Access peer-reviewed publications, datasets, impact assessments, and market intelligence produced by Empacode Africa and our academic partners.
🔍 Search the Repository
Popular Topics
Snakebites remain a major yet long-neglected public health burden, disproportionately affecting the poor communities inrural Uganda. Households continue to unfairly spend out of pocket on snakebites and are further pushed into poverty. Thestudy estimated household economic burdens, Catastrophic Health Expenditure (CHE), and associated socioeconomicinequalities from snakebites in Eastern Uganda
This study aimed at developing a comprehensive framework that enhances cyber security and improves vulnerability management in a digital environment. The study reviewed the challenges of vulnerability management in digital environments, with a focus on cyber-physical power systems (CPPS). Through a comprehensive literature review, existing Cyber Security frameworks like NIST, ISO 27001, and ISA/IEC 62443 were evaluated based on their applicability to CPPS. Key vulnerabilities and threat vectors unique to the integration of operational technology and information technology in CPPS were identified. The dual role of artificial intelligence (AI) in enhancing Cyber Security defences while enabling sophisticated AI-driven attacks was explored. Gaps in current frameworks, such as the lack of standardized AI integration and real-time threat detection capabilities, were highlighted. The study synthesized its findings to propose a comprehensive framework that addresses these gaps such as providing guidelines for secure AI adoption and offering strategies to mitigate emerging cyber threats effectively. The study recommended developing AI-specific security protocols, fostering interdisciplinary collaboration, and ensuring continuous framework updates to match the evolving cyber threat landscape. This research aimed to strengthen Cyber Security resilience in critical digital infrastructures.
The rapidly evolving landscape of cyber threats necessitates robust and adaptable strategies to safeguard networking. This study explores the development and evaluation of a comprehensive framework for threat mitigation, integrating advanced methodologies from cybersecurity, risk management, and threat intelligence. Leveraging a mixed-methods approach, including surveys and secondary data analysis, the research assesses current practices and identifies critical gaps in existing frameworks. The proposed multi-layered defense mechanism incorporates proactive and reactive measures, aligning real-time threat intelligence with sophisticated incident response strategies. Key components such as anomaly detection systems, employee training, and continuous security audits are highlighted as essential elements of the framework. Through extensive validation, including empirical tests and case studies, the framework demonstrates its efficacy in enhancing organizational resilience against complex cyber threats. The findings provide valuable insights into the practical application of integrated cybersecurity measures, offering a scalable and flexible solution tailored to the dynamic nature of digital security challenges. This study addresses the critical need for an adaptable and holistic approach to threat mitigation, contributing to the field of cybersecurity with actionable strategies for managing and mitigating digital threats
Maternal health, infectious disease, and health systems strengthening across sub-Saharan Africa.
312 publications →
Cybersecurity, AI adoption, digital transformation, and software engineering research.
218 publications →
Mobile money, SME growth, financial inclusion, and macroeconomic analysis.
196 publications →
Looking for a specialized study, evaluation, or impact assessment? Empower your decisions with our expert research team. We provide tailored research services for NGOs and international organizations.
📝 Research Request Form









