Global Cybershield Conference

Browse

Recent Submissions

Now showing 1 - 12 of 12
  • Item
    Leveraging Ml and AI in Advancing Public Health Officers’ Practice in Premise Inspection.
    (Daystar University, Global Cybershiled., 2024) Odero, Collince Omondi
    In Kenya, the public health profession faces several challenges which contribute to noncompliance with public health requirements. Machine learning (ML), and Artificial intelligence (AI) tools have become popular in the country, and globally, such as ChatGPT. ML and AI can leverage public health activities and improve the outcomes and practice competence during premise inspections. This study aims to examine ML and AI’s role in advancing public health officers’ practice with a focus on premise inspection. Digital tools can generate output for premise inspection in various priority areas and compared with contemporary public health practices, and existing public health literature. The key priorities in sanitary premise inspection for compliance with public health to be examined will include sanitary inspection goals, inspection forms, licenses and certificates, and sanitary requirements for food premises. The contextual role of ML and AI will be discussed to establish their relevance to improving public health services in domains such as inspection, checklist development, inspection report writing, and premise compliance with statutory notices among premise owners. AI must be thoughtfully embraced at professional level (public health officers, health structure, health service tiers). This is because it can generate trustworthy suggestions for premise inspection and evade committing public health offences. In this regard, AI can potentially play a role in preventing diseases and promoting health in both urban and rural communities. Recommendations will be provided on limitations encountered and appropriate suggestions given on the potential value or opportunities of ML and Ai in public health inspections.
  • Item
    A Survey of Cyber Crime Awareness among Netizens of Higher Education Institutions: A Case Study of Zetech University
    (Daystar University, Global Cybershield, 2024) Mwangi, Wambui Boniface; Nyambura, Hellen; Njeru, Daniel
    Protecting the integrity and confidentiality of information in sophisticated network systems is becoming increasingly vital and difficult. The computer may have been used in order to commit the crime and in other cases the computer may have been the target of the crime. The purpose of this research was to determine the level of awareness of cyber-attacks among students and staff of higher education institutions and to propose mechanisms to overcome cybercrimes attacks. A mixed technique approach was utilized in the study. The study was conducted at Zetech University with a purposively randomly selected population of 260 staff and students, and a sample of 150 was obtained. The descriptive statistics was used in the quantitative design to show the distribution of scores using a few indices. According to the findings, 71 percent of the participants had no cyber security awareness training, whereas 41 percent had. It is impossible to exaggerate the value of workplace cyber security awareness. The majority of participants (91.1%) were aware of the many sorts of cybercrimes, whereas 8% were unsure. 58.9% of respondents strongly concurred that they had never trusted websites that asked for their bank card information. Focusing on cyber security awareness reduces cybercrimes by more than 50%, according to 65.2 percent of participants. 72.3 percent firmly agreed that using encryption techniques to safeguard sensitive information was a good idea. The study's findings demonstrate that a rise in cybercrime is causing physical harm to individuals, with the majority of respondents saying that hackers had stolen their data and harmed them. Based on our research, we advise higher education institutions to invest in cutting-edge research facilities, place more emphasis on internal and external cyber security research and development, and emphasize that top management allocates sufficient financial resources to IT infrastructure and cyber security awareness trainings. Higher education institutions should regularly host conferences and training sessions for all staff and students on cyber security. The team in charge of overseeing the networks and IT infrastructure must make sure that email filtering and intrusion detection systems have been put in place to detect harmful assaults on university networks and systems.
  • Item
    Leveraging AI in Advancing Public Health Officers’ Practice in Sanitary Premise Inspection: A Demonstrative Study.
    (Daystar University, Global Cybershield., 2024) Odero, Collince Omondi
    In Kenya, the public health profession faces several challenges which contribute to noncompliance with public health requirements. Artificial intelligence (AI) tools have become popular in the country, such as ChatGPT which can be accessed by the public, including public health officers. ChatGPT can leverage public health activities and improve the outcomes and practice competence during premise inspections. This study aims to examine AI’s role in advancing public health officers’ practice with a focus on premise inspection. This study employs the demonstration method where the generative AI tool, ChatGPT, will be used to generate output for premise inspection in various priority areas and compared with contemporary public health practices, and existing public health literature. The key priorities in sanitary premise inspection for compliance with public health to be examined will include sanitary inspection goals, inspection forms, licenses and certificates, and sanitary requirements for food premises. The contextual replies from ChatGPT will be discussed to establish their relevance to improving public health services in domains such as inspection, checklist development, inspection report writing, and premise compliance with statutory notices among premise owners. AI must be thoughtfully embraced at both the community level (premise owners, general public) and professional level (public health officers, health structure, health service tiers). This is because it can generate trustworthy suggestions for compliance with premise inspection requirements and evade committing public health offences. In this regard, AI can potentially play a role in preventing diseases and promoting health in both urban and rural communities. Recommendations will be provided on limitations encountered and appropriate suggestions given on the potential value or opportunities of ChatGPT in public health inspections.
  • Item
    The Impact of Digital Education Initiatives on Enhancing Awareness and Mitigation on Cybercrime among the Youth in Kenya.
    (Daystar University, Global Cybershield, 2024) Musya, Justus Katoo
    The study will address the impact of digital education initiatives on enhancing awareness and mitigation on cybercrime among the youth in Kenya through the data obtained from secondary sources. The study will be a desk research that will concentrate on the published reports and released case studies. The researcher will review various aspects of digital education initiatives, by looking at how it has enhanced awareness on cybercrime in Kenya. It will touch on various kinds of digital education, their level of application, how they are used to promote awareness on cybercrime among the Kenyan youth. The researcher will explore existing data from the previous research and existing public documents together data relating to the study topic. The research method of desk research is appropriate for this study since the topic of cybercrime has got very many publications and other public journals that can be used to inform the study. In this study, the primary objective of desk review will be to identify relevant data sources, assess the quality of data, and identify gaps where further research may be needed. The information obtained from this study will be informative and it’s expected to help policy makers in education towards improving learning programs and contents in digital education. The study will explore the Rational Choice Theory which suggests that individuals engage in computer crime because they believe it is a profitable and low-risk activity and the learning theory of cybercrime which states that the offenders in a cybercrime often learn the sophisticated techniques by associating with other online deviant peers. The study is therefore expected to be very informative to the youths in Kenya towards combating cybercrime cases.
  • Item
    Behavioral Analysis and Predictive User Authentication in Zero Trust Architectures: A Systematic Review.
    (Daystar University, Global Cybershield, 2024) Ayuya, Caroline; Ayiro, Laban Peter; Osoro, Ragira Edwin
    Background: Conventional biometric and authentication systems such as fingerprints, face recognition, and passwords are vulnerable to shoulder heat, surfing, and smudge attacks. This has resulted in the use of Behavioral analysis and predictive user authentication in the protection of Zero Trust Architectures (ZTAs). These approaches improve user identification and authentication, reducing cyber threats with continuous verification of access requests regardless of the user's location or device. Objectives: The review shows behavioral analysis and predictive user authentication as the main tools of ZTA, determining the trends, patterns and anomalies. Methodology: Databases such as Google Scholar, IEEE Xplore, Science Direct, Scopus, Embase and ACM were included in the search strategy. The articles from the period of 20202024 and peer-reviewed were chosen and reviewed according to the inclusion and exclusion criteria. The Critical Appraisal Skills Program (CASP) tool was employed to detect the quality of the studies and the extent of their risks of bias. Results: 12 studies met the criteria and were included in the final analysis. Those adopting supervised machine learning techniques like random forests (25%), support vector machines (17%), and neural networks (17%) for predictive user modeling. Approaches like clustering accounted for 17%. The most common data sources were network traffic (17%), application logs (17%), and user activity monitoring (9%). F1-score was the predominant evaluation metric (42%), followed by accuracy (33%). Reported F1 scores ranged from 0.71 to 0.94 across various techniques. Conclusions: This review confirms that behavioral analysis and predictive user authentication are ZTA's defenses against attacks. The results provide evidence-based proof of the effectiveness of these methods. They also contribute to the safety of the networks, data and systems in multiple industries.
  • Item
    Translating Ethical AI Principles into Practice: Bridging the Gap in Kenya
    (Daystar University, Global Cybershield Conference, 2024) Ogore, Fredrick Michael
    In order to close the gap between ethical principles in artificial intelligence (AI) theory and their real-world implementation throughout Kenya, this research offers a thorough guide. It provides a structured method for integrating ethics into the AI development cycle, addressing the crucial problem of converting moral precepts into practical frameworks. The goal of the guide is to provide all relevant parties including corporations, governments, and legislators with the information and resources they need to successfully negotiate the murky waters of AI ethics. It will provide guidelines for creating a responsible AI culture, using national laws and already-existing policies like the Africa Union Data Policy Framework as pillars. The report will offer suggestions for promoting ethical AI innovation, stressing the significance of outcomes-based regulation and the incorporation of AI assistive technologies for people with disabilities. Kenya can move toward a future where AI positively impacts social welfare and economic inclusion by embracing the values outlined in this guide, ensuring that technological advancements are morally sound and advantageous to all.
  • Item
    Rhetoric’s Impact on the Creation of Laws and Regulations for Responsible AI Development
    (Daystar University, Global Cybershield Conference, 2024) Andrew, Ann
    Rapid advancements in artificial intelligence (AI) have raised concerns about the potential effects these technologies may have on society and the need for robust legal and regulatory frameworks to ensure responsible development. In this case, rhetoric is essential to building these frames. The search results show how industry associations and AI companies are using persuasive communication strategies to frame the "AI ethics" argument in a way that favors self-regulation over more legal authority. Oftentimes at the expense of addressing fundamental issues of accountability, bias, and human rights, rhetoric is being used to downplay the risks associated with AI systems and to promote a narrative of technological progress and advancement. However, advocates of more stringent legal frameworks to regulate the development and use of AI are utilizing language to back up politicians, legal experts, and civil society organizations. They are highlighting the flaws in industry-led "AI ethics" programs and advocating for the law and legal institutions to take a leading role in ensuring the moral application of these revolutionary technologies. The search results also demonstrate the impact of language on court cases and trials concerning the use of copyrighted information by generative AI models, which has significant implications for the evolving legal landscape. Additionally, studies have shown that the way artificial intelligence's "risks" and "benefits" are framed rhetorically can influence how the public perceives and embraces these technologies, which in turn influences how laws and policies are put into place. By examining the role of rhetoric in this context, academics can provide insight on the complex interplay between language, power, and the management of AI systems. With this information, policymakers can make better decisions and ensure that AI development complies with the law and social standards.
  • Item
    Ethical Research Using Artificial Intelligence in Academic Research: A Systematic Review of Current Practices, Challenges, and Future Directions.
    (Daystar University, Global Cybershield Conference, 2024) Ogore, Fredrick Michael
    The ethical implications of using artificial intelligence (AI) in academic research are examined in this systematic review, which also covers present practices, obstacles, and suggested future paths. Using a variety of primary and secondary sources, the study seeks to present a thorough review of the ethical issues raised by the application of AI technology in academic research. The first section of the paper outlines the fundamental ideas of ethical research, stressing the significance of openness, justice, and the defense of individual rights in the context of AI applications. After that, it analyzes how ethical research methods are currently going, showing areas where academics and institutions agree and disagree. The danger of algorithmic bias, the necessity of strong data governance, and the necessity of transparently communicating AI methods and results are some of the major issues that are covered. The study delves into new techniques for tackling these issues, including the creation of moral standards, encouraging openness in AI research, and fostering interdisciplinary approaches to moral investigation. In the future, the study suggests a number of research avenues, such as investigating new ethical frameworks appropriate for the intricacies of artificial intelligence, improving public participation mechanisms in AI research, and pursuing international collaboration to create worldwide guidelines for moral AI research. In the end, this systematic study aims to highlight the importance of ethical considerations in the development of AI technologies and to educate and motivate future conversations on the ethical implications of AI in academic research.
  • Item
    Artificial Intelligence and Economic Development: A Review of a recent Publication on AI & ED for Scholars
    (Daystar University, Global Cybershield Conference, 2024) Simwa, Richard Onyino; Oburu, J.J.; Kirumbu, Michael Kiura
    This is a review of a recent article on the intersection area of Artificial Intelligence and Economic Development (Article: ). It is the intention of this review to focus mainly on the needs of researchers with interest in the updated relevant scholarly output. The content refers to the publication and in this review we identify findings touching on the goal of the review. In today’s environment of the rapid rise of Artificial Intelligence (AI), debate con- tinues about whether it has beneficial effects on economic development. However, there is only a fragmented perception of what role and place AI technology actually plays in Economic Development (ED). The paper in review, pioneers the research by focusing the detective work and discussion on the intersection of AI and economic development. Specifically, they adopt a two-step methodology. At the first step, they analyze 2211 documents in the AI&ED field using the bibliometric tool Bibliometrix, presenting the internal structure and external characteristics of the field through different metrics and algorithms. In the second step, they perform a qualitative content analysis of clusters calculated from the bibliographic coupling algorithm, detailing the content directions of recently distributed topics in the AI&ED field from different perspectives. The results of the bibliometric analysis suggest that the number of publications in the field has grown exponentially in recent years, and the most relevant source is the “Sustainability” journal. In addition, deep learning and data mining-related research are the key directions for the future. On the whole, scholars have dedicated to the field and developed close cooperation and communication across the board. Also, the content analysis demonstrates that most of the research is centered on the five facets namely, intelligent decision-making, social governance, labour and capital, Industry 4.0, and innovation. The results provide a forward- looking guide for scholars to grasp the current state and potential knowledge gaps in the AI&ED field.
  • Item
    Application of International Law to Armed Conflict in Cyberspace: Challenges and Opportunities
    (Daystar University, Global Cybershield Conference, 2024) Ndegwa, Anne Wambere
    The rapid growth of the internet has increased global interconnectedness, making cyber activities increasingly significant in international relations. However, this interconnectedness has also introduced new challenges, as state and non-state actors now use cyberspace for armed conflict. Cyberspace is now considered the fifth frontier for armed conflict, alongside land, air, sea, and space. Conflicts like Russia-Ukraine and Israel-Palestine have demonstrated the use of cyber-attacks as tools of warfare, targeting critical infrastructure and impacting civilian life. In response, organizations like the North Atlantic Treaty Organization (NATO) and the African Union have acknowledged these threats, with NATO indicating that a cyber-attack on a member state could trigger the North Atlantic Treaty collective defense clause. Although states generally agree that international law applies to cyberspace, its application poses significant challenges. Experts argue that traditional legal frameworks are insufficient for addressing the unique characteristics of cyber-armed conflict, affecting overall cybersecurity resilience. This paper explores these challenges, focusing on issues like attribution, compliance with International Humanitarian Law, and a lack of effective enforcement mechanisms. The paper also identifies opportunities for enhancing resilience through applying international law, such as promoting greater international cooperation, building capacity in cybersecurity, and collaborating with non-state actors. To explore these challenges and opportunities, the paper adopts a doctrinal approach, conducting an in-depth review of primary sources such as regional agreements, treaties, and protocols, along with secondary sources like scholarly books, military manuals, and position papers. The paper concludes that the current framework of international law is inadequate for tackling the challenges posed by cyberspace, recommending the establishment of a universal treaty governing cyberspace to address these challenges and capitalize on the opportunities for a safer and more secure digital world.
  • Item
    Localized AI-Driven Remote Monitoring and Predictive Analytics to Enhance Maternal Health in Rural Kenya: Bridging Accessibility and High-Risk Pregnancy Management
    (Daystar University, Global Cybershield Conference, 2024) Oburu, Jeffar J.; Simwa, Richard Onyino
    Maternal health services in rural Kenya face significant challenges including limited access to healthcare facilities, a shortage of trained healthcare personnel, and inadequate monitoring of high-risk pregnancies. These factors contribute to high maternal and infant mortality rates. Current advancements in AI offer a potential solution to these issues, yet their application in this specific context remains underexplored. This study aims to fill this gap by developing a localized AI-driven remote monitoring system that utilizes predictive analytics for early detection and continuous management of high-risk pregnancies. This system will be integrated with a mobile health (mHealth) application designed to disseminate crucial health information and reminders to expectant mothers. The primary objective is to enhance maternal health outcomes by leveraging advanced AI technologies tailored to the local context of rural Kenya. The research will begin with a needs assessment through surveys and focus group discussions with local healthcare providers and expectant mothers to identify specific challenges and requirements. Based on these insights, a localized AI-driven remote monitoring system will be developed to track high-risk pregnancies, while predictive analytics will be employed to forecast potential complications. Additionally, the mHealth application will provide critical health information and timely reminders. The effectiveness of these interventions will be evaluated using a quasi-experimental design, comparing maternal and infant mortality rates, healthcare accessibility, and user satisfaction between intervention and control groups. This research aims to demonstrate the transformative potential of AI in addressing maternal health challenges in rural Kenya, offering a scalable model for similar regions globally. Anticipated outcomes include reduced maternal and infant mortality rates, improved healthcare access, and enhanced delivery of maternal health services.
  • Item
    Exploring Harmonic Encryption Paradigm That Fuses Music And Cryptography In Enhancing Data Security
    (Daystar University, Global Cybershield Conference, 2024) Omollo, Richard Otieno; Bullindah, Jacqueline Zinale
    We live in an era where cybersecurity threats are escalating astronomically necessitating the need to safeguard user data, both in transit and stationary mode. We appreciate that traditional cryptographic techniques offer formidable protection to user data but there are still emerging security challenges thus qualifying the urgent need to consider innovative ways to enhance data security techniques. It is against the backdrop of this that our paper advances the concept of Harmonic Encryption, a novel paradigm that combines the realms of music and cryptography to enhance data security measures. We argue that by coupling the mathematical rigor of cryptography with the emotive power and structural intricacies of music, this concept of Harmonic Encryption extends the traditional security paradigms by offering a multifaceted approach to safeguarding sensitive data in corporate and organizational settings. We undertake the interdisciplinary synthesis of music theory, signal processing, and cryptographic principles to illuminate the theoretical foundations and practical implementations of Harmonic Encryption. We considered exploring various aspects including the use of musical sequences as cryptographic keys, the integration of steganographic techniques within audio streams, and the application of musical listening patterns for biometric authentication. Our empirical evaluations demonstrate the effectiveness of Harmonic Encryption against a range of security threats. Moreover, we discuss the implications of Harmonic Encryption in diverse domains, including corporate data protection, digital rights management, and secure communication protocols. In conclusion, this research work contributes to the rapidly growing field of interdisciplinary studies at the intersection of music and cryptography, availing new perspectives and methodologies for advancing data security in an increasingly interconnected digital landscape.