Conference/ Workshop/ Seminar/ Proceedings/ Lecture Series
Permanent URI for this community
Browse
Browsing Conference/ Workshop/ Seminar/ Proceedings/ Lecture Series by Title
Now showing 1 - 20 of 89
Results Per Page
Sort Options
Item A Survey of Cyber Crime Awareness among Netizens of Higher Education Institutions: A Case Study of Zetech University(Daystar University, Global Cybershield, 2024) Mwangi, Wambui Boniface; Nyambura, Hellen; Njeru, DanielProtecting the integrity and confidentiality of information in sophisticated network systems is becoming increasingly vital and difficult. The computer may have been used in order to commit the crime and in other cases the computer may have been the target of the crime. The purpose of this research was to determine the level of awareness of cyber-attacks among students and staff of higher education institutions and to propose mechanisms to overcome cybercrimes attacks. A mixed technique approach was utilized in the study. The study was conducted at Zetech University with a purposively randomly selected population of 260 staff and students, and a sample of 150 was obtained. The descriptive statistics was used in the quantitative design to show the distribution of scores using a few indices. According to the findings, 71 percent of the participants had no cyber security awareness training, whereas 41 percent had. It is impossible to exaggerate the value of workplace cyber security awareness. The majority of participants (91.1%) were aware of the many sorts of cybercrimes, whereas 8% were unsure. 58.9% of respondents strongly concurred that they had never trusted websites that asked for their bank card information. Focusing on cyber security awareness reduces cybercrimes by more than 50%, according to 65.2 percent of participants. 72.3 percent firmly agreed that using encryption techniques to safeguard sensitive information was a good idea. The study's findings demonstrate that a rise in cybercrime is causing physical harm to individuals, with the majority of respondents saying that hackers had stolen their data and harmed them. Based on our research, we advise higher education institutions to invest in cutting-edge research facilities, place more emphasis on internal and external cyber security research and development, and emphasize that top management allocates sufficient financial resources to IT infrastructure and cyber security awareness trainings. Higher education institutions should regularly host conferences and training sessions for all staff and students on cyber security. The team in charge of overseeing the networks and IT infrastructure must make sure that email filtering and intrusion detection systems have been put in place to detect harmful assaults on university networks and systems.Item AI Enhanced Education: Ethical Implications, Opportunities and Challenges(Daystar University, Higher Education eLearning Technologies International Conference, 2016) Lwala, Donald Akumu; Owino, Elizabeth AArtificial Intelligence (AI) is one of the most disruptive innovations of the modern times.In 2022 Open AI launched the first version of ChatGpt that changed the world’s view of the artificial intelligence. With the growth and prominence of AI various sectors of the economy have adopted and integrated AI in their daily functions and Education Sector is not exception (Chan & Hu, 2023). In the developed countries the adoption and use of AI in education and research has advanced significantly offering opportunities for adaptive learning and enhanced researchItem Application of International Law to Armed Conflict in Cyberspace: Challenges and Opportunities(Daystar University, Global Cybershield Conference, 2024) Ndegwa, Anne WambereThe rapid growth of the internet has increased global interconnectedness, making cyber activities increasingly significant in international relations. However, this interconnectedness has also introduced new challenges, as state and non-state actors now use cyberspace for armed conflict. Cyberspace is now considered the fifth frontier for armed conflict, alongside land, air, sea, and space. Conflicts like Russia-Ukraine and Israel-Palestine have demonstrated the use of cyber-attacks as tools of warfare, targeting critical infrastructure and impacting civilian life. In response, organizations like the North Atlantic Treaty Organization (NATO) and the African Union have acknowledged these threats, with NATO indicating that a cyber-attack on a member state could trigger the North Atlantic Treaty collective defense clause. Although states generally agree that international law applies to cyberspace, its application poses significant challenges. Experts argue that traditional legal frameworks are insufficient for addressing the unique characteristics of cyber-armed conflict, affecting overall cybersecurity resilience. This paper explores these challenges, focusing on issues like attribution, compliance with International Humanitarian Law, and a lack of effective enforcement mechanisms. The paper also identifies opportunities for enhancing resilience through applying international law, such as promoting greater international cooperation, building capacity in cybersecurity, and collaborating with non-state actors. To explore these challenges and opportunities, the paper adopts a doctrinal approach, conducting an in-depth review of primary sources such as regional agreements, treaties, and protocols, along with secondary sources like scholarly books, military manuals, and position papers. The paper concludes that the current framework of international law is inadequate for tackling the challenges posed by cyberspace, recommending the establishment of a universal treaty governing cyberspace to address these challenges and capitalize on the opportunities for a safer and more secure digital world.Item Application of Online Self-executing Multiple Choice Questions in The Assessment of Law Courses: The Daystar University Experience(Daystar University, Higher Education Learning Technologies International Conference, 2024) Wekesa, Moni; Mikinyango, AshaWe used MCQ assessment via the Daystar University LMS platform, MCQ assessment was necessitated by virtual learning The MCQs were self-executing - progammed to be available at chosen time last for a specified period give results promptly upon ‘submission’ Number of questions varied from 20- 100Item Artificial Intelligence(Daystar University, Higher Education eLearning Technologies International Conference, 2024) Ayiro, Laban PeterThe late 90s and early 21st century, AI technology became widely used as elements of larger systems, but the field is rarely credited for these successesItem Artificial Intelligence and Economic Development: A Review of a recent Publication on AI & ED for Scholars(Daystar University, Global Cybershield Conference, 2024) Simwa, R.O.,; Oburu, J.J.; Kirumbu,,M.K.This is a review of a recent article on the intersection area of Artificial Intelligence and Economic Development (Article: ). It is the intention of this review to focus mainly on the needs of researchers with interest in the updated relevant scholarly output. The content refers to the publication and in this review we identify findings touching on the goal of the review. In today’s environment of the rapid rise of Artificial Intelligence (AI), debate con- tinues about whether it has beneficial effects on economic development. However, there is only a fragmented perception of what role and place AI technology actually plays in Economic Development (ED). The paper in review, pioneers the research by focusing the detective work and discussion on the intersection of AI and economic development. Specifically, they adopt a two-step methodology. At the first step, they analyze 2211 documents in the AI&ED field using the bibliometric tool Bibliometrix, presenting the internal structure and external characteristics of the field through different metrics and algorithms. In the second step, they perform a qualitative content analysis of clusters calculated from the bibliographic coupling algorithm, detailing the content directions of recently distributed topics in the AI&ED field from different perspectives. The results of the bibliometric analysis suggest that the number of publications in the field has grown exponentially in recent years, and the most relevant source is the “Sustainability” journal. In addition, deep learning and data mining-related research are the key directions for the future. On the whole, scholars have dedicated to the field and developed close cooperation and communication across the board. Also, the content analysis demonstrates that most of the research is centered on the five facets namely, intelligent decision-making, social governance, labour and capital, Industry 4.0, and innovation. The results provide a forward- looking guide for scholars to grasp the current state and potential knowledge gaps in the AI&ED field.Item Balancing work and study: A necessity for successful distance learning(University of Nairobi, 2015-06) Ndiritu, A; Chandi, Rugendo; Rugendo, Caroline Marigu NyagaAs the country re- evaluates the achievement of Millennium goals, it becomes important for Kenya to take its toll. One of the intentions was to increase gross enrolment rate in higher education. The projection was to increase the number of students joining the universities to 450,000 by end of 2015 from 130,000 in 2008. This number was to be increased through expansion of courses done through distance education. The targeted population was of those already in employment. This group has to be able to balance the demands of their workplace and their social demands for the back to school agenda to be achieved. The University Of Nairobi School of continuing and distance education runs a course in distance education. However It has been noted that among the students who sit for university exams, many do not score 40% which is a minimum score for students to progress to the next level. The failure rate goes up to 63% with 27% out of 38% cases scoring below 40%, which is a very high failure rate. This failure rate prohibits students from graduating. it is worth finding out the cause of this failure rate. This study was carried out to find out if distance learners had a problem managing their time given the demands of the same among competing ends. An effort was also made to find out if this problem had an effect on their academic performance. From a total number of 4500 of students from the University of Nairobi in different levels of their B.Ed degrees, a sample of 650 students were selected using stratified random sampling technique .Data was collected using a mixed mode method and analyzed using Pearson correlations. The findings indicated a strong relationship between time management and academic performance (r=0.569)Item Behavioral Analysis and Predictive User Authentication in Zero Trust Architectures: A Systematic Review.(Daystar University, Global Cybershield, 2024) Ayuya, Caroline; Ayiro, Laban Peter; Osoro, Ragira EdwinBackground: Conventional biometric and authentication systems such as fingerprints, face recognition, and passwords are vulnerable to shoulder heat, surfing, and smudge attacks. This has resulted in the use of Behavioral analysis and predictive user authentication in the protection of Zero Trust Architectures (ZTAs). These approaches improve user identification and authentication, reducing cyber threats with continuous verification of access requests regardless of the user's location or device. Objectives: The review shows behavioral analysis and predictive user authentication as the main tools of ZTA, determining the trends, patterns and anomalies. Methodology: Databases such as Google Scholar, IEEE Xplore, Science Direct, Scopus, Embase and ACM were included in the search strategy. The articles from the period of 20202024 and peer-reviewed were chosen and reviewed according to the inclusion and exclusion criteria. The Critical Appraisal Skills Program (CASP) tool was employed to detect the quality of the studies and the extent of their risks of bias. Results: 12 studies met the criteria and were included in the final analysis. Those adopting supervised machine learning techniques like random forests (25%), support vector machines (17%), and neural networks (17%) for predictive user modeling. Approaches like clustering accounted for 17%. The most common data sources were network traffic (17%), application logs (17%), and user activity monitoring (9%). F1-score was the predominant evaluation metric (42%), followed by accuracy (33%). Reported F1 scores ranged from 0.71 to 0.94 across various techniques. Conclusions: This review confirms that behavioral analysis and predictive user authentication are ZTA's defenses against attacks. The results provide evidence-based proof of the effectiveness of these methods. They also contribute to the safety of the networks, data and systems in multiple industries.Item Best Practices for Adoption of Open Educational Resources in E-Learning in Universities: A Systematic Review of Literature(Daystar University, Higher Education eLearning Technologies International Conference, 2024) Yobera, Jane Wambua; Mbogo, Grace; Munyao, MartinThere are many repositories and websites available and suitable not only for OER search but for sharing OERs as well. There is a need to integrate OERs to your online classes. OER Quality Assessment Checklist. Based on Content, Instructional Design, Accessibility, and UsabilityItem "Celebration of Faith": Experiences from African Diaspora Communities in Europe(2020-05) Radoli, Lydia OumaThis was presented at the Runder Tisch Afrika ( Round Table Africa ) Conference - a group of partners and Networks with links and work in Africa. The conference held in August, 2017 in Cologne- Germany was to share a discussion on experiences of African Diaspora Communities in Europe. The focus of the presentation is linking religious experiences in Africa to realities in Europe. The presentation provokes the concept of "reverse missions". Reflecting that once Europeans brought religion to Africa, but churches in Europe are nearly non-existent. The arrival of Africans in Europe creates a melting pot for re-evangelism.Item Challenges of Academic Faculty and Opportunities in Virtual Learning at The University.(Daystar University, Higher Education Learning Technologies International Conference, 2024) Cherui, Rodgers Gowon; Waiyaki, WinnieFor several decades prior to the pandemic there was a move towards enhancing Information and Communication Technologies (ICTs) in learning ICTs were seen as the sure way to achieve all the SDGs. The Covid 19 Pandemic serendipitously provided an unprecedented opportunity to test the readiness of the education sector in the use of technology in teaching and learning. When traditional classroom learning was rendered impossible, institutions went into ICTS assisted learning. Literature has termed as online/distance learning. In addition is the concept of virtual learning that is also internet basedItem Communicating the Vote by Acclamation in Kenya Parliament: What does the Speaker Hear and whether it promotes democracy(Daystar University, School of Law, 2022) Kilonzo, KethiDistinguished Communication Scholar, Donald K. Smith (2013) asserts that “communication is what is heard, not only what is said. This assertion is in congruence with the communication process and models which appreciate the various elements that play a pivotal role in effective communication. One key determinant of effective communication is whether what the audience speaker hears and understands, is close or exact as what the source has said. This is the intended discourse of this paper, having in mind the Kenyan Parliament. After key issues have been debated, the speaker normally calls the house to vote on the motion. More often than not, the vote is by acclamation. And the decision is made by the speaker whether the AYEs or NAYs have it. This means that the decision is largely dependent on what the speaker hears, irrespective of how loud the AYEs or NAYs shout. In view of the foregoing and considering that members of parliament are the representatives of the people of Kenya, the mode of voting and how it is communicated is paramount. The fate of the sovereign will of the people and the promotion of democratic ideals depends on what the speaker hears through this mode of communicating the vote. The decision of the speaker further determines the extent to which the national values and principles of governance are upheld. It is therefore critical to examine this mode of communicating the vote with the following issues in mind; extent to which it realizes the sovereign will of the people; democratic ideals, constitutional values and principles of governance and established model(s) of effective communication, this paper scrutinizes select decisions that have been arrived at based on this approach and the significance of the same.Item Comparing Agenda-Setting Roles of Newspaper Columnists and Editorials in Kenya(2012) Ireri, KiokoThis research compares the agenda-setting roles of newspaper columnists and editorials in Kenya. It examines whether three newspaper columnists and editorials set the agenda on issues of national importance in 2008 and 2009. This was done by investigating whether there were any associations between issues given prominence in the opinion columns and editorials and what Kenyans, through public opinion polls, considered as the “most important problem” facing the country. The agendas of the columnists and editorials were also compared and investigated. Results show that there were no positive correlations between the agendas of the columnists and the public and between the agendas of the editorials and the public in 2008 and 2009. But there were moderate-positive and high-positive correlations when the agendas for columnists and editorials were matched and compared.Item Consumer Protection Law(Communication Authority of Kenya & Daystar University, School of Business and Economics, 2021-09) Kamiti, BonifaceConsumer Protection Law refers to actions taken by the government to provide and ensure the attainment of consumer rightsItem Courting Trauma: An Unspoken Mental Health Crisis Among Journalists in East Africa(Research Association for Interdisciplinary Studies, 2023-08) Radoli, Lydia OumaFor journalists covering trauma, capturing horrific images is part of the job. Each assignment feeds into the next, creating a cycle of witnessing horror. The story begins with getting the visuals, talking to witnesses, recording evidence, packaging, and relaying to the audience. The story is not worthwhile without visuals. However, every traumatic image captured is seared in the journalist’s cerebral cortex. In this delicate space, the images live and become part of the journalist’s internal memory. A silent companion, a constant reminder of the horror the journalist has witnessed - signaling a courtship of sorts. Using narrativity and in-depth interviews as qualitative methods, the paper situates the problem of a mental health crisis among journalists in East Africa covering traumatic events. Through in-depth interviews, narratives of journalists from Kenya, Uganda, and Rwanda indicate a courtship with trauma in the line of duty. The journalists are contextualized as visual rhetors – engaged in the production and dissemination of horrific or difficult visual content. Frost (2019) describes visual rhetors as journalists who witness and produce visual frames of the dark side. This form of media practice produces images of violent conflicts. Learning from Visual Rhetoric and Dual Representation theoretical frames, the paper examines a correlation between visual rhetors ’exposure to horrific images and trauma. Arguing that visual rhetors’ multiple exposure to traumatic images in the production process causes trauma. The escalation of trauma as a mental health issue among visual rhetors is seldom talked about, yet it poses a mounting crisis that demands intervention.Item Determinants of E-Learning Adoption by Learners: A Case of the Kenya Medical Training College, Nairobi, Kenya(Daystar University, Higher Education Learning Technologies International Conference, 2024) Mungathia, Mary KiendeThe purpose of the study is to establish factors that increase eLearning adoption by learners at KMTC Nairobi. Factors related to ease of access and use of technology, learners’ perceptions of skills related to eLearning, and institutional factors were key objectives of the study. Instructors’ use of ICT, learners’ behavioural intention of use and usefulness of technology influence eLearning adoption (Yakubu and Dasuki, (2018); Ja’ashan, M.N.H, (2020); Njoroge H, (2018). Synchronous and asynchronous eLearning are pedagogical pathways that allow student-centred, and rewarding learning experiences (Zalat M.M., et al 2021).Item Digital Technology and Community Empowerment: Bridging the Rural-Knowledge Centre Gap(Kirinyaga University, Kenya, 2024-03-28) Kimote, Zipporah; Mutunga, DanielRural communities in developing countries continue to experience marginalization due to centralization of services in urban areas and institutions. The imbalance in the distribution of resources and provision of services isolate rural communities making them to remain ignorant of the advancements that can lead to the socio-economic transformation of their life. Rural communities lack access to innovations and knowledge necessary for their transformation due to lack of good and effective channels for relaying information or mechanisms that can enable them to tap the knowledge they need to broaden their world view, interpret their situations, and address the barriers that prevent them from taking control of their life. Government and non-government agencies through their research and practice have current knowledge and information on different issues that have remained a distraction to communities’ transformation over the years, which if disseminated would enhance problem-solving ability of the said communities. Knowledge is power and does free people from the bondage of ignorance and set them on a firm and high ground where they discover themselves, interpret reality with confidence, and make decisions that improve their wellbeing. This paper argues that rural communities can be empowered by bridging the gap between rural communities through enhanced knowledge management strategies to develop problem-solving skills. Through an extensive review of existing literature, this study seeks to explore different strategies for disseminating knowledge to communities using digital technology. It will further examine how government agencies, not for profit organizations and local community initiatives can facilitate access to information and enhance digital literacy among rural communities. The findings of the study will help in drawing conclusions and recommendations.Item Does Digital Transformation of Higher Education Institutions in Africa Matter(Daystar University, Higher Education E-Learning Technologies International Conference, 2024) Kashorda, MeoliKenya Education Network Registered Trustees (KENET) role as NREN of Kenya Why Does Digital Transformation Matter for Africa in 2nd Quarter of the 21st Century? What is the motivation for Digital Transformation Higher Education Institutions? Measuring the Readiness for Digital Transformation at national and institutional levels – data, data, data Networked Readiness Index model E-readiness framework and 2019 results What are the risks inadequate readiness for digital transformation for HE? ConclusionsItem Does Kenya Practice Democracy or Epistocracy?(Daystar University, School of Law, 2022) Wekesa, MoniThe constitution of Kenya places the common person at the centre of democracy, starting from the preamble. Article 10 places public participation at the centre of decision making in matters affecting the common man, all government institutions are bound to involve the common person in policy making. The constitution prescribes public participation by giving the common man right to decide how he is to be governed, political rights such as vying for elective positions, voting and participating in constitutional referendums. This is based on the presumption that they can make informed choices. However, based on the elite theory of democracy where the elites are bound to rule - and as such use their wealth, connections and the fact that they are more educated than the average citizen, to control decisions and events within a state it is questionable whether in fact the common person does participate in effective democracy. There elites include ‘political’ brokers who are also ‘deep state’, and who influence legislation, appointments and even voting. These elites are sometimes referred to as epistocrats. The elites occupy a ‘privileged’ position in society that makes society listen to them. This then begs the question whether it is the common person or the epistocrats who actually determine the form of governance in Kenya. This paper uses a comparative approach on constitutional amendment procedures and practices to evaluate the sovereignty of the common person in Kenya.Item Educational and Training sciences at University Medical Center Utrecht (The Netherlands).(Daystar University, Higher Education Learning Technologies International Conference, 2024-02-24) Lesterhuis, MarijeVR – average to high satisfaction – however difference depending on the learning goal and type of VR Learning – different between pilots in design and in satisfaction Context – all difficulties with alignment, all show the importance of teacher skills