{"id":16,"date":"2024-05-23T14:33:56","date_gmt":"2024-05-23T14:33:56","guid":{"rendered":"http:\/\/196.216.247.163\/?page_id=16"},"modified":"2025-03-20T13:20:09","modified_gmt":"2025-03-20T10:20:09","slug":"publications","status":"publish","type":"page","link":"https:\/\/georgeoreku.org\/index.php\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"16\" class=\"elementor elementor-16\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71c4a90 e-flex e-con-boxed e-con e-parent\" data-id=\"71c4a90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e0f590 elementor-widget elementor-widget-spacer\" data-id=\"6e0f590\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb61c3d elementor-widget elementor-widget-heading\" data-id=\"fb61c3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Publications<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3ae532 elementor-widget elementor-widget-spacer\" data-id=\"f3ae532\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d98082 e-flex e-con-boxed e-con e-parent\" data-id=\"7d98082\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc7d875 elementor-widget elementor-widget-text-editor\" data-id=\"cc7d875\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table id=\"gsc_a_t\">\n<thead>\n<tr id=\"gsc_a_trh\">\n<th class=\"gsc_a_t\" scope=\"col\"><span id=\"gsc_a_ta\"><a class=\"gsc_a_a\" href=\"https:\/\/scholar.google.com\/citations?hl=en&amp;user=tG-McVkAAAAJ&amp;view_op=list_works&amp;sortby=title\">Title<\/a><\/span><\/th>\n<th class=\"gsc_a_c\" dir=\"rtl\" scope=\"col\">\n<div class=\"gs_nph\"><a class=\"gsc_a_a\" href=\"https:\/\/scholar.google.com\/citations?hl=en&amp;user=tG-McVkAAAAJ&amp;view_op=list_works\">Cited by<\/a><\/div><\/th>\n<th class=\"gsc_a_y\" scope=\"col\"><span id=\"gsc_a_ha\" class=\"gsc_a_h\">Year<\/span><\/th>\n<\/tr>\n<\/thead>\n<tbody id=\"gsc_a_b\">\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\">\n<div style=\"text-align: Justify;\"><b><span lang=\"EN-GB\">George S. Oreku<\/span><\/b><span lang=\"EN-GB\">,<\/span><span lang=\"EN-GB\"> \u201cWay Forward: Leveraging AI in African Higher Education\u201d.<\/span> <span lang=\"EN-GB\">Artificial Intelligence in Education: Opportunities And Challenges for The Global South, 3rd International Research Conference, Kotebe University of Education,<\/span> <span lang=\"EN-GB\">Feb 27-28, 2025, Addis Ababa, Ethiopia Pg. 7-8. 2025, <\/span><span lang=\"EN-GB\"><a href=\"https:\/\/kue.edu.et\/conference-ai-for-education\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/kue.edu.et\/conference-ai-for-education\/&amp;source=gmail&amp;ust=1742551402192000&amp;usg=AOvVaw3fA37Vgge_YqQWuFz7THc-\">https:\/\/kue.edu.et\/conference-<wbr \/>ai-for-education\/<\/a><\/span><\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2025<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a href=\"https:\/\/zagrebsecurityforum.com\/articles-securitysciencejournal\/id\/4418\">Strategic Approaches to Digital Transformation in Tanzania: A Geopolitical Perspective<\/a>\n(Vol. 5 No. 3, 2024. Security Science Journal)<strong>George S. Oreku<\/strong>, The Open University of Tanzania, Dar Es Salaam, Tanzania<\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2024<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:NMxIlDl6LWMC\">Effects of Continuous Security Monitoring on Security Controls of Electronic Health Records in Public Hospitals, Tanzania<\/a>\n<div class=\"gs_gray\">E Godson, DD Ngaruko, G Oreku<\/div>\n<div class=\"gs_gray\">East African Journal of Business and Economics 6 (1), 364-374<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=6521292862309676016\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:NMxIlDl6LWMC\">Effects of Continuous Security Monitoring on Security Controls of Electronic Health Records in Public Hospitals, Tanzania<\/a>\n<div class=\"gs_gray\">E Godson, DD Ngaruko, G Oreku<\/div>\n<div class=\"gs_gray\">East African Journal of Business and Economics 6 (1), 364-374<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=6521292862309676016\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:BqipwSGYUEgC\">Impact of Disruptive Technologies on the Socio-economic Development of Emerging Countries<\/a>\n<div class=\"gs_gray\">FJ Mtenzi, GS Oreku, DM Lupiana<\/div>\n<div class=\"gs_gray\">IGI Global<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=2006694955648176124\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:GnPB-g6toBAC\">New Trends in Information and Communications Technology Applications: 6th International Conference, NTICT 2022, Baghdad, Iraq, November 16\u201317, 2022, Proceedings<\/a>\n<div class=\"gs_gray\">AM Al-Bakry, SO Al-Mamory, MA Sahib, LE George, JA Aldhaibani, &#8230;<\/div>\n<div class=\"gs_gray\">Springer Nature<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:IWHjjKOFINEC\">Deployment of computer science curriculum: Does that translate into entrepreneurial skills? mediating from ict role<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">Journal of Education and Development 7 (1), 11<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=11493086249121797950\">3<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:hMod-77fHWUC\">Digital Payments Systems for Emerging Economies: Case of Tanzania<\/a>\n<div class=\"gs_gray\">BA Masamila, GS Oreku, EN Nfuka<\/div>\n<div class=\"gs_gray\">Impact of Disruptive Technologies on the Socio-Economic Development of\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:JV2RwH3_ST0C\">ICT in Education: Mapping Digital Learning Initiatives in Tanzania<\/a>\n<div class=\"gs_gray\">Oreku<\/div>\n<div class=\"gs_gray\">ICT in Education: Mapping Digital Learning Initiatives in Tanzania 13 (1\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=12214691631899726452\">3<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2023<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:Tyk-4Ss8FVUC\">A Study of Online Database Servers: The Case of SQL-Injection, How Evil that could be?<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">Asian Journal of Research in Computer Science 14 (4), 198-211<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2022<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:_Qo2XoVZTnwC\">Exploring Consumers Satisfaction And General Public Image to the Tanzania Bureau of Standard (TBS): Expert Survey<\/a>\n<div class=\"gs_gray\">G Oreku<\/div>\n<div class=\"gs_gray\">Archives of Business Research 10 (11)<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2022<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:qUcmZB5y_30C\">New Trends in Information and Communications Technology Applications: 5th International Conference, NTICT 2021, Baghdad, Iraq, November 17\u201318, 2021, Proceedings<\/a>\n<div class=\"gs_gray\">AM Al-Bakry, SO Al-Mamory, MA Sahib, LE George, JA Aldhaibani, &#8230;<\/div>\n<div class=\"gs_gray\">Springer Nature<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2022<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:Zph67rFs4hoC\">Enhancing tax administration to micro businesses through digital technology: an exploratory study in Dar es Salaam, Tanzania<\/a>\n<div class=\"gs_gray\">WC Gomera, G Oreku, I Shau<\/div>\n<div class=\"gs_gray\">European Scientific Journal (ESJ)<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=8155934730593690947\">7<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:LkGwnXOMwfcC\">Adopting the ICT innovation to administrative and activity procedures in a university<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">Interdisciplinary Journal of Education Research 3 (2), 60-73<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=4599854273627908677\">9<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:W7OEmFMy1HYC\">Usability evaluation of frugal innovation: A case of mobile training for micro businesses in Tanzania<\/a>\n<div class=\"gs_gray\">WC Gomera, J Suhonen, M Tukiainen, GS Oreku, M Tedre, SS Oyelere<\/div>\n<div class=\"gs_gray\">African Journal of Science, Technology, Innovation and Development 13 (2\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=2372390016515532444\">9<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:4JMBOYKVnBMC\">Actions against tax evasion \u041f\u0440\u043e\u0442\u0438\u0432\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u0443\u043a\u043b\u043e\u043d\u0435\u043d\u0438\u044e \u043e\u0442 \u0443\u043f\u043b\u0430\u0442\u044b \u043d\u0430\u043b\u043e\u0433\u043e\u0432<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">Journal of Tax Reform 7 (2), 173-192<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:qxL8FJ1GzNcC\">Application of digital technology in enhancing tax revenue collection: the case of micro businesses in Tanzania<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">Journal of Tax Reform 7 (2), 173-192<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=9637219101962163727\">5<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:YsMSGLbcyi4C\">Artificial intelligence and machine learning applications in cloud computing and Internet of Things<\/a>\n<div class=\"gs_gray\">M Rath, J Satpathy, GS Oreku<\/div>\n<div class=\"gs_gray\">Artificial intelligence to solve pervasive internet of things issues, 103-123<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=2420806799170382831\">15<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:u5HHmVD_uO8C\">Applications of Cognitive Intelligence in the Information Retrieval Process and Associated Challenges<\/a>\n<div class=\"gs_gray\">M Rath, JJPC Rodrigues, GS Oreku<\/div>\n<div class=\"gs_gray\">International Journal of Cognitive Informatics and Natural Intelligence\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=124233685266402463\">5<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2021<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:kNdYIx-mwKoC\">New Trends in Information and Communications Technology Applications: 4th International Conference, NTICT 2020, Baghdad, Iraq, June 15, 2020, Proceedings<\/a>\n<div class=\"gs_gray\">AM Al-Bakry, SO Al-Mamory, MA Sahib, HS Hasan, GS Oreku, TM Nayl, &#8230;<\/div>\n<div class=\"gs_gray\">Springer Nature<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2020<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:iH-uZ7U-co4C\">Mobile Devices in supporting members\u00e2\u20ac\u2122 participation to Village Community Banks: The Design Thinking Approach<\/a>\n<div class=\"gs_gray\">WC Gomera, GS Oreku<\/div>\n<div class=\"gs_gray\">Zambia ICT Journal 4 (1), 6-15<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=10111888823126256529\">8<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2020<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:e5wmG9Sq2KIC\">A Rule-based Approach for Resolving Cybercrime in Financial Institutions: The Tanzania case<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">Huria Journal 27 (1), 93-114<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=14348655315901439060\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2020<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:r0BpntZqJG4C\">Mobile phone: A loan monitoring tool for micro businesses<\/a>\n<div class=\"gs_gray\">WC Gomera, GS Oreku<\/div>\n<div class=\"gs_gray\">International Journal of ICT Research in Africa and the Middle East\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=15838202126934653146\">6<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2018<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:M3ejUd6NZC8C\">Mobile technologies and socio-economic development in emerging nations<\/a>\n<div class=\"gs_gray\">FJ Mtenzi, GS Oreku, DM Lupiana, JJ Yonazi<\/div>\n<div class=\"gs_gray\">IGI Global<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=9410586456615773882\">3<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2018<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:YOwf2qJgpHMC\">Security issues in mobile devices and mobile adhoc networks<\/a>\n<div class=\"gs_gray\">M Rath, GS Oreku<\/div>\n<div class=\"gs_gray\">Mobile Technologies and Socio-Economic Development in Emerging Nations, 180-202<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=8606087952035590033\">9<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2018<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:_kc_bZDykSQC\">Mobile training in micro business: Design science research for frugal innovation<\/a>\n<div class=\"gs_gray\">WC Gomera, G Oreku, M Apiola, J Suhonen<\/div>\n<div class=\"gs_gray\">2017 IEEE AFRICON, 480-485<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=9010400469590592681\">17<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2017<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:L8Ckcad2t8MC\">Cybercrime: concerns, challenges and opportunities<\/a>\n<div class=\"gs_gray\">GS Oreku, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">Information Fusion for Cyber-Security Analytics, 129-153<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=11070155501526317772\">9<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2017<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:Y0pCki6q_DkC\">Mobile technology in training micro businesses: Users&#8217; requirements and architectural design<\/a>\n<div class=\"gs_gray\">W Gomera, G Oreku<\/div>\n<div class=\"gs_gray\">International Journal of ICT Research in Africa and the Middle East\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=2025739760054061656\">8<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2016<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:isC4tDSrTZIC\">QoS as means of providing WSN security<\/a>\n<div class=\"gs_gray\">GS Oreku, T Pazynyuk, GS Oreku, T Pazynyuk<\/div>\n<div class=\"gs_gray\">Security in Wireless Sensor Networks, 25-40<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=17475776508135896983\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2016<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:mB3voiENLucC\">Reliable data aggregation protocol for wireless sensor networks<\/a>\n<div class=\"gs_gray\">GS Oreku, T Pazynyuk, GS Oreku, T Pazynyuk<\/div>\n<div class=\"gs_gray\">Security in Wireless Sensor Networks, 77-84<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=13353517067459866036\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2016<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:7PzlFSSx8tAC\">Mathematical Model for Wireless Sensor Nodes Security<\/a>\n<div class=\"gs_gray\">GS Oreku, T Pazynyuk, GS Oreku, T Pazynyuk<\/div>\n<div class=\"gs_gray\">Security in Wireless Sensor Networks, 41-51<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2016<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:4DMP91E08xMC\">The Distributed Signature Scheme (DSS) Based on RSA<\/a>\n<div class=\"gs_gray\">GS Oreku, T Pazynyuk, GS Oreku, T Pazynyuk<\/div>\n<div class=\"gs_gray\">Security in Wireless Sensor Networks, 65-75<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2016<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:ULOm3_A8WrAC\">On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach<\/a>\n<div class=\"gs_gray\">JE Mbowe, SS Msanjila, GS Oreku, K Kalegele<\/div>\n<div class=\"gs_gray\">Journal of Software Engineering and Applications 9 (12), 601<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=8264815439887276318\">7<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2016<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:UeHWp8X0CEIC\">Security in wireless sensor networks<\/a>\n<div class=\"gs_gray\">GS Oreku, T Pazynyuk<\/div>\n<div class=\"gs_gray\">Springer International Publishing<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1265414629563775359\">35<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2016<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:9yKSN-GCB0IC\">Improved Feistel-Based Ciphers for Wireless Sensor Network Security<\/a>\n<div class=\"gs_gray\">GS Oreku, T Pazynyuk, GS Oreku, T Pazynyuk<\/div>\n<div class=\"gs_gray\">Security in Wireless Sensor Networks, 53-63<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2016<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:9ZlFYXVOiuMC\">A conceptual framework for threat assessment based on organization\u2019s information security policy<\/a>\n<div class=\"gs_gray\">JE Mbowe, I Zlotnikova, SS Msanjila, GS Oreku<\/div>\n<div class=\"gs_gray\">Journal of Information Security 5 (04), 166<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=10054958984125225055\">32<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2014<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:QIV2ME_5wuYC\">Quality of service in wireless sensor networks<\/a>\n<div class=\"gs_gray\">JE Mbowe, GS Oreku<\/div>\n<div class=\"gs_gray\">Wireless Sensor Network 2014<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=10085789679373070444\">53<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2014<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:HDshCWvjkbEC\">Adoption and diffusion of open source software in Tanzania: A way forward<\/a>\n<div class=\"gs_gray\">GS Oreku, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">2013 IST-Africa Conference &amp; Exhibition, 1-10<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=13370966629566255820\">4<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2013<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:zYLM7Y9cAGgC\">Reliability in WSN for security: Mathematical approach<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">2013 international conference on computer applications technology (ICCAT), 1-6<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1588369879156353037\">10<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2013<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:ZeXyd9-uunAC\">A viewpoint of Tanzania e-commerce and implementation barriers<\/a>\n<div class=\"gs_gray\">GS Oreku, FJ Mtenzi, AD Ali<\/div>\n<div class=\"gs_gray\">Computer Science and Information Systems 10 (1), 263-281<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=11211406620747689971\">38<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2013<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:KlAtU1dfN6UC\">Mobile technology interaction to e\u2013Commerce in promising of u\u2013Commerce<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">Academic Journals [\u00a9 2010 Academic Journals]<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=7982833073950628849\">10<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2013<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:Se3iqnhoufwC\">A viewpoint of Tanzania e-commerce and implementation barriers<\/a>\n<div class=\"gs_gray\">FJ Mtenzi, AD Ali, GS Oreku<\/div>\n<div class=\"gs_gray\"><\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2013<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:8k81kl-MbHgC\">A review of e-Government Initiatives in Tanzania: challenges and opportunities<\/a>\n<div class=\"gs_gray\">GS Oreku, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">Handbook of Research on E-Government in Emerging Economies: Adoption, E\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=7565676218913160679\">18<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2012<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:WF5omc3nYNoC\">Implementing the uses of ict in agro-products to improve market information services: challenges and opportunities for Tanzania<\/a>\n<div class=\"gs_gray\">GS Oreku, EG Mtegwa, E John<\/div>\n<div class=\"gs_gray\">READINGS BOOK, 726<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2012<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:UebtZRa9Y70C\">Key complication procedure in data driven ciphers based on controlled substitution-permutation networks<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">2011 International Conference for Internet Technology and Secured\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2011<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:4TOpqqG69KYC\">The prospects and barriers of e-commerce implementation in Tanzania<\/a>\n<div class=\"gs_gray\">GS Oreku, FJ Mtenzi, AD Ali<\/div>\n<div class=\"gs_gray\">ICIT 5th International Conference on Information Technology, Amman, Jordan\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=9279546802965816804\">11<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2011<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:M3NEmzRMIkIC\">Traffic classification and packet detections to facilitate networks security<\/a>\n<div class=\"gs_gray\">GS Oreku, FJ Mtenzi, CA Shoniregun<\/div>\n<div class=\"gs_gray\">International Journal of Internet Technology and Secured Transactions 3 (3\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=17897386481475602335\">4<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2011<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:ufrVoPGSRksC\">Open source software application and their impacts on SMEs: An action for building an OSS community environment in Tanzania<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\">2010 IST-Africa, 1-8<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2010<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:RHpTSmoSYBkC\">Intrusion detection based on data mining<\/a>\n<div class=\"gs_gray\">GS Oreku, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">2009 Eighth IEEE International Conference on Dependable, Autonomic and\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=14362222391068954287\">5<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2009<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:mVmsd5A6BfQC\">Using nature to best clarify computer security and threats<\/a>\n<div class=\"gs_gray\">GS Oreku, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">2009 Eighth IEEE International Conference on Dependable, Autonomic and\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=9993550286486638178\">3<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2009<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:IjCSPb-OGe4C\">State of Tanzania e-readiness and e-commerce: overview<\/a>\n<div class=\"gs_gray\">GS Oreku, J Li, K Kimeli, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">Taylor &amp; Francis Group 15 (4), 302-311<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1566606320132501515\">37<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2009<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:eQOLeE2rZwMC\">End user authentication (EUA) model and password for security<\/a>\n<div class=\"gs_gray\">GS Oreku, J Li<\/div>\n<div class=\"gs_gray\">Journal of Organizational and End User Computing (JOEUC) 21 (2), 28-43<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=2858059700262474104\">9<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2009<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:maZDTaKrznsC\">A framework towards enhancing trust and authorisation for e-commerce service<\/a>\n<div class=\"gs_gray\">GS Oreku, J Li, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">International Journal of Internet Technology and Secured Transactions 1 (3-4\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=17534571369683834234\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2009<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:R3hNpaxXUhUC\">Language Based Information Routing Security: Policy Enforcement.<\/a>\n<div class=\"gs_gray\">G Oreku, J Li, F Mtenzi<\/div>\n<div class=\"gs_gray\">International Arab Journal of Information Technology (IAJIT) 6 (1)<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2009<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:0EnyYjriUFMC\">Message from the ACI-09 Chairs<\/a>\n<div class=\"gs_gray\">GS Oreku, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">8th IEEE International Symposium on Dependable, Autonomic and Secure\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2009<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:MXK_kJrjxJIC\">A load balancing replica placement strategy in Data Grid<\/a>\n<div class=\"gs_gray\">Q Rasool, J Li, GS Oreku, S Zhang, D Yang<\/div>\n<div class=\"gs_gray\">2008 Third International Conference on Digital Information Management, 751-756<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=7726270549041295851\">14<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2008<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:5nxA0vEk-isC\">Reliable data aggregation protocol for wireless sensor networks<\/a>\n<div class=\"gs_gray\">T Pazynyuk, JZ Li, GS Oreku<\/div>\n<div class=\"gs_gray\">2008 Third International Conference on Digital Information Management, 346-350<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=7463082821695510593\">7<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2008<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:k_IJM867U9cC\">Improved Feistel-based ciphers for wireless sensor network security<\/a>\n<div class=\"gs_gray\">T Pazynyuk, J Li, GS Oreku<\/div>\n<div class=\"gs_gray\">Journal of Zhejiang University-SCIENCE A 9, 1111-1117<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=17525499059547082036\">9<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2008<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:hFOr9nPyWt4C\">Mathematical model for wireless sensor nodes security<\/a>\n<div class=\"gs_gray\">T Pazynyuk, JZ Li, GS Oreku<\/div>\n<div class=\"gs_gray\">2008 International Conference on Machine Learning and Cybernetics 3, 1305-1310<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=13008830005028041217\">3<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2008<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:dhFuZR0502QC\">Fair-share replication in data grid<\/a>\n<div class=\"gs_gray\">Q Rasool, J Li, G Oreku, E Munir<\/div>\n<div class=\"gs_gray\">Information Technology Journal 7 (5), 776-782<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=10262876308087804468\">19<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2008<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:d1gkVwhDpl0C\">Qos as means of providing wsns security<\/a>\n<div class=\"gs_gray\">T Pazynyuk, JZ Li, GS Oreku, LQ Pan<\/div>\n<div class=\"gs_gray\">Seventh international conference on networking (ICN 2008), 66-71<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=729338454165899946\">20<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2008<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:blknAaTinKkC\">The Distributed Signature Scheme Establishment Based on {RSA}<\/a>\n<div class=\"gs_gray\">T Pazynyuk, GS Oreku, JZ Li<\/div>\n<div class=\"gs_gray\"><\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=4660017303101787156\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2008<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:bEWYMUwI8FkC\">On P2P and hybrid approaches for replica placement in grid environment<\/a>\n<div class=\"gs_gray\">Q Rasool, J Li, S Zhang, EU Munir, GS Oreku<\/div>\n<div class=\"gs_gray\">Information Technology Journal 7 (4), 590-598<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=16827690184205794044\">2<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2008<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:2osOgNQ5qMEC\">A Two-way Strategy for Replica Placement in Data Grid.<\/a>\n<div class=\"gs_gray\">Q Rasool, J Li, EU Munir, GS Oreku<\/div>\n<div class=\"gs_gray\">GCA, 107-112<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=992786149310300189\">1<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2008<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:Wp0gIr-vW9MC\">An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos)<\/a>\n<div class=\"gs_gray\">GS Oreku, J Li, T Pazynyuk<\/div>\n<div class=\"gs_gray\">Proceedings of the 2nd ACM workshop on Performance monitoring and\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=9965304209861644398\">5<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2007<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:roLk4NBRz8UC\">Feasibility study for ecommerce and ICT diffusion-adoption in EAC<\/a>\n<div class=\"gs_gray\">GS Oreku, L Jiangzhong, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">2007 International Symposium on Communications and Information Technologies\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=4979001709478696958\">2<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2007<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:TQgYirikUcIC\">A comparative study of replica placement strategies in data grids<\/a>\n<div class=\"gs_gray\">Q Rasool, J Li, GS Oreku, EU Munir, D Yang<\/div>\n<div class=\"gs_gray\">Asia-Pacific Web Conference, 135-143<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=13517832331106050155\">23<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2007<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:aqlVkmm33-oC\">Modified s-box to archive accelerated gost<\/a>\n<div class=\"gs_gray\">GS Oreku, J Li, T Pazynyuk, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">IJCSNS International Journal of Computer Science and Network Security 7 (6\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=9859555682118726683\">14<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2007<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:3fE2CSJIrl8C\">International Workshop on DataBase Management and Application over Networks (DBMAN 2007)-Sensor, P2P, and Grid Networks I-A Comparative Study of Replica Placement Strategies in\u00a0\u2026<\/a>\n<div class=\"gs_gray\">Q Rasool, J Li, GS Oreku, EU Munir, D Yang<\/div>\n<div class=\"gs_gray\">Lecture Notes in Computer Science 4537, 135-143<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2007<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:_FxGoFyzp5QC\">End user Authentication (EUA).<\/a>\n<div class=\"gs_gray\">GS Oreku, J Li, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">WEBIST (1), 406-409<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2007<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:qjMakFHDy7sC\">Rethinking e-commerce security<\/a>\n<div class=\"gs_gray\">GS Oreku, J Li<\/div>\n<div class=\"gs_gray\">International Conference on Computational Intelligence for Modelling\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><a class=\"gsc_a_ac gs_ibl\" href=\"https:\/\/scholar.google.com\/scholar?oi=bibs&amp;hl=en&amp;cites=1016488308144482418\">13<\/a><\/td>\n<td class=\"gsc_a_y\"><span class=\"gsc_a_h gsc_a_hc gs_ibl\">2005<\/span><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:YFjsv_pBGBYC\">EFFECT OF BEHAVIOUR MONITORING ON SECURITY OF ELECTRONIC HEALTH RECORDS IN TANZANIAN PUBLIC HOSPITALS<\/a>\n<div class=\"gs_gray\">E Godson, G Oreku, D Ngaruko<\/div>\n<div class=\"gs_gray\"><\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:TFP_iSt0sucC\">Journal of Tax Reform. 2021. \u2116 2. Vol. 7. P. 173-192 Application of digital technology in enhancing tax revenue collection: the case of micro businesses in Tanzania<\/a>\n<div class=\"gs_gray\">GS Oreku<\/div>\n<div class=\"gs_gray\"><\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:-f6ydRqryjwC\">A Framework of Trust and Authorization for ECommerce Service.<\/a>\n<div class=\"gs_gray\">GS Oreku, J Li, FJ Mtenzi<\/div>\n<div class=\"gs_gray\"><\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:hC7cP41nSMkC\">In addition to the Program Committee members, a large number of individuals who belong to review committees for the CIMCA 2008, IAWTIC 2008 and ISE 2008 conferences. The\u00a0\u2026<\/a>\n<div class=\"gs_gray\">A Andreas, D Anthony Dekker, AAK Mohammadi, A Ali, A Tiwari, A Elci, &#8230;<\/div>\n<div class=\"gs_gray\"><\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:hqOjcs7Dif8C\">ACI-09 Organizing Committee<\/a>\n<div class=\"gs_gray\">GS Oreku, F Mtenzi<\/div>\n<div class=\"gs_gray\"><\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><\/td>\n<\/tr>\n<tr class=\"gsc_a_tr\">\n<td class=\"gsc_a_t\"><a class=\"gsc_a_at\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=en&amp;user=tG-McVkAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=tG-McVkAAAAJ:u-x6o8ySG0sC\">i\u2022 Society 2007<\/a>\n<div class=\"gs_gray\">GS Oreku, J Li, FJ Mtenzi<\/div>\n<div class=\"gs_gray\">Proceedings of the International Conference on Information Society (i\u00a0\u2026<\/div><\/td>\n<td class=\"gsc_a_c\"><\/td>\n<td class=\"gsc_a_y\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Publications Title Cited by Year George S. Oreku, \u201cWay Forward: Leveraging AI in African Higher Education\u201d. Artificial Intelligence in Education: Opportunities And Challenges for The Global South, 3rd International Research Conference, Kotebe University of Education, Feb 27-28, 2025, Addis Ababa, Ethiopia Pg. 7-8. 2025, https:\/\/kue.edu.et\/conference-ai-for-education\/ 2025 Strategic Approaches to Digital Transformation in Tanzania: A Geopolitical [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-16","page","type-page","status-publish","hentry"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Publications - Prof George Oreku<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/georgeoreku.org\/index.php\/publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Publications - Prof George Oreku\" \/>\n<meta property=\"og:description\" content=\"Publications Title Cited by Year George S. Oreku, \u201cWay Forward: Leveraging AI in African Higher Education\u201d. Artificial Intelligence in Education: Opportunities And Challenges for The Global South, 3rd International Research Conference, Kotebe University of Education, Feb 27-28, 2025, Addis Ababa, Ethiopia Pg. 7-8. 2025, https:\/\/kue.edu.et\/conference-ai-for-education\/ 2025 Strategic Approaches to Digital Transformation in Tanzania: A Geopolitical [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/georgeoreku.org\/index.php\/publications\/\" \/>\n<meta property=\"og:site_name\" content=\"Prof George Oreku\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-20T10:20:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/georgeoreku.org\/index.php\/publications\/\",\"url\":\"https:\/\/georgeoreku.org\/index.php\/publications\/\",\"name\":\"Publications - Prof George Oreku\",\"isPartOf\":{\"@id\":\"https:\/\/georgeoreku.org\/#website\"},\"datePublished\":\"2024-05-23T14:33:56+00:00\",\"dateModified\":\"2025-03-20T10:20:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/georgeoreku.org\/index.php\/publications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/georgeoreku.org\/index.php\/publications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/georgeoreku.org\/index.php\/publications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/georgeoreku.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/georgeoreku.org\/#website\",\"url\":\"https:\/\/georgeoreku.org\/\",\"name\":\"OUT prof George Oreku\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/georgeoreku.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/georgeoreku.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/georgeoreku.org\/#organization\",\"name\":\"OUT prof George Oreku\",\"url\":\"https:\/\/georgeoreku.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/georgeoreku.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/out.ac.tz\/george.oreku\/wp-content\/uploads\/2024\/06\/oreku.jpeg\",\"contentUrl\":\"https:\/\/out.ac.tz\/george.oreku\/wp-content\/uploads\/2024\/06\/oreku.jpeg\",\"width\":1100,\"height\":1100,\"caption\":\"OUT prof George Oreku\"},\"image\":{\"@id\":\"https:\/\/georgeoreku.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Prof George Oreku","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/georgeoreku.org\/index.php\/publications\/","og_locale":"en_US","og_type":"article","og_title":"Publications - Prof George Oreku","og_description":"Publications Title Cited by Year George S. Oreku, \u201cWay Forward: Leveraging AI in African Higher Education\u201d. Artificial Intelligence in Education: Opportunities And Challenges for The Global South, 3rd International Research Conference, Kotebe University of Education, Feb 27-28, 2025, Addis Ababa, Ethiopia Pg. 7-8. 2025, https:\/\/kue.edu.et\/conference-ai-for-education\/ 2025 Strategic Approaches to Digital Transformation in Tanzania: A Geopolitical [&hellip;]","og_url":"https:\/\/georgeoreku.org\/index.php\/publications\/","og_site_name":"Prof George Oreku","article_modified_time":"2025-03-20T10:20:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/georgeoreku.org\/index.php\/publications\/","url":"https:\/\/georgeoreku.org\/index.php\/publications\/","name":"Publications - Prof George Oreku","isPartOf":{"@id":"https:\/\/georgeoreku.org\/#website"},"datePublished":"2024-05-23T14:33:56+00:00","dateModified":"2025-03-20T10:20:09+00:00","breadcrumb":{"@id":"https:\/\/georgeoreku.org\/index.php\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/georgeoreku.org\/index.php\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/georgeoreku.org\/index.php\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/georgeoreku.org\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/georgeoreku.org\/#website","url":"https:\/\/georgeoreku.org\/","name":"OUT prof George Oreku","description":"","publisher":{"@id":"https:\/\/georgeoreku.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/georgeoreku.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/georgeoreku.org\/#organization","name":"OUT prof George Oreku","url":"https:\/\/georgeoreku.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/georgeoreku.org\/#\/schema\/logo\/image\/","url":"https:\/\/out.ac.tz\/george.oreku\/wp-content\/uploads\/2024\/06\/oreku.jpeg","contentUrl":"https:\/\/out.ac.tz\/george.oreku\/wp-content\/uploads\/2024\/06\/oreku.jpeg","width":1100,"height":1100,"caption":"OUT prof George Oreku"},"image":{"@id":"https:\/\/georgeoreku.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/georgeoreku.org\/index.php\/wp-json\/wp\/v2\/pages\/16","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/georgeoreku.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/georgeoreku.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/georgeoreku.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/georgeoreku.org\/index.php\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":88,"href":"https:\/\/georgeoreku.org\/index.php\/wp-json\/wp\/v2\/pages\/16\/revisions"}],"predecessor-version":[{"id":4053,"href":"https:\/\/georgeoreku.org\/index.php\/wp-json\/wp\/v2\/pages\/16\/revisions\/4053"}],"wp:attachment":[{"href":"https:\/\/georgeoreku.org\/index.php\/wp-json\/wp\/v2\/media?parent=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}