\/#organization","name":"School of Graduate Studies","url":"https:\/\/kibu.ac.ke\/sgs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","contentUrl":"https:\/\/kibu.ac.ke\/sgs\/wp-content\/uploads\/2025\/11\/KIbabii-Logo.png","width":1220,"height":1100,"caption":"School of Graduate Studies"},"image":{"@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/3c7b50037f622e72b7023aafee6ed8f8","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/sgs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/sgs"],"url":"https:\/\/kibu.ac.ke\/sgs\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/9959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/comments?post=9959"}],"version-history":[{"count":4,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/9959\/revisions"}],"predecessor-version":[{"id":9964,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/posts\/9959\/revisions\/9964"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/media?parent=9959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/categories?post=9959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/sgs\/wp-json\/wp\/v2\/tags?post=9959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}