Publications
COP Project
Bhunu Shava, F., Gamundani, A.M., Chitauro, M., Nhamu, I.,Mikka, J.,Lloyd, S.,Phyffer,J.,Leoschut, L., & Burton, P. (2016).Voices of Children: An exploratory research study on knowledge, attitudes and practices of information and communication technology(ICT) use and online safety risks by children in Namibia. UNICEF.
Maoneke, P.B., Bhunu Shava, F., Gamundani, A.M., Bere-Chitauro, M & Nhamu, I (2018). ICTs Use and
Cyberspace Risks Faced by Adolescents in Namibia. In the proceedings of AfriCHI: The 2nd African Conference for Human Computer Interaction, Windhoek, Namibia, 3-7 December 2018.
http://africhi.net/wp-
content/uploads/2018/11/FinalProgramme.pdf
Smart Parking Project
Muchinenyika, S.H., Gamundani, A.M. & Stanley C (2022). Conceptual Design of a Sensorless Smart Parking Payment Solution. 2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).
Green Computing Project
Gamundani, A.M., & Muhonde, M.(2015). Assessing
sustainable ICT deployments under resource constrained environments. 2nd Chinhoyi University of
Technology International Research Conference, Chinhoyi–July 20-21 2015, ISSN: 2079-8997. Page 26. http://www.cut.ac.zw/home/irc/news/IRC-Book-
Abstracts-Book-Sables.pdf
Gamundani, A.M., Phillips, A., & MUYINGI, H.N. (2018).
Privacy Presevation and Security Dilemma:
Relationship proposition for IoT authentication. In
Proceedings of the International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE) (pp. 45). 27-28 July 2018, KIIT University, Bhubaneswar, India. http://www.rieece.org
Gamundani, A. M., Phillips, A., & Muyingi, H.N., (2018). An Overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on Smart Home Applications. In Proceedings of the 11th IEEE International Conference on Internet of Things(iThings-
2018) Halifax, Canada. Http://cse.stfx.ca/~iThings2018/acceptedlist.html
Gamundani, A.M., Bhunu-Shava F., & Bere M., (2019).
A digital economy technology integration model
incorporating the cyber security layer. 14th
International Conference on Cyber Warfare and
Security, ICCWS 2019, pp.65-77
Sibanda, B. K., Iyawa, G. E., & Gamundani, A. M.
(2021). Systematic Review of Plant Pest and Disease Identification Strategies and Techniques in Mobile Apps. In Trends and Applications in Information Systems and Technologies: Volume 2 9 (pp. 491-502). Springer International Publishing.
Frequently Asked Questions
The nexus between Internet of Things (IoT) and Artificial Intelligence formulates the AIoT focus area. When IoT are enabled with AI capabilities, they become inherently intelligent during their operations and interactions, that brings about the unsupervised nature of IoT devices.
IoT devices increased the capability of connectivity to everyday objects as such the attack surface has been multiplied. It is important that attention is paid to cybersecurity for AI and IoT applications across any domain as they have a two edged sword component on data. Yes there are benefit to reap, but so too are the security concerns that comes with these technologies.
Information Communication and Technologies for Development (ICT4D) have been generalised in many discussions and loosely applied a terminology in several contexts. ICT4D ensures we focus our application of ICTs to address tangible challenges with a focus on the communities that we are targeting. If not carefully considered ICTs can be the catalyst for extending the digital divide instead of bridging it, they can be the amplifiers of systemic biases instead of curbing them. The main message behind ICT4D is therefore, lets develop solutions with the respective communities and not for them. Personally I will consider proper ICT4D the bedrock of sustainability.
It is important to have a contextual approach when looking at AI and IoT as each domain demands different security requirements, data privacy and governance nuances. Henceforth, the domain of application should be well understood, defined and holistically considered for effective, secure and efficient solutions. At the backdrop of such requirements will be informed and detailed research to aid the decision making processes.